We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is the International Data Encryption Algorithm?

By Troy Holmes
Updated May 17, 2024
Our promise to you
WiseGeek is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGeek, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject-matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Computerized cryptography has been used for decades as a method of creating secret ciphered messages from plain-text data. Over the last few decades many new encryption algorithms have been created. The international data encryption algorithm (IDEA™) is an example of an encryption algorithm that ciphers plan-text data into a set of scrambled characters. It was created in 1991 by James Massey and Xuejia Lai from Switzerland as a form of data encryption. The inventors had hoped it could replace the standard encryption at that time, which was the data encryption standard (DES).

In 1976 the United States government created encryption standards for all federal government entities. The standard at that time was named the data encryption standard (DES). These standards are managed by the National Institute of Technology and Standards (NIST). When DES was released, there were many critiques to the approach because the encryption algorithm was easily broken by many computer scientists. This was primarily because the encryption key used in the standards of DES was too small, which limited the permutations for keys and reduced the complexity of the algorithm.

In 2001, NIST upgraded the standards to the advanced encryption standard (AES). The new standard supported a more complex encryption algorithm that contained a large 256-bit key. This new approach has made current encryption algorithms impossible to hack. The international data encryption algorithm was created before AES, as an interim approach to data encryption. The current IDEA™ algorithm has also evolved to support the newer standards of AES.

The international data encryption algorithm is widely used by many software applications and is considered a good algorithm for data encryption. It uses a symmetric encryption algorithm, which uses a single key for encryption and deciphering data. The standards of IDEA™ support advanced encryption keys up to 128-bits in length.

Pretty good privacy (PGP) is an encryption algorithm that is used in many email encryption protocols. This is typically considered a good approach for encrypting emails because it supports advanced encryption keys. Many PGP algorithms use the international data encryption algorithm as the internal method for encrypting the message. OpenPGP is an open-source version of PGP, which has adopted IDEA™ as an optional algorithm.

Data encryption algorithms are not limited to plain-text data. Most encryption algorithms support plain-text data, sound and video encryption. All forms of data can be encrypted with the international data encryption algorithm. Currently, IDEA™ has a patent that restricts its use to non-commercial enterprises.

WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
By nony — On Dec 26, 2011

@MrMoody - Yeah, I think that 256 bit encryption with AES is the new standard now. The government uses that kind of encryption now, and it’s impossible to hack, at least not in the next hundred years or so from what I understand.

I don’t know what the government’s position is about independent software vendors. Do software developers have to provide government entities the key to the software if requested?

I would think that at the very minimum, software developers need to cooperate with government officials if asked for the key to the software applications – or simply give a fully functional version of the product as needed.

By MrMoody — On Dec 25, 2011

I remember the early days of the Internet. Email messages were encrypted with PGP – one of the most popular data encryption methods out there at the time.

The reason I remember it is that the government had stiff warnings for people who were using PGP. Specifically, they said something like these messages (or software applications) which used these applications could not be exported overseas.

The government was concerned that the software could get into the wrong hands. They were worried because PGP was so good at the time that it was virtually impossible to hack. I don’t see those warnings anymore; I think the government has gotten better at encryption of its own.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.