Choose Index below for a list of all words and phrases defined in this glossary.


Advanced Encryption Standard (AES) Algorithm

index | Index

Advanced Encryption Standard (AES) Algorithm - definitions

AES algorithm - AES (Advanced Encryption Standard) is a cryptographic algorithm.   It is a symmetric algorithm (in other words it uses the same key for encryption and decryption).   AES, originally called Rijndael, was selected through a public competition to be approved for protecting (encrypting) information for all industry and commerce by the US National Institute for Science and Technology (NIST).   It has been subjected to considerable scrutiny by government scientists and academics to check that it has no obvious weaknesses, and is considered to be the strongest protection of its type currently available.   The AES algorithm is used in all of ArticSoft products.   See also symmetric algorithm and algorithm.

[Category=Data Security ]

Source: Arctic Soft, 05 August 2011 09:32:45, http://www.articsoft.com/it_security.htm External


These advertisers support this free service


AES - The Advanced Encryption Standard (AES) was introduced in 2000 after a long search by NIST for an encryption standard that would be hard to break, inexpensive to use, easy to implement and would work on both hardware and software.

One of the two important factors that make an encryption standard hard to break is the encryption process (encryption algorithm). Theories can't accurately predict how easy it will be to break a particular algorithm, so NIST published a few contenders and experts all over the world tried to break them.

The second factor in making an encryption standard hard to break, especially a standard based on symmetric key cryptography, or a shared secret, is the key length. In general, the longer the key, the harder it is to figure it out by just trying random strings of characters. The AES can use a key length of 128, 192 or 256 bits.

The algorithm to be chosen also had to be made available to the public without royalty fees. After years of testing and multiple comment cycles, the Rijndael algorithm, written by two Belgium cryptographers, was adopted as the AES and was published as FIPS 192.

There is an inherent weakness in a symmetric key process because the key has to be transferred from the sender to the receiver as well as the encrypted text. Frequently, AES is used as part of a set of encryption tools where an asymmetric encryption method is used to transfer the key.

[Category=Data Security ]

Source: RSA, 09 August 2011 09:59:28, http://www.rsa.com/glossary/ External


Data Quality Glossary.  A free resource from GRC Data Intelligence. For comments, questions or feedback: dqglossary@grcdi.nl