data-encryption-standard
A government-proposed encryption algorithm with a 56-bit key length that became a federal standard despite concerns about its security and NSA involvement.
6 chapters across 2 books
Crypto (2001)Steven Levy
The chapter discusses the introduction and controversy surrounding the Data Encryption Standard (DES) announced by the National Bureau of Standards in 1975, highlighting concerns by cryptographers Martin Hellman and Whit Diffie about the NSA's involvement and the insufficient 56-bit key length that made DES vulnerable to brute-force attacks. It also traces the origins of DES to IBM researcher Horst Feistel, who developed the Lucifer cipher, a strong block cipher designed to protect individual privacy against database intrusions, emphasizing the tension between national security secrecy and the need for public cryptographic standards.
This chapter provides a detailed account of the development of the Data Encryption Standard (DES), highlighting key figures such as Horst Feistel and referencing important sources that document the history and technical aspects of DES. It discusses the origins, naming, and technical evaluations of DES, including its cryptanalytic challenges like differential and linear cryptanalysis, and the involvement of institutions such as IBM and the NSA. The chapter also situates DES within the broader context of cryptographic research and government standards development during the 1970s and beyond.
Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy
This chapter explores the origins and controversies surrounding the Data Encryption Standard (DES), highlighting the skepticism of cryptographers Martin Hellman and Whit Diffie about its 56-bit key length and potential NSA influence. It traces the development of DES back to IBM researcher Horst Feistel, who designed the Lucifer cipher with privacy protection as a key motivation, emphasizing the tension between government secrecy and individual privacy in cryptography.
This chapter details Ray Ozzie's struggle to include strong cryptography in Lotus Notes amid U.S. government export restrictions that treated encryption software as a weapon. It highlights the NSA's opposition to exporting DES encryption, their attempts to control cryptographic standards, and Lotus's efforts to negotiate and develop alternative ciphers like RC-2 to comply with regulations while maintaining product security. The chapter reveals the tension between commercial software innovation and national security policies during the 1980s.
This chapter provides extensive notes and references related to the history and development of cryptography, particularly focusing on public key cryptography and the Data Encryption Standard (DES). It draws from personal interviews, government and corporate documents, and seminal academic papers to trace the technical, political, and cultural evolution of cryptographic systems from classical methods to modern innovations. The chapter also highlights the interplay between cryptographic research, government secrecy, and the emerging crypto-anarchist movement.
This chapter provides a comprehensive glossary of cryptographic terms and technologies relevant to computer security and encryption. It explains foundational concepts such as encryption, cryptanalysis, and key management, as well as specific cryptosystems like DES, RSA, and PGP. The glossary also covers government-related encryption technologies and controversies, including key escrow systems like the Capstone and Clipper chips.