Difference between AES and DES

Difference between AES and DES in Tabular Form

Data Encryption Standard becomes known as a common standard used for encryption of data around the world and forms secret key cryptography that only has one key for the use of decryption. Advanced Encryption Standard becomes known as an exceptional standard employed around the world by the government of the United States to safeguard its secrets.

Comparison Chart

AES stands for Advanced Encryption Standard DES stands for Data Encryption Standard.
AES allows the data length (plain text size) of 128, 192 and 256 bits. Data encryption standard takes 64-bit plaintext as a input and creates 64-bit Ciphertext i.e. it encrypts data in a block of size 64-bits per block.
AES divide plaintext into 16 bytes (128-bit) blocks and treats each block as a 4×4 State array and supporting three different key lengths, 128, 192. and 256 bits. In DES plaintext message is divided into size 64-bit block each and encrypted using 56-bit key at the initial level.
The number of rounds are 10, is for the case when the encryption key is 128 bit long. (As mentioned earlier, the number of rounds is 12 when the key is 192 bits and 14 when the key is 256.) The left plaintext and right plaintext goes through 16 rounds of encryption process along with 16 different keys for each round.
AES was designed by Vincent Rijmen and Joan Daemen. DES was designed by IBM.
AES is faster. DES is comparatively slower.
AES has large secret key comparatively hence, more secure. DES has a smaller key which is less secure.
Subbytes, Shiftrows, Mix columns, Addroundkeys. Expansion Permutation, Xor, S-box, P-box, Xor, and Swap.
10 rounds for 128-bit algorithm
12 rounds for 192-bit algorithm
14 rounds for 256-bit algorithm
16 rounds

Related Differences:

  1. Difference Between Stream Cipher and Block Cipher
  2. Difference Between Monoalphabetic Cipher and Polyalphabetic Cipher
  3. Difference Between Confusion and Diffusion 
  4. Difference Between Symmetric and Asymmetric Encryption
  5. Difference Between Linear and Differential Cryptanalysis


Please enter your comment!
Please enter your name here