StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Advanced Encryption Standard - Admission/Application Essay Example

Cite this document
Summary
Instructor Date ADVANCED ENCRYPTION STANDARD (AES) As DES became less and less secure, there was a need of another Encryption standard which could withstand brute force attacks at least up to the value of the secret to be encrypted. This value is the cost of the secret in money or the time it is useful…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
The Advanced Encryption Standard
Read Text Preview

Extract of sample "The Advanced Encryption Standard"

Download file to see previous pages

In 2001, NIST made AES the Federal Information Processing Standard, FIPS, for the United States federal government (Pachori et al, 967). AES is actually a variant of Rijndael cipher where there is a fixed block range of 128 bits and the keys for the AES vary from 128, 192 to 256 bits. AES is usually known by the key size that is used in its package, i.e., AES-128 or AES-256. Contrary to the AES, Rijndael cipher is any block or any key size that is in multiples of 32 bits (Paar & Pelzl, 2010).

AES encryption requires the data being flattened into a 4 x 4 column-major order matrix and it has a special finite field in which the calculation is done. The design principle used for the AES is the substitution-permutation network which is several times faster than the Feistal network used by the DES.The transformation of the input data is done in a number of cycles called the repetition. These repetitions are a specified number for the type of the key size that is being use to convert the data from the input text called the plaintext to the output text called the ciphertext.

The cycles of repetitions for the key sizes 128, 192 and 256 are 10, 12 and 14 respectively. Each cycle contains several steps in which the one of the stage is actually dependent on the encryption key itself due to which only the key can be used to decrypt the cipher text. All these steps are applied in reverse in order to transform the ciphertext back into plaintext (Martin, 126). AES, however simplistic in its description, is a very strong encryption standard which actually enables the general populace along with many companies that specialize in the security services to use it for data protection.

Strength of AES lies in the size of the encryption key as opposed to the design that is used for the encryption. So security of the key is a must because if the key is somehow retrievable via hacking, the whole process of the encryption is actually worthless to the cause. So its strength is primarily valuated on the time it would take a brute force attack to find the encryption key out of the possible combinations. The longer the key that is used to encrypt the plaintext, exponentially longer is the time required to crack the key used in the encryption.

The possible combinations for a DES key of 56-bit are 7.2 x 10 power16, whereas the possible combinations for the minimum AES key of 128-bit are 3.4 x 10 power38. Fastest supercomputer in the world NUDT Tianhe-2 in China would take mere seconds to break a DES whereas the AES with 128 bit could take around a billion years whereas the age of the universe it is only 13.75 billion years. Following this we can say with utmost certainty that the AES is unbreakable for the current supercomputer and it would be a very long into the future before a computer fast enough to break evena 128 bits key AES could be made.

Many attacks are launched on AES encrypted data to find its weaknesses by many cryptographers since its conception in 2000. It started mainly due to the concerns of the cryptographers that the AES is too simplistic. Many attacks were designed of which the most successful attacks till date have only been able to retrieve the key faster by a factor of 4 which is still not anywhere near to breaking the full AES. Contrary to these direct attacks, side channel attacks are also used which do not actually attack

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Advanced Encryption Standard Admission/Application Essay”, n.d.)
The Advanced Encryption Standard Admission/Application Essay. Retrieved from https://studentshare.org/information-technology/1484948-the-advanced-encryption-standard
(The Advanced Encryption Standard Admission/Application Essay)
The Advanced Encryption Standard Admission/Application Essay. https://studentshare.org/information-technology/1484948-the-advanced-encryption-standard.
“The Advanced Encryption Standard Admission/Application Essay”, n.d. https://studentshare.org/information-technology/1484948-the-advanced-encryption-standard.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Advanced Encryption Standard

NSA Cyber Security Profile

NSA Cyber Profile Name Institute Instructor Course Date Recent information systems are sophisticated collections of technology, processes and people, working in unison to offer institutions with the potential to procedures, transmit, store data in a timely mode to support numerous missions and commercial functions....
3 Pages (750 words) Research Paper

Wireless Security Policy

A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves.... The connectivity links business enterprises, telecommunication networks and homes while avoiding the costly and labor intensive cabling infrastructures (NIST, 2003)....
5 Pages (1250 words) Assignment

Risk management

Risk Management [Course Supervisor] Risk Management Description In the contemporary society of advanced technology, networking has become an integral part of many businesses.... The facilities which are being attained through Internet and networking are considered to be sufficient in today's world....
10 Pages (2500 words) Assignment

Computer Security Information Risk Assessment & Security Management

In 1997, the NIST developed The Advanced Encryption Standard.... National Bureau of Standards developed an encryption standard known as the Data encryption standard.... To preserve their integrity and confidentiality, recourse is made to password protection, data encryption, firewalls, intrusion detection software, etc.... In the 1970's Horst Fiestel of IBM, developed an encryption system known as Lucifer.... In this scenario, data encryption algorithms of increasing complexity are ensuring the secure transmission of information across Computer Networks....
4 Pages (1000 words) Essay

Hash Algorithm and Secure Hash Algorithm

This paper ''Hash Algorithm and Secure Hash Algorithm'' tells that A hash function is a reproducible method of turning some kind of data into a (relatively) small number that may serve as a digital "fingerprint" of the data.... The algorithm "chops and mixes" (i.... .... substitutes or transposes) the data to create such fingerprints....
12 Pages (3000 words) Essay

Security in Computing

For The Advanced Encryption Standard (AES) it was an improvement of DES-based on security features, cost of operation, and the ease with which it could be implemented in computer software.... DES as a standard has been adopted by the National Bureau of Standards in the USA and it is applied in many software and hardware systems.... With reference to Shannon's cryptographic standards, DES of logical operations, and standard arithmetic on up to 64-bit numbers, it can be comfortably applied in more recent computers....
6 Pages (1500 words) Assignment

CERT Australia Network Threat Risk Assessment

… The paper “CERT Australia Network Threat Risk Assessment” is a great example of a case study on information technology.... This is a report on the possible cyber threats that CERT Australia is likely to experience on the launch of a new policy to the public.... CERT Australia works with other government agencies such as the Cyber Security Operations Centre to deliver its mandate....
14 Pages (3500 words) Case Study

Identity Theft and Networking Security

… The paper "Identity Theft and Networking Security" is a worthy example of a term paper on information technology.... nbsp;More people are using networks for banking, filing tax returns, and e-commerce that requires that any sensitive messages are secured during transit.... nbsp;The health sector greatly depends on electronic health records to record personal health data for different patients....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us