Misplaced Pages

Des

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

The Data Encryption Standard ( DES / ˌ d iː ˌ iː ˈ ɛ s , d ɛ z / ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography .

#798201

102-1131: This article is about the given name. For the cryptography algorithm, see Data Encryption Standard . For the British miniseries, see Des (TV series) . For other uses, see DES (disambiguation) . [REDACTED] Look up des in Wiktionary, the free dictionary. Des is a masculine given name, mostly a short form ( hypocorism ) of Desmond . People named Des include: People [ edit ] Des Buckingham , English football manager Des Corcoran , (1928–2004), Australian politician Des Dillon (disambiguation) , several people Des Hasler (born 1961), Australian rugby league player-coach Desmond Des Kelly (born 1965), British journalist Desmond Des Lynam (born 1942), British television presenter Desmond Des Lyttle (born 1971), English footballer Des McLean , Scottish stand-up comedian, actor and presenter Desmond Des O'Connor (1932–2020), British entertainer Des O'Connor , Australian rugby league player in

204-444: A group , or more precisely, the set { E K } {\displaystyle \{E_{K}\}} (for all possible keys K {\displaystyle K} ) under functional composition is not a group, nor "close" to being a group. This was an open question for some time, and if it had been the case, it would have been possible to break DES, and multiple encryption modes such as Triple DES would not increase

306-566: A holding company of manufacturers of record-keeping and measuring systems. It was renamed "International Business Machines" in 1924 and soon became the leading manufacturer of punch-card tabulating systems . During the 1960s and 1970s, the IBM mainframe , exemplified by the System/360 , was the world's dominant computing platform , with the company producing 80 percent of computers in the U.S. and 70 percent of computers worldwide. IBM debuted in

408-575: A neuromorphic CMOS integrated circuit and announced a $ 3 billion investment over the following five years to design a neural chip that mimics the human brain, with 10 billion neurons and 100 trillion synapses, but that uses just 1 kilowatt of power. In 2016, the company launched all-flash arrays designed for small and midsized companies, which includes software for data compression, provisioning, and snapshots across various systems. In January 2019, IBM introduced its first commercial quantum computer: IBM Q System One . In March 2020, it

510-455: A 56-bit key. Some of the suspicions about hidden weaknesses in the S-boxes were allayed in 1990, with the independent discovery and open publication by Eli Biham and Adi Shamir of differential cryptanalysis , a general method for breaking block ciphers. The S-boxes of DES were much more resistant to the attack than if they had been chosen at random, strongly suggesting that IBM knew about

612-639: A 64-bit or 128-bit key. In the Soviet Union the GOST 28147-89 algorithm was introduced, with a 64-bit block size and a 256-bit key, which was also used in Russia later. IBM International Business Machines Corporation (using the trademark IBM ), nicknamed Big Blue , is an American multinational technology company headquartered in Armonk, New York and present in over 175 countries. It

714-649: A Hollerith department called Hollerith Abteilung, which had IBM machines, including calculating and sorting machines. IBM as a military contractor produced 6% of the M1 Carbine rifles used in World War II, about 346,500 of them, between August 1943 and May. IBM built the Automatic Sequence Controlled Calculator , an electromechanical computer, during World War II. It offered its first commercial stored-program computer,

816-477: A block (32 bits) at a time and consists of four stages: The alternation of substitution from the S-boxes, and permutation of bits from the P-box and E-expansion provides so-called " confusion and diffusion " respectively, a concept identified by Claude Shannon in the 1940s as a necessary condition for a secure yet practical cipher. Figure 3 illustrates the key schedule for encryption—the algorithm which generates

918-492: A component of TDEA ). Another theoretical attack, linear cryptanalysis, was published in 1994, but it was the Electronic Frontier Foundation 's DES cracker in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in this article. The introduction of DES

1020-437: A concern in practice. For any cipher , the most basic method of attack is brute force —trying every possible key in turn. The length of the key determines the number of possible keys, and hence the feasibility of this approach. For DES, questions were raised about the adequacy of its key size early on, even before it was adopted as a standard, and it was the small key size, rather than theoretical cryptanalysis, which dictated

1122-581: A consequence, IBM quickly began losing its market dominance to emerging competitors in the PC market. In 1985, IBM collaborated with Microsoft to develop a new operating system , which was released as OS/2 . Following a dispute, Microsoft severed the collaboration and IBM continued development of OS/2 on its own but it failed in the marketplace against Microsoft's Windows during the mid-1990s. In 1991 IBM began spinning off its many divisions into autonomous subsidiaries (so-called "Baby Blues") in an attempt to make

SECTION 10

#1732771742799

1224-677: A fifth company, the Computing-Tabulating-Recording Company (CTR) based in Endicott, New York. The five companies had 1,300 employees and offices and plants in Endicott and Binghamton , New York; Dayton, Ohio ; Detroit, Michigan ; Washington, D.C. ; and Toronto , Canada. Collectively, the companies manufactured a wide array of machinery for sale and lease, ranging from commercial scales and industrial time recorders, meat and cheese slicers, to tabulators and punched cards. Thomas J. Watson, Sr. , fired from

1326-447: A focus on customer service, an insistence on well-groomed, dark-suited salesmen and had an evangelical fervor for instilling company pride and loyalty in every worker". His favorite slogan, " THINK ", became a mantra for each company's employees. During Watson's first four years, revenues reached $ 9 million ($ 158 million today) and the company's operations expanded to Europe, South America, Asia and Australia. Watson never liked

1428-419: A key-search machine costing US$ 1 million which would find a key within 7 hours. However, none of these early proposals were ever implemented—or, at least, no implementations were publicly acknowledged. The vulnerability of DES was practically demonstrated in the late 1990s. In 1997, RSA Security sponsored a series of contests, offering a $ 10,000 prize to the first team that broke a message encrypted with DES for

1530-471: A need for a replacement algorithm . As a result of discussions involving external consultants including the NSA, the key size was reduced from 256 bits to 56 bits to fit on a single chip. In academia, various proposals for a DES-cracking machine were advanced. In 1977, Diffie and Hellman proposed a machine costing an estimated US$ 20 million which could find a DES key in a single day. By 1993, Wiener had proposed

1632-481: A reduced key size was sufficient; indirectly assisted in the development of the S-box structures; and certified that the final DES algorithm was, to the best of their knowledge, free from any statistical or mathematical weakness. However, it also found that NSA did not tamper with the design of the algorithm in any way. IBM invented and designed the algorithm, made all pertinent decisions regarding it, and concurred that

1734-464: A relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, raising suspicions about a backdoor . The S-boxes that had prompted those suspicions were designed by the NSA to address a vulnerability they secretly knew ( differential cryptanalysis ). However, the NSA also ensured that the key size was drastically reduced so that they could break the cipher by brute force attack. The intense academic scrutiny

1836-626: A separate lawsuit. In 2015, IBM bought the digital part of The Weather Company , Truven Health Analytics for $ 2.6 billion in 2016, and in October 2018, IBM announced its intention to acquire Red Hat for $ 34 billion, which was completed on July 9, 2019. In February 2020, IBM's John Kelly III joined Brad Smith of Microsoft to sign a pledge with the Vatican to ensure the ethical use and practice of Artificial Intelligence (AI) . IBM announced in October 2020 that it would divest

1938-480: A sharp drop in profit margins during the second quarter of fiscal year 1992; market analysts attributed the drop to a fierce price war in the personal computer market over the summer of 1992. The corporate restructuring was one of the largest and most expensive in history up to that point. By the summer of 1993, the IBM PC Co. had divided into multiple business units itself, including Ambra Computer Corporation and

2040-454: A spin-off company of the two project partners of COPACOBANA has enhanced and developed successors of COPACOBANA. In 2008 their COPACOBANA RIVYERA reduced the time to break DES to less than one day, using 128 Spartan-3 5000's. SciEngines RIVYERA held the record in brute-force breaking DES, having utilized 128 Spartan-3 5000 FPGAs. Their 256 Spartan-6 LX150 model has further lowered this time. In 2012, David Hulton and Moxie Marlinspike announced

2142-516: A system with 48 Xilinx Virtex-6 LX240T FPGAs, each FPGA containing 40 fully pipelined DES cores running at 400 MHz, for a total capacity of 768 gigakeys/sec. The system can exhaustively search the entire 56-bit DES key space in about 26 hours and this service is offered for a fee online. There are three attacks known that can break the full 16 rounds of DES with less complexity than a brute-force search: differential cryptanalysis (DC), linear cryptanalysis (LC), and Davies' attack . However,

SECTION 20

#1732771742799

2244-437: A very powerful tool, used against many schemes, and there was concern that such information in the public domain could adversely affect national security." Levy quotes Walter Tuchman: "[t]hey asked us to stamp all our documents confidential... We actually put a number on each one and locked them up in safes, because they were considered U.S. government classified. They said do it. So I did it". Bruce Schneier observed that "It took

2346-462: Is 56 bits. The key is nominally stored or transmitted as 8 bytes , each with odd parity. According to ANSI X3.92-1981 (Now, known as ANSI INCITS 92–1981), section 3.5: One bit in each 8-bit byte of the KEY may be utilized for error detection in key generation, distribution, and storage. Bits 8, 16,..., 64 are for use in ensuring that each byte is of odd parity. Like other block ciphers, DES by itself

2448-507: Is a publicly traded company and one of the 30 companies in the Dow Jones Industrial Average . IBM is the largest industrial research organization in the world, with 19 research facilities across a dozen countries, having held the record for most annual U.S. patents generated by a business for 29 consecutive years from 1993 to 2021. IBM was founded in 1911 as the Computing-Tabulating-Recording Company (CTR),

2550-414: Is considered to have been a catalyst for the academic study of cryptography, particularly of methods to crack block ciphers. According to a NIST retrospective about DES, DES is the archetypal block cipher —an algorithm that takes a fixed-length string of plaintext bits and transforms it through a series of complicated operations into another ciphertext bitstring of the same length. In the case of DES,

2652-484: Is different from Wikidata All set index articles Data Encryption Standard Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel , the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with

2754-695: Is no need for separate encryption and decryption algorithms. The ⊕ symbol denotes the exclusive-OR (XOR) operation. The F-function scrambles half a block together with some of the key. The output from the F-function is then combined with the other half of the block, and the halves are swapped before the next round. After the final round, the halves are swapped; this is a feature of the Feistel structure which makes encryption and decryption similar processes. The F-function, depicted in Figure 2, operates on half

2856-478: Is not a secure means of encryption, but must instead be used in a mode of operation . FIPS-81 specifies several modes for use with DES. Further comments on the usage of DES are contained in FIPS-74. Decryption uses the same structure as encryption, but with the keys used in reverse order. (This has the advantage that the same hardware or software can be used in both directions.) The algorithm's overall structure

2958-399: Is shown in Figure 1: there are 16 identical stages of processing, termed rounds . There is also an initial and final permutation , termed IP and FP , which are inverses (IP "undoes" the action of FP, and vice versa). IP and FP have no cryptographic significance, but were included in order to facilitate loading blocks in and out of mid-1970s 8-bit based hardware. Before the main rounds,

3060-414: Is the bitwise complement of x . {\displaystyle x.} E K {\displaystyle E_{K}} denotes encryption with key K . {\displaystyle K.} P {\displaystyle P} and C {\displaystyle C} denote plaintext and ciphertext blocks respectively. The complementation property means that

3162-440: Is the largest shareholder of IBM and as of March 31, 2023, held 15.7% of total shares outstanding. In 2011, IBM became the first technology company Warren Buffett 's holding company Berkshire Hathaway invested in. Initially he bought 64 million shares costing $ 10.5 billion. Over the years, Buffett increased his IBM holdings, but by the end of 2017 had reduced them by 94.5% to 2.05 million shares; by May 2018, he

Des - Misplaced Pages Continue

3264-574: The FORTRAN scientific programming language was developed. In 1961, IBM developed the SABRE reservation system for American Airlines and introduced the highly successful Selectric typewriter. In 1963, IBM employees and computers helped NASA track the orbital flights of the Mercury astronauts. A year later, it moved its corporate headquarters from New York City to Armonk, New York. The latter half of

3366-851: The IBM Rome Software Lab (Rome, Italy), Hursley House (Winchester, UK), 330 North Wabash (Chicago, Illinois, United States), the Cambridge Scientific Center (Cambridge, Massachusetts, United States), the IBM Toronto Software Lab (Toronto, Canada), the IBM Building, Johannesburg (Johannesburg, South Africa), the IBM Building (Seattle) (Seattle, Washington, United States), the IBM Hakozaki Facility (Tokyo, Japan),

3468-888: The IBM Yamato Facility (Yamato, Japan), the IBM Canada Head Office Building (Ontario, Canada) and the Watson IoT Headquarters (Munich, Germany). Defunct IBM campuses include the IBM Somers Office Complex (Somers, New York), Spango Valley (Greenock, Scotland), and Tour Descartes (Paris, France). The company's contributions to industrial architecture and design include works by Marcel Breuer , Eero Saarinen , Ludwig Mies van der Rohe , I.M. Pei and Ricardo Legorreta . Van der Rohe's building in Chicago

3570-544: The National Cash Register Company by John Henry Patterson , called on Flint and, in 1914, was offered a position at CTR. Watson joined CTR as general manager and then, 11 months later, was made President when antitrust cases relating to his time at NCR were resolved. Having learned Patterson's pioneering business practices, Watson proceeded to put the stamp of NCR onto CTR's companies. He implemented sales conventions, "generous sales incentives,

3672-669: The National Security Agency (NSA), the NBS selected a slightly modified version (strengthened against differential cryptanalysis , but weakened against brute-force attacks ), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard led to its quick international adoption and widespread academic scrutiny. Controversies arose from classified design elements,

3774-448: The UPC barcode . The company has made inroads in advanced computer chips , quantum computing , artificial intelligence , and data infrastructure . IBM employees and alumni have won various recognitions for their scientific research and inventions, including six Nobel Prizes and six Turing Awards . IBM originated with several technological innovations developed and commercialized in

3876-681: The Universal Product Code . IBM and the World Bank first introduced financial swaps to the public in 1981, when they entered into a swap agreement. IBM entered the microcomputer market in the 1980s with the IBM Personal Computer (IBM 5150), which soon became known as the PC , one of IBM's best selling products. Due to a lack of foresight by IBM, the PC was not well protected by intellectual property laws. As

3978-403: The block size is 64 bits. DES also uses a key to customize the transformation, so that decryption can supposedly only be performed by those who know the particular key used to encrypt. The key ostensibly consists of 64 bits; however, only 56 of these are actually used by the algorithm. Eight bits are used solely for checking parity , and are thereafter discarded. Hence the effective key length

4080-410: The magnetic stripe card that would become ubiquitous for credit/debit/ATM cards, driver's licenses, rapid transit cards and a multitude of other identity and access control applications. IBM pioneered the manufacture of these cards, and for most of the 1970s, the data processing systems and software for such applications ran exclusively on IBM computers. In 1974, IBM engineer George J. Laurer developed

4182-606: The microcomputer market in 1981 with the IBM Personal Computer , — its DOS software provided by Microsoft , — which became the basis for the majority of personal computers to the present day. The company later also found success in the portable space with the ThinkPad . Since the 1990s, IBM has concentrated on computer services , software , supercomputers , and scientific research ; it sold its microcomputer division to Lenovo in 2005. IBM continues to develop mainframes, and its supercomputers have consistently ranked among

Des - Misplaced Pages Continue

4284-577: The 1960s saw IBM continue its support of space exploration, participating in the 1965 Gemini flights, 1966 Saturn flights, and 1969 lunar mission. IBM also developed and manufactured the Saturn V's Instrument Unit and Apollo spacecraft guidance computers. On April 7, 1964, IBM launched the first computer system family, the IBM System/360 . It spanned the complete range of commercial and scientific applications from large to small, allowing companies for

4386-588: The 1970s Desmond Des O'Grady (born 1953), Irish retired Gaelic footballer Des O'Hagan (1934–2015), Irish communist Desmond O'Malley (1939–2021), Irish politician, government minister and founder and leader of the Progressive Democrats Desmond Des O'Neil (1920–1999), Australian politician Des O'Reilly (1954–2016), Australian rugby league player Desmond Smith (general) (1911–1991), Canadian major-general Des Smith (headteacher) , British headteacher embroiled in

4488-511: The Cash for Honours scandal Des Smith (ice hockey) (1914–1981), Canadian ice hockey defenceman Desmond Sinclair Des Walker (born 1965), English international footballer Fictional characters [ edit ] Desmond Des Barnes , in the British soap opera Coronation Street Desmond Des Clarke (Neighbours) , in the Australian soap opera Neighbours Desmond Des Tiny , in

4590-506: The DES algorithm follows. Although more information has been published on the cryptanalysis of DES than any other block cipher, the most practical attack to date is still a brute-force approach. Various minor cryptanalytic properties are known, and three theoretical attacks are possible which, while having a theoretical complexity less than a brute-force attack, require an unrealistic number of known or chosen plaintexts to carry out, and are not

4692-418: The DES standard. The IBM 3624 later adopted a similar PIN verification system to the earlier Atalla system. On 15 May 1973, after consulting with the NSA, NBS solicited proposals for a cipher that would meet rigorous design criteria. None of the submissions was suitable. A second request was issued on 27 August 1974. This time, IBM submitted a candidate which was deemed acceptable—a cipher developed during

4794-490: The IBM PC Co. was dissolved and merged into IBM Personal Systems Group. In 2002 IBM acquired PwC Consulting, the consulting arm of PwC which was merged into its IBM Global Services . On September 14, 2004, LG and IBM announced that their business alliance in the South Korean market would end at the end of that year. Both companies stated that it was unrelated to the charges of bribery earlier that year. Xnote

4896-506: The IBM Power Personal Systems Group, the former an attempt to design and market " clone " computers of IBM's own architecture and the latter responsible for IBM's PowerPC -based workstations . IBM PC Co. introduced the ThinkPad clone computers, which IBM would heavily market and would eventually become one of the best-selling series of notebook computers . In 1993, IBM posted an $ 8 billion loss – at

4998-789: The IBM website. On June 7, Krishna announced that IBM would carry out an "orderly wind-down" of its operations in Russia. In late 2022, IBM started a collaboration with new Japanese manufacturer Rapidus , which led GlobalFoundries to file a lawsuit against IBM the following year. In 2023, IBM acquired Manta Software Inc. to complement its data and A.I. governance capabilities for an undisclosed amount. On November 16, 2023, IBM suspended ads on Twitter after ads were found next to pro-Nazi content. In December 2023, IBM announced it would acquire Software AG 's StreamSets and webMethods platforms for €2.13 billion ($ 2.33 billion). IBM's market capitalization

5100-551: The Managed Infrastructure Services unit of its Global Technology Services division into a new public company. The new company, Kyndryl , will have 90,000 employees, 4,600 clients in 115 countries, with a backlog of $ 60 billion. IBM's spin off was greater than any of its previous divestitures, and welcomed by investors. IBM appointed Martin Schroeter, who had been IBM's CFO from 2014 through

5202-516: The Weather Channel mobile app. Also that year, IBM employees created the film A Boy and His Atom , which was the first molecule movie to tell a story. In 2016, IBM acquired video conferencing service Ustream and formed a new cloud video unit. In April 2016, it posted a 14-year low in quarterly sales. The following month, Groupon sued IBM accusing it of patent infringement, two months after IBM accused Groupon of patent infringement in

SECTION 50

#1732771742799

5304-480: The academic community two decades to figure out that the NSA 'tweaks' actually improved the security of DES." Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3),

5406-612: The agreed upon key size was more than adequate for all commercial applications for which the DES was intended. Another member of the DES team, Walter Tuchman, stated "We developed the DES algorithm entirely within IBM using IBMers. The NSA did not dictate a single wire!" In contrast, a declassified NSA book on cryptologic history states: In 1973 NBS solicited private industry for a data encryption standard (DES). The first offerings were disappointing, so NSA began working on its own algorithm. Then Howard Rosenblum, deputy director for research and engineering, discovered that Walter Tuchman of IBM

5508-468: The algorithm as the DEA ( Data Encryption Algorithm ). The origins of DES date to 1972, when a National Bureau of Standards study of US government computer security identified a need for a government-wide standard for encrypting unclassified, sensitive information. Around the same time, engineer Mohamed Atalla in 1972 founded Atalla Corporation and developed the first hardware security module (HSM),

5610-427: The algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis . DES is insecure due to the relatively short 56-bit key size . In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see § Chronology ). There are also some analytical results which demonstrate theoretical weaknesses in

5712-469: The antitrust laws in IBM's actions directed against leasing companies and plug-compatible peripheral manufacturers. Shortly after, IBM unbundled its software and services in what many observers believed was a direct result of the lawsuit, creating a competitive market for software. In 1982, the Department of Justice dropped the case as "without merit". Also in 1969, IBM engineer Forrest Parry invented

5814-410: The attacks are theoretical and are generally considered infeasible to mount in practice; these types of attack are sometimes termed certificational weaknesses. There have also been attacks proposed against reduced-round versions of the cipher, that is, versions of DES with fewer than 16 rounds. Such analysis gives an insight into how many rounds are needed for safety, and how much of a "security margin"

5916-471: The block is divided into two 32-bit halves and processed alternately; this criss-crossing is known as the Feistel scheme . The Feistel structure ensures that decryption and encryption are very similar processes—the only difference is that the subkeys are applied in the reverse order when decrypting. The rest of the algorithm is identical. This greatly simplifies implementation, particularly in hardware, as there

6018-693: The book series The Saga of Darren Shan See also [ edit ] DES (disambiguation) Dess (disambiguation) Dez (disambiguation) [REDACTED] Name list This page or section lists people that share the same given name . If an internal link led you here, you may wish to change that link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=Des&oldid=1170400600 " Categories : Given names Masculine given names Hypocorisms Irish masculine given names English masculine given names Hidden categories: Articles with short description Short description

6120-581: The cipher, although they are infeasible in practice. The algorithm is believed to be practically secure in the form of Triple DES , although there are theoretical attacks. This cipher has been superseded by the Advanced Encryption Standard (AES). DES has been withdrawn as a standard by the National Institute of Standards and Technology . Some documents distinguish between the DES standard and its algorithm, referring to

6222-601: The city's seventh tallest building and overlooking Beijing National Stadium ("Bird's Nest") , home to the 2008 Summer Olympics . IBM India Private Limited is the Indian subsidiary of IBM, which is headquartered at Bangalore , Karnataka. It has facilities in Coimbatore , Chennai , Kochi , Ahmedabad , Delhi , Kolkata , Mumbai , Pune , Gurugram , Noida , Bhubaneshwar , Surat , Visakhapatnam , Hyderabad , Bangalore and Jamshedpur . Other notable buildings include

SECTION 60

#1732771742799

6324-560: The clumsy hyphenated name "Computing-Tabulating-Recording Company" and chose to replace it with the more expansive title "International Business Machines" which had previously been used as the name of CTR's Canadian Division; the name was changed on February 14, 1924. By 1933, most of the subsidiaries had been merged into one company, IBM. The Nazis made extensive use of Hollerith punch card and alphabetical accounting equipment and IBM's majority-owned German subsidiary, Deutsche Hollerith Maschinen GmbH ( Dehomag ), supplied this equipment from

6426-461: The company designed a video surveillance system for Davao City . In 2014 IBM announced it would sell its x86 server division to Lenovo for $ 2.1 billion. while continuing to offer Power ISA -based servers. Also that year, IBM began announcing several major partnerships with other companies, including Apple Inc. , Twitter, Facebook, Tencent , Cisco , UnderArmour , Box , Microsoft , VMware , CSC , Macy's , Sesame Workshop ,

6528-421: The company more manageable and to streamline IBM by having other investors finance those companies. These included AdStar , dedicated to disk drives and other data storage products; IBM Application Business Systems, dedicated to mid-range computers; IBM Enterprise Systems, dedicated to mainframes; Pennant Systems, dedicated to mid-range and large printers; Lexmark , dedicated to small printers; and more. Lexmark

6630-618: The contest. That contest was won by the DESCHALL Project , led by Rocke Verser, Matt Curtin , and Justin Dolske, using idle cycles of thousands of computers across the Internet. The feasibility of cracking DES quickly was demonstrated in 1998 when a custom DES-cracker was built by the Electronic Frontier Foundation (EFF), a cyberspace civil rights group, at the cost of approximately US$ 250,000 (see EFF DES cracker ). Their motivation

6732-460: The designers of DES) commented, "We sent the S-boxes off to Washington. They came back and were all different." The United States Senate Select Committee on Intelligence reviewed the NSA's actions to determine whether there had been any improper involvement. In the unclassified summary of their findings, published in 1978, the Committee wrote: In the development of DES, NSA convinced IBM that

6834-475: The early 1930s. This equipment was critical to Nazi efforts to categorize citizens of both Germany and other nations that fell under Nazi control through ongoing censuses. These census data were used to facilitate the round-up of Jews and other targeted groups, and to catalog their movements through the machinery of the Holocaust , including internment in the concentration camps. Nazi concentration camps operated

6936-553: The end of 2017, as CEO of Kyndryl. In 2021, IBM announced the acquisition of the enterprise software company Turbonomic for $ 1.5 billion. In January 2022, IBM announced it would sell Watson Health to private equity firm Francisco Partners . On March 7, 2022, a few days after the start of the Russian invasion of Ukraine , IBM CEO Arvind Krishna published a Ukrainian flag and announced that "we have suspended all business in Russia". All Russian articles were also removed from

7038-445: The enterprise-oriented Personal Systems Group of the IBM PC Co. into IBM's own Global Services personal computer consulting and customer service division. The resulting merged business units then became known simply as IBM Personal Systems Group. A year later, IBM stopped selling their computers at retail outlets after their market share in this sector had fallen considerably behind competitors Compaq and Dell . Immediately afterwards,

7140-492: The first time to upgrade to models with greater computing capability without having to rewrite their applications. It was followed by the IBM System/370 in 1970. Together the 360 and 370 made the IBM mainframe the dominant mainframe computer and the dominant computing platform in the industry throughout this period and into the early 1980s. They and the operating systems that ran on them such as OS/VS1 and MVS , and

7242-541: The following year two open workshops were held to discuss the proposed standard. There was criticism received from public-key cryptography pioneers Martin Hellman and Whitfield Diffie , citing a shortened key length and the mysterious " S-boxes " as evidence of improper interference from the NSA. The suspicion was that the algorithm had been covertly weakened by the intelligence agency so that they—but no one else—could easily read encrypted messages. Alan Konheim (one of

7344-459: The full version retains. Differential-linear cryptanalysis was proposed by Langford and Hellman in 1994, and combines differential and linear cryptanalysis into a single attack. An enhanced version of the attack can break 9-round DES with 2 chosen plaintexts and has a 2 time complexity (Biham and others, 2002). DES exhibits the complementation property, namely that where x ¯ {\displaystyle {\overline {x}}}

7446-686: The larger ones. In New York City, IBM has several offices besides CHQ, including the IBM Watson headquarters at Astor Place in Manhattan. Outside of New York, major campuses in the United States include Austin, Texas ; Research Triangle Park (Raleigh-Durham), North Carolina ; Rochester, Minnesota ; and Silicon Valley, California . IBM's real estate holdings are varied and globally diverse. Towers occupied by IBM include 1250 René-Lévesque (Montreal, Canada) and One Atlantic Center (Atlanta, Georgia, US). In Beijing, China, IBM occupies Pangu Plaza ,

7548-570: The late 19th century. Julius E. Pitrap patented the computing scale in 1885; Alexander Dey invented the dial recorder (1888); Herman Hollerith patented the Electric Tabulating Machine (1889); and Willard Bundy invented a time clock to record workers' arrival and departure times on a paper tape (1889). On June 16, 1911, their four companies were amalgamated in New York State by Charles Ranlett Flint forming

7650-451: The latest being the IBM z series. The most recent model, the IBM z16 , was released in 2022. In 1990, IBM released the Power microprocessors , which were designed into many console gaming systems, including Xbox 360 , PlayStation 3 , and Nintendo 's Wii U . IBM Secure Blue is encryption hardware that can be built into microprocessors, and in 2014, the company revealed TrueNorth ,

7752-617: The latter prescribing " Triple DES " (see below). On 26 May 2002, DES was finally superseded by the Advanced Encryption Standard (AES), following a public competition . On 19 May 2005, FIPS 46-3 was officially withdrawn, but NIST has approved Triple DES through the year 2030 for sensitive government information. The algorithm is also specified in ANSI X3.92 (Today X3 is known as INCITS and ANSI X3.92 as ANSI INCITS 92), NIST SP 800-67 and ISO/IEC 18033-3 (as

7854-451: The left half, and 24 from the right. The rotations (denoted by "<<<" in the diagram) mean that a different set of bits is used in each subkey; each bit is used in approximately 14 out of the 16 subkeys. The key schedule for decryption is similar—the subkeys are in reverse order compared to encryption. Apart from that change, the process is the same as for encryption. The same 28 bits are passed to all rotation boxes. Pseudocode for

7956-425: The longer term. The key trends of IBM are (as at the financial year ending December 31): The company's 15-member board of directors are responsible for overall corporate management and includes the current or former CEOs of Anthem , Dow Chemical , Johnson and Johnson , Royal Dutch Shell , UPS , and Vanguard as well as the president of Cornell University and a retired U.S. Navy admiral . Vanguard Group

8058-500: The machine applicable to other code breaking tasks as well. One of the more interesting aspects of COPACOBANA is its cost factor. One machine can be built for approximately $ 10,000. The cost decrease by roughly a factor of 25 over the EFF machine is an example of the continuous improvement of digital hardware —see Moore's law . Adjusting for inflation over 8 years yields an even higher improvement of about 30x. Since 2007, SciEngines GmbH ,

8160-585: The mid-1950s. There are two other IBM buildings within walking distance of CHQ: the North Castle office, which previously served as IBM's headquarters; and the Louis V. Gerstner, Jr., Center for Learning (formerly known as IBM Learning Center (ILC)), a resort hotel and training center, which has 182 guest rooms, 31 meeting rooms, and various amenities. IBM operates in 174 countries as of 2016 , with mobility centers in smaller market areas and major campuses in

8262-613: The middleware built on top of those such as the CICS transaction processing monitor, had a near-monopoly-level market share and became the thing IBM was most known for during this period. In 1969, the United States of America alleged that IBM violated the Sherman Antitrust Act by monopolizing or attempting to monopolize the general-purpose electronic digital computer system market, specifically computers designed primarily for business, and subsequently alleged that IBM violated

8364-450: The most powerful in the world in the 21st century. As one of the world's oldest and largest technology companies, IBM has been responsible for several technological innovations , including the automated teller machine (ATM), dynamic random-access memory (DRAM), the floppy disk , the hard disk drive , the magnetic stripe card , the relational database , the SQL programming language , and

8466-442: The other, K 2 {\displaystyle K_{2}} : It is easy enough to avoid the weak and semiweak keys in an implementation, either by testing for them explicitly, or simply by choosing keys randomly; the odds of picking a weak or semiweak key by chance are negligible. The keys are not really any weaker than any other keys anyway, as they do not give an attack any advantage. DES has also been proved not to be

8568-400: The parent company of Sesame Street , and Salesforce.com . In 2015, its chip division transitioned to a fabless model with semiconductors design, offloading manufacturing to GlobalFoundries . In 2015, IBM announced three major acquisitions: Merge Healthcare for $ 1 billion, data storage vendor Cleversafe , and all digital assets from The Weather Company , including Weather.com and

8670-497: The period 1973–1974 based on an earlier algorithm, Horst Feistel 's Lucifer cipher. The team at IBM involved in cipher design and analysis included Feistel, Walter Tuchman , Don Coppersmith , Alan Konheim, Carl Meyer, Mike Matyas, Roy Adler , Edna Grossman , Bill Notz, Lynn Smith, and Bryant Tuckerman . On 17 March 1975, the proposed DES was published in the Federal Register . Public comments were requested, and in

8772-404: The relatively slow operation of DES in software motivated researchers to propose a variety of alternative block cipher designs, which started to appear in the late 1980s and early 1990s: examples include RC5 , Blowfish , IDEA , NewDES , SAFER , CAST5 and FEAL . Most of these designs kept the 64-bit block size of DES, and could act as a "drop-in" replacement, although they typically used

8874-621: The security, because repeated encryption (and decryptions) under different keys would be equivalent to encryption under another, single key. Simplified DES (SDES) was designed for educational purposes only, to help students learn about modern cryptanalytic techniques. SDES has similar structure and properties to DES, but has been simplified to make it much easier to perform encryption and decryption by hand with pencil and paper. Some people feel that learning SDES gives insight into DES and other block ciphers, and insight into various cryptanalytic attacks against them. Concerns about security and

8976-435: The so-called "Atalla Box" which was commercialized in 1973. It protected offline devices with a secure PIN generating key, and was a commercial success. Banks and credit card companies were fearful that Atalla would dominate the market, which spurred the development of an international encryption standard. Atalla was an early competitor to IBM in the banking market, and was cited as an influence by IBM employees who worked on

9078-462: The subkeys. Initially, 56 bits of the key are selected from the initial 64 by Permuted Choice 1 ( PC-1 )—the remaining eight bits are either discarded or used as parity check bits. The 56 bits are then divided into two 28-bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 subkey bits are selected by Permuted Choice 2 ( PC-2 )—24 bits from

9180-414: The technique in the 1970s. This was indeed the case; in 1994, Don Coppersmith published some of the original design criteria for the S-boxes. According to Steven Levy , IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret. Coppersmith explains IBM's secrecy decision by saying, "that was because [differential cryptanalysis] can be

9282-543: The time the biggest in American corporate history. Lou Gerstner was hired as CEO from RJR Nabisco to turn the company around. In 1995, IBM purchased Lotus Software , best known for its Lotus 1-2-3 spreadsheet software. During the decade, IBM was working on a new operating system, named the Workplace OS project. Despite a large amount of money spent on the project, it was cancelled in 1996. In 1998, IBM merged

9384-608: The vacuum tube based IBM 701 , in 1952. The IBM 305 RAMAC introduced the hard disk drive in 1956. The company switched to transistorized designs with the 7000 and 1400 series, beginning in 1958. In which, IBM considered the 1400 series the ''model T'' of computing, due to it being the first computer with over ten thousand sales by IBM. In 1956, the company demonstrated the first practical example of artificial intelligence when Arthur L. Samuel of IBM's Poughkeepsie , New York, laboratory programmed an IBM 704 not merely to play checkers but "learn" from its own experience. In 1957,

9486-528: The work for a brute-force attack could be reduced by a factor of 2 (or a single bit) under a chosen-plaintext assumption. By definition, this property also applies to TDES cipher. DES also has four so-called weak keys . Encryption ( E ) and decryption ( D ) under a weak key have the same effect (see involution ): There are also six pairs of semi-weak keys . Encryption with one of the pair of semiweak keys, K 1 {\displaystyle K_{1}} , operates identically to decryption with

9588-488: Was acquired by Clayton & Dubilier in a leveraged buyout shortly after its formation. In September 1992, IBM completed the spin-off of their various non-mainframe and non-midrange, personal computer manufacturing divisions, combining them into an autonomous wholly owned subsidiary known as the IBM Personal Computer Company (IBM PC Co.). This corporate restructuring came after IBM reported

9690-400: Was completely out of IBM. IBM is headquartered in Armonk, New York , a community 37 miles (60 km) north of Midtown Manhattan. A nickname for the company is the " Colossus of Armonk ". Its principal building, referred to as CHQ, is a 283,000-square-foot (26,300 m ) glass and stone edifice on a 25-acre (10 ha) parcel amid a 432-acre former apple orchard the company purchased in

9792-400: Was exhibited on Jeopardy! where it won against game-show champions Ken Jennings and Brad Rutter. The company also celebrated its 100th anniversary in the same year on June 16. In 2012, IBM announced it had agreed to buy Kenexa and Texas Memory Systems, and a year later it also acquired SoftLayer Technologies, a web hosting service , in a deal worth around $ 2 billion. Also that year,

9894-640: Was originally part of the joint venture and was sold by LG in 2012. Continuing a trend started in the 1990s of downsizing its operations and divesting from commodity production , IBM sold all of its personal computer business to Chinese technology company Lenovo and, in 2009, it acquired software company SPSS Inc. Later in 2009, IBM's Blue Gene supercomputing program was awarded the National Medal of Technology and Innovation by U.S. President Barack Obama . In 2011, IBM gained worldwide attention for its artificial intelligence program Watson , which

9996-507: Was recognized with the 1990 Honor Award from the National Building Museum . IBM has a large and diverse portfolio of products and services. As of 2016 , these offerings fall into the categories of cloud computing , artificial intelligence, commerce , data and analytics , Internet of things (IoT), IT infrastructure , mobile , digital workplace and cybersecurity . Since 1954, IBM sells mainframe computers ,

10098-596: Was the COPACOBANA machine built in 2006 by teams of the Universities of Bochum and Kiel , both in Germany . Unlike the EFF machine, COPACOBANA consists of commercially available, reconfigurable integrated circuits. 120 of these field-programmable gate arrays (FPGAs) of type XILINX Spartan-3 1000 run in parallel. They are grouped in 20 DIMM modules, each containing 6 FPGAs. The use of reconfigurable hardware makes

10200-438: Was to show that DES was breakable in practice as well as in theory: " There are many people who will not believe a truth until they can see it with their own eyes. Showing them a physical machine that can crack DES in a few days is the only way to convince some people that they really cannot trust their security to DES. " The machine brute-forced a key in a little more than 2 days' worth of searching. The next confirmed DES cracker

10302-480: Was valued at over $ 153 billion as of May 2024. Despite its relative decline within the technology sector, IBM remains the seventh largest technology company by revenue, and 67th largest overall company by revenue in the United States . IBM ranked No. 38 on the 2020 Fortune 500 rankings of the largest United States corporations by total revenue. In 2014, IBM was accused of using "financial engineering" to hit its quarterly earnings targets rather than investing for

10404-499: Was working on a modification to Lucifer for general use. NSA gave Tuchman a clearance and brought him in to work jointly with the Agency on his Lucifer modification." and NSA worked closely with IBM to strengthen the algorithm against all except brute-force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on

#798201