According to wikipedia…
DES is now considered to be insecure for many applications
However, since it can be broken relatively easy, should it not just be avoided for all applications?
According to wikipedia…
DES is now considered to be insecure for many applications
However, since it can be broken relatively easy, should it not just be avoided for all applications?
Yes. DES is no longer considered an approved algorithm by NIST, and breaking a 56-bit key can be done quickly - in 1998 the EFF DES Cracker managed to break a DES key in 56 hours. The average time it required to break any DES key was 4½ days. You could use triple DES instead, which is still considered secure, but it's very slow (in software, even single DES is slower than AES), and a time-memory tradeoff described by Martin Hellman in 1980 shows how to break 3DES with a 168 bit key in $2^{112}$ time. In addition the 64 bit block size is a major practical problem if using 3DES in some modes, as described by Thomas in his answer.
"Considered insecure" does not mean "easily broken". Note that there is a terminology issue: there is a thing called "Triple-DES" or "3DES" which is, as far as the standard (FIPS 46-3) was putting it (until it was withdrawn), just a kind of DES.
The original DES, with its 56-bit key (namely 64 bits with 8 bits ignored), can be broken with not-so-expensive hardware -- but that's still beyond what someone can do with a single PC in a few weeks. 3DES has an effective 168-bit key, and although there is a theoretical attack with CPU cost $2^{112}$ (and space $2^{59}$ bytes), 3DES is still, in practice, quite robust.
The main security defect of 3DES is that it uses 64-bit blocks, which is a bit short; with usual encryption modes such as CBC or CTR, you could run into trouble after about $2^{32}$ blocks, i.e. 32 gigabytes -- which is not that huge with regards to current technology.
The main practical defect of 3DES is that it is darn slow in software.
So you should not use 3DES in new applications, unless mandated by an unavoidable backward compatibility requirement. AES has been designed to be better, both for security and performance, and has been heavily scrutinized for a dozen years now, so AES is the recommended block cipher. There is no need to hurry towards patching existing applications which use 3DES, though.
(For that matter, 3DES is less a worry than SHA-1.)
Yes, DES is considered too weak to use.
NIST publishes recommendations of what encryption schemes are "allowed". Civilian government agencies, and most companies, follow NIST guidelines for security. NIST Pub 800-131A has the list of approved encryption and hashing standards.
Only 3-key "triple DES" is still considered acceptable (see page 3 of 800-131A).
Yes. See the other answers, but also note the risk issue. straight 56-bit DES is relatively easy to crack now, so the probability of a crack is greater; the marginal cost of using stronger encryptions, in hardware and computation, is near zero. Thus we can conclude with some rigor that DES is no longer a good choice.