What Is a Data Encryption Algorithm?

Data Encryption Algorithm (DEA) is a symmetric encryption algorithm, which is likely to be the most widely used key system, especially in the protection of financial data. The DEA originally developed was embedded in hardware. Usually, Automated Teller Machine (ATM) uses DEA. It comes from the research work of IBM, which had patented it for several years, but after it expired in 1983, it was in the public domain and allowed to use it under certain conditions without the royalty. It was formally adopted by the US government in 1997. [1]

Data encryption algorithm

Data Encryption Algorithm (DEA) is a symmetric encryption algorithm, which is likely to be the most widely used key system, especially in the protection of financial data. The DEA originally developed was embedded in hardware. Usually, Automated Teller Machine (ATM) uses DEA. It comes from the research work of IBM, which had patented it for several years, but after it expired in 1983, it was in the public domain and allowed to use it under certain conditions without the royalty. It was formally adopted by the US government in 1997. [1]
Cryptographic algorithm is a collective name of encryption algorithm and decryption algorithm, and it is the core of cryptosystem. The cryptographic algorithm can be viewed as a combination of exchanges. When the input is plain text, after these transformations, the output is cipher text. This is the process of encryption exchange. At this time, the cryptographic algorithm is called an encryption algorithm. Conversely, when the input is ciphertext, after the password is transformed, the output is plaintext. This is the process of decryption exchange. At this time, the cryptographic algorithm is called the decryption algorithm. Common encryption algorithms are: AES, RSA / ECC, Diffie-hellman, SHA-1 / SHA-256.
The original idea of DES can refer to the Enigma machine of Germany in World War II, and its basic idea is roughly the same. Traditional password encryption was performed by ancient cycles
The main form of attack on DES is called brute force or exhaustion, which is to repeatedly try various keys until there is a match. If DES uses a 56-bit key, the number of possible keys is 2 to the power of 56. With the continuous development of computer system capabilities, the security of DES will be much weaker than when it first appeared. However, it can still be considered adequate for practical reasons. but,
DES (Drug Eluting Stents)
Drug-coated stent
Drug-eluting stents are also called drug-releasing stents and are used in coronary interventional therapy (PCI). The polymer is carried by a polymer coated on the surface of the metal stent. The layer is released to the vessel wall tissue in a controlled manner by elution to exert a biological effect.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?