Data Encryption Standard (DES) and Issues of DES and its Replacement

Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, , language: English, abstract: This report will select one of the obsolete cryptographic algorithms, analyse it, discuss one of its vulnerabilities, and suggest a modern algorithm to address this weakness. The business Management system (BMS) is a powerful management tool that helps an organisation¿s management build, create, control, and monitor business activities. Currently, it evolved and has become the backbone of strategic planning and everyday business operations. BMS has the technical infrastructure, such as access control, to protect information from unauthorised access. Still, it can not be used alone to preserve the confidentiality and integrity of information handled against different challenges such as secure system development and maintenance, operation and physical security and compliance with regulations. Cryptography plays an essential role in protecting datäs confidentiality and integrity, which might be hosted within the companies¿ premises or outsourced to a cloud service. Furthermore, cryptography protect information processed and transmitted within a communication medium. BMS incorporates many algorithms that serve this purpose; however, some of them are legacy or obsolete, such as RC2, RC4, DES, 3DES, MD2, MD4, MD5, SHA-1, and no longer recommended to be used because they are proved to be vulnerable.