Introduction to the introduction | King of Symmetric Encryption Algorithm AES

The full name of AES is Advanced Encryption Standard, which is the most popular symmetric encryption algorithm. It can also be called encryption specification.

The basic principle of AES

AES is a symmetric encryption algorithm, which means that both encryption and decryption use the same key.

When AES is encrypted, the file is divided into small blocks for encryption. Each block is 128 bits, which is 16 bytes. If the file size is not an integer multiple of 16 bytes, then add some data at the end to make up enough. Each block is individually encrypted.

When encrypted, the AES algorithm has two inputs and one output. The input is the key and file content, and the output is ciphertext. When decrypting, the ciphertext and the key are input, and the output is the original text of the file.

The actual encryption and decryption process is divided into several steps, which are still more complicated, and it is not as simple as making the original text and the key an exclusive OR.

AES is very safe

The key length may be 128 bits or longer. Of course, the longer the key, the safer and slower the speed. AES was released in 1998, and no one has ever cracked AES encrypted data in history.

AES is very popular

AES is currently the most popular symmetric encryption algorithm, and none of them. It is so common that many CPUs support AES encryption and decryption at the hardware level.

AES is an encryption standard used by the US government, which means that government secret files are mostly encrypted with AES.

Https is the use of AES for data encryption because AES is part of the TLS and SSL standards.

to sum up

Finally, summarize it. AES is the most popular symmetric encryption algorithm in the world. It is very common for both US government files and HTTPS data to be encrypted.

reference:

Https://cryptobook.nakov.com/symmetric-key-ciphers/aes-cipher-concepts

https://www.youtube.com/watch?v=K2Xfm0-owS4

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Latest updates on regulatory events: CZ releases internal memo, Gensler criticizes two exchanges again.

According to Gensler, his agency has obtained internal communications that allegedly indicate intentional illegal beh...

Blockchain

Simultaneously addressing the pressing issues of DEX and CEX, the company received a $ 40 million investment from Sequoia and Intel

Starkware, an Israeli startup, believes that it can solve two of the most pressing issues in crypto trading-the inher...

Blockchain

SBF returns to the witness stand admitting mistakes but refusing to plead guilty, Binance, ex-girlfriend, and Three Arrows caused FTX to collapse.

SBF revealed insider information that Binance had once sought to acquire FTX, and described himself as the CEO who do...

Blockchain

In-depth explanation of Web3 game engine: Origins and development status of racing tracks, as well as network effects.

We are pleased to see the development process at every level, the release of new games, and the emergence of new engi...

Blockchain

The coin was stolen for the first time, and the 7000BTC was missing.

On the morning of May 8, the world-renowned cryptocurrency exchange currency announced that the currency security was...

Market

South Korean Professor tracking Do Kwon's funds: Signs of Terra's collapse were evident in early 2019

Cryptocurrency fugitive Do Kwon has been on the run from Interpol for several months. A Korean professor has been cl...