What is AES encryption?

Advanced Encryption Standard (AES) is a symmetrical cipher technique that is used to secure and encrypt operating systems, hard drives, network systems, files, e-mails and other similar data. In cryptography, AE consists of three block ciphers taken from a larger collection published originally as Rijndael. Each cipher has a 128 -bit block size with three different keys of 128, 192 and 256 bits. There are a few steps of processing with one wheel for each round that rely solely on the encryption key. Then a set of reverse wheels is used to convert the cipher text back to the simple text. AES encryption uses only one 128 -bit key to encrypt and decrypt data. Joan Daemen and Vincent Rijmen worked on creating Rijndael Ciphers. They handed over their cipher to the AES selection process from which Rijndael was selected. In November 2001, AES was selected by NIST as the standard of federal information processing (FIPS), also known as FIPS197. In July 2003 Natio agencyNal Security Agency (NSA) said AES was safe enough to protect its information at secret and secret levels.

Encryption

AES is used worldwide to ensure some of the most protected systems for government groups and business. AES encryption is even used by individuals to protect private computers and network systems. Now it is the standard set by the US government and individuals around the world.

One of the reasons why AES Encryption works so well that it works on multiple network layers simultaneously. Although AES and Rijndel are used interchangeably, there are some differences that should be recorded. While AES uses a fixed 128 -bit block cipher and three sizes of 128, 192 and 256 bits, Rijndael can be used with any cipher block and 32 bits of multiples. Rijndael ranges from 128-bits to 256 bits for its key and block size of the cipher.

While AES encryption is not unbreakable, it is generally considered to be highly safe. Until 2009, it was believed that only the attack on the side channels could pass through the AES protected system. In 2009, related key attacks and known key attacks were reported. Some attacks on AES systems are difficult to complete; For example, attacks usually require the user to be in the same system as AES encryption software that breaks the cipher.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?