DES (Data Encryption Standard) is a 56-bit block cipher standardised in 1977. It is cryptographically broken — a 56-bit key can be brute-forced in hours with modern hardware. 3DES (Triple DES) applies DES three times with two or three keys, providing 112 bits of effective security — stronger but significantly slower and still being phased out in favour of AES. This tool is provided for legacy system testing and academic purposes only.
DES was deprecated by NIST in 2005. 3DES is being disallowed for new applications and is in end-of-support status (NIST SP 800-131A). If you need symmetric encryption for a new system, use AES-128 or AES-256. DES and 3DES remain relevant only for interoperating with legacy systems (EMV payment terminals, certain banking mainframes) that have not yet been upgraded.
No. DES is cryptographically broken — its 56-bit key can be exhaustively searched in under 24 hours on dedicated hardware (the EFF DES Cracker demonstrated this in 1998). Use AES for any new encryption requirement.
ECB (Electronic Codebook) encrypts each 64-bit block independently. Identical plaintext blocks produce identical ciphertext blocks, revealing patterns in the data. CBC (Cipher Block Chaining) XORs each plaintext block with the previous ciphertext block before encrypting, eliminating this pattern — CBC is the minimum acceptable mode.
With two independent keys (2-key 3DES), effective security is 112 bits. With three independent keys (3-key 3DES), it is nominally 168 bits but meet-in-the-middle attacks reduce effective security to about 112 bits either way.
AES (Advanced Encryption Standard), standardised by NIST in 2001 after a competition. AES uses 128-bit blocks and supports 128, 192, or 256-bit keys. It is the standard symmetric cipher for essentially all modern applications.
See also the AES Cipher, Caesar Cipher, and the All Hashes tool.
📖 Reference: NIST Special Publication 800-67 — DES Encryption