10 Facts About AES encryption


AES encryption is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES encryption selection process.

FactSnippet No. 1,252,556

The algorithm described by AES encryption is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

FactSnippet No. 1,252,557

AES encryption is based on a design principle known as a substitution–permutation network, and is efficient in both software and hardware.

FactSnippet No. 1,252,558

AES encryption operates on a 4 × 4 column-major order array of 16 bytes termed the state:.

FactSnippet No. 1,252,559

Key size used for an AES encryption cipher specifies the number of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext.

FactSnippet No. 1,252,560

Related searches


AES encryption has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys.

FactSnippet No. 1,252,561

The largest successful publicly known brute-force attack against a widely implemented block-cipher AES encryption algorithm was against a 64-bit RC5 key by distributed.

FactSnippet No. 1,252,562

Until May 2009, the only successful published attacks against the full AES encryption were side-channel attacks on some specific implementations.

FactSnippet No. 1,252,563

In October 2005, Dag Arne Osvik, Adi Shamir and Eran Tromer presented a paper demonstrating several cache-timing attacks against the implementations in AES found in OpenSSL and Linux's dm-crypt partition encryption function.

FactSnippet No. 1,252,564

Many modern CPUs have built-in hardware instructions for AES encryption, which protect against timing-related side-channel attacks.

FactSnippet No. 1,252,565