The DES algorithm is widely used in the present. It is utilized in the encryption of data transmission, storage and authentication. Although it was created in the 1970s and has served as the foundation for many modern encryption algorithms and is regarded as safe enough to protect credit card transactions and banking transactions.
When using DES encryption the process starts by transforming the 64-bit plaintext by using a series of steps beginning with the initial permutation, and then rounds of operations. The final permutation takes place. Each step alters the bits in various ways to create a degree of confusion and spread that makes it more difficult for hackers to break the encryption.
In the first step, a process called Initial Permutation or IP alters the bits of the block into two permuted halves that are known as Left Plain Text (LPT) and Right Plain Text (RPT). This step alters the original plain text of 64 bits, making it harder to crack.
The RPT and LPT will then be combined and then run through 16 rounds DES operations. The resultant 64-bit ciphertext is then subjected to final permutation that is similar to the original process but reversed.
This makes it extremely difficult to break the cipher. It is also much faster in hardware than in software, and this speed is a major benefit for certain applications in which the encryption has to be performed in real-time. Although theoretical attacks have been developed using DES the most practical method was a bruteforce attack that required huge computing power and took a long time to complete.