Plan to Migrate to Advanced Encryption Standard
16 November 2001
Vic Wheatman   John Pescatore
 
Once considered invulnerable, the Data Encryption Standard that secures many banking and e-commerce transactions has been cracked. Enterprises should switch to the Advanced Encryption Standard when feasible.

 News
Note Number:  FT-14-9343
Related Terms:  Security Standards; Security Strategies; Encryption
Download:  PDF 

Plan to Migrate to Advanced Encryption Standard

Once considered invulnerable, the Data Encryption Standard that secures many banking and e-commerce transactions has been cracked. Enterprises should switch to the Advanced Encryption Standard when feasible.


Event

On 8 November 2001, Cambridge University announced that two of its researchers had uncovered a weakness in the security systems that protect many banking and e-commerce transactions. Michael Bond and Richard Clayton, two Ph.D. students at the University of Cambridge's Computer Laboratory, hacked into a Data Encryption Standard (DES)-protected IBM computer system previously thought secure.


First Take

DES-protected ciphertext has been broken before. DES has become susceptible to brute-force attacks by networks of code-cracking computers, a fact punctuated by Bond's and Clayton's successful hack on a "secure" IBM cryptoprocessor. Accordingly, Gartner believes that DES has reached the end of its life, and a strong candidate for its replacement has already appeared: the new Advanced Encryption Standard (AES), also known as Rijndael. The U.S. Department of Commerce — specifically, the National Institute of Standards and Technology (NIST) — selected AES to protect electronic information and to officially replace the government-endorsed DES, which the government adopted in 1977.

Gartner believes that AES will eventually become the preferred symmetric data encryption standard for most private enterprises. According to estimates, code-cracking computers would have to work 149 trillion years to decipher an AES encryption key. Under the rules of NIST's selection, the algorithm carries no royalties; however, software implemented using cryptographic toolkits may require per-seat or negotiated fees. Although NIST says that other considered algorithms such as Mars, RC6, Serpent or Twofish might be more efficient than AES in some applications or implementations, Gartner expects AES to become the most widely used algorithm because of the NIST's endorsement of it as the "standard."

Despite its vulnerability, AES will likely not replace more than 30 percent of DES operations before 2004 due to inertia (0.7 probability). Enterprises using DES should plan on migrating to AES as soon as feasible. However, those using the stronger Triple DES (3DES) standard should wait until system upgrades permit a low-cost AES implementation unless they face unacceptable system sluggishness because of the performance characteristics of 3DES.

Analytical Sources: Vic Wheatman and John Pescatore, Information Security Strategies

Written by Dean Lombardo, gartner.com

Need to Know: Reference Material and Recommended Reading

  • "Host Encryption Options" (T-13-7356) Message encryption tools have become more important as e-business requires secure communications. By William Malik and Vic Wheatman
  • "Examining the World of Cryptographic Algorithms" (E-12-4460) In October 2000, a more-advanced encryption standard than DES was promoted. By Vic Wheatman

(You may need to sign in or be a Gartner client to access all of this content.)