{"id":"https://openalex.org/W2189601660","doi":"https://doi.org/10.17487/rfc4772","title":"Security Implications of Using the Data Encryption Standard (DES)","display_name":"Security Implications of Using the Data Encryption Standard (DES)","publication_year":2006,"publication_date":"2006-12-01","ids":{"openalex":"https://openalex.org/W2189601660","doi":"https://doi.org/10.17487/rfc4772","mag":"2189601660"},"language":"en","primary_location":{"id":"doi:10.17487/rfc4772","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc4772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101540771","display_name":"Sean Kelly","orcid":"https://orcid.org/0000-0002-2415-0375"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Kelly","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101540771"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7894737720489502},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7189309597015381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6426867246627808},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.612051784992218},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5272266864776611},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.509379506111145},{"id":"https://openalex.org/keywords/brute-force","display_name":"Brute force","score":0.4328053891658783},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.29205846786499023}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7894737720489502},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7189309597015381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6426867246627808},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.612051784992218},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5272266864776611},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.509379506111145},{"id":"https://openalex.org/C2986801135","wikidata":"https://www.wikidata.org/wiki/Q1209494","display_name":"Brute force","level":2,"score":0.4328053891658783},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.29205846786499023}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc4772","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc4772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320987","display_name":"Curtin University of Technology","ror":"https://ror.org/02n415q13"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W94873809","https://openalex.org/W315107650","https://openalex.org/W640229152","https://openalex.org/W1654806544","https://openalex.org/W1660562555","https://openalex.org/W1829759151","https://openalex.org/W1964723977","https://openalex.org/W1979802565","https://openalex.org/W2000309792","https://openalex.org/W2142798909","https://openalex.org/W2162262307","https://openalex.org/W2325359287","https://openalex.org/W2911857293","https://openalex.org/W3204802657","https://openalex.org/W4205111696","https://openalex.org/W4289127653"],"related_works":["https://openalex.org/W4205100462","https://openalex.org/W2231057570","https://openalex.org/W2372014581","https://openalex.org/W2364426341","https://openalex.org/W4315815885","https://openalex.org/W1551831483","https://openalex.org/W3004922236","https://openalex.org/W3173036989","https://openalex.org/W4250199380","https://openalex.org/W2387910336"],"abstract_inverted_index":{"The":[0],"Data":[1],"Encryption":[2,32],"Standard":[3,33],"(DES)":[4],"is":[5,56],"susceptible":[6],"to":[7,38,49,81],"brute-force":[8],"attacks,":[9],"which":[10],"are":[11],"well":[12],"within":[13],"the":[14,30,77],"reach":[15],"of":[16],"a":[17,21],"modestly":[18],"financed":[19],"adversary.As":[20],"result,":[22],"DES":[23,41,65],"has":[24],"been":[25],"deprecated,":[26],"and":[27,44,46,73],"replaced":[28],"by":[29],"Advanced":[31],"(AES).Nonetheless,":[34],"many":[35],"applications":[36],"continue":[37,48],"rely":[39],"on":[40],"for":[42],"security,":[43],"designers":[45,72],"implementers":[47,74],"support":[50],"it":[51,60],"in":[52,68],"new":[53],"applications.While":[54],"this":[55],"not":[57],"always":[58],"inappropriate,":[59],"frequently":[61],"is.This":[62],"note":[63],"discusses":[64],"security":[66],"implications":[67],"detail,":[69],"so":[70],"that":[71],"have":[75],"all":[76],"information":[78],"they":[79],"need":[80],"make":[82],"judicious":[83],"decisions":[84],"regarding":[85],"its":[86],"use.":[87]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
