Introduction to the introduction | King of Symmetric Encryption Algorithm AES

The full name of AES is Advanced Encryption Standard, which is the most popular symmetric encryption algorithm. It can also be called encryption specification.

The basic principle of AES

AES is a symmetric encryption algorithm, which means that both encryption and decryption use the same key.

When AES is encrypted, the file is divided into small blocks for encryption. Each block is 128 bits, which is 16 bytes. If the file size is not an integer multiple of 16 bytes, then add some data at the end to make up enough. Each block is individually encrypted.

When encrypted, the AES algorithm has two inputs and one output. The input is the key and file content, and the output is ciphertext. When decrypting, the ciphertext and the key are input, and the output is the original text of the file.

The actual encryption and decryption process is divided into several steps, which are still more complicated, and it is not as simple as making the original text and the key an exclusive OR.

AES is very safe

The key length may be 128 bits or longer. Of course, the longer the key, the safer and slower the speed. AES was released in 1998, and no one has ever cracked AES encrypted data in history.

AES is very popular

AES is currently the most popular symmetric encryption algorithm, and none of them. It is so common that many CPUs support AES encryption and decryption at the hardware level.

AES is an encryption standard used by the US government, which means that government secret files are mostly encrypted with AES.

Https is the use of AES for data encryption because AES is part of the TLS and SSL standards.

to sum up

Finally, summarize it. AES is the most popular symmetric encryption algorithm in the world. It is very common for both US government files and HTTPS data to be encrypted.

reference:

Https://cryptobook.nakov.com/symmetric-key-ciphers/aes-cipher-concepts

https://www.youtube.com/watch?v=K2Xfm0-owS4

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Gemini Exchange sets up insurance company to provide $ 200 million in insurance for custody services

The Winklevoss brothers' Gemini exchange has set up an insurance company to prepare up to $ 200 million in insur...

Blockchain

Has the long-standing resentment towards VC finally erupted? After falling out with LianGuairadigm, Reflexer bought back tokens and put on a mocking face.

This year, you can earn substantial profits from cryptocurrency, all coming from self-reliant projects without ventur...

Policy

Babbitt Column | US Prosecution Investigative Exchange and Precautions

(For more details, see also Deng Jianpeng, Sun Penglei: “Intermediary Chain Supervision and Compliance Respons...

Blockchain

FCoin nearly 13,000 BTC can not be paid, some people report it, some people save themselves

Following the destruction of 720 million tokens and three days and three announcements, FCoin has made new progress. ...

Blockchain

6 pictures tell you about the development status of the Asian cryptocurrency market

Author: cryptanalysis CoinGecko company co-founder Bobby Ong translation: block rhythm BlockBeats-HQ Recently, at the...

Blockchain

The user information of the currency circle has been leaked on a large scale, and the fire currency and the currency security have issued risk warnings one after another.

On August 6th, a large number of users of the currency said that they received a call from a customer service company...