AES and DES are both examples of symmetric block ciphers but have certain dissimilarities.
|AES stands for Advanced Encryption Standard||DES stands for Data Encryption Standard|
|Date of creation is 1999.||Date of creation is 1976.|
|Key length can be of 128-bits, 192-bits and 256-bits.||Key length is 56 bits in DES.|
|Number of rounds depends on key length : 10(128-bits), 12(192-bits) or 14(256-bits)||DES involves 16 rounds of identical operations|
|The structure is based on substitution-permutation network.||The structure is based in feistal network.|
|The design rational for AES is open.||The design rational for AES is closed.|
|The selection process for this is secret but accepted open public comment.||The selection process for this is secret.|
|AES is more secure than the DES cipher and is the de facto world standard.||DES can be broken easily as it has known vulnerabilities. 3DES(Triple DES) is a variation of DES which is secure than the usual DES.|
|The rounds in AES are : Byte Substitution, Shift Row, Mix Column and Key Addition||The rounds in DES are : Expansion, XOR operation with round key, Substitution and Permutation|
|AES can encrypt 128 bits of plaintext.||DES can encrypt 64 bits of plaintext.|
|AES cipher is derived from square cipher.||DES cipher is derived from Lucifer cipher.|
|AES was designed by Vincent Rijmen and Joan Daemen.||DES was designed by IBM.|
|No known crypt-analytical attacks against AES but side channel attacks against AES implementations possible. Biclique attack have better complexity than brute-force but still ineffective.||Known attacks against DES include : Brute-force, Linear crypt-analysis and Differential crypt-analysis.|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Double DES and Triple DES
- Data encryption standard (DES) | Set 1
- Strength of Data encryption standard (DES)
- Traditional Symmetric Ciphers
- Autokey Cipher | Symmetric Ciphers
- Stream Ciphers
- Difference between Stop and Wait, GoBackN and Selective Repeat
- Difference between Stop and Wait protocol and Sliding Window protocol
- Similarities and Difference between Java and C++
- Difference between Yaacomo and and XAP
- Difference between VoIP and and POTS
- Difference and Similarities between PHP and C
- Difference between Time Tracking and Time and Attendance Software
- Difference Between Single and Double Quotes in Shell Script and Linux
- Difference between ++*p, *p++ and *++p
- Difference Between DOS and Windows
- Difference between User Level thread and Kernel Level thread
- What’s difference between The Internet and The Web ?
- Difference between Priority Inversion and Priority Inheritance
- What’s difference between Linux and Android ?
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.
Improved By : itskawal2000