We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is the AES Algorithm?

Mary Elizabeth
By
Updated: May 16, 2024
Views: 10,523
Share

When speaking of computer security, the term algorithm is used differently than in mathematics, for example, where it refers to a systematic methodology for problem solving in a particular context. In computer security, it refers to a cryptographic algorithm, which is a sequence of procedures or rules to follow in encrypting messages. Algorithms can be simpler or more complex, and those that are more complex are more difficult to crack. AES stands for Advanced Encryption Standard, and the AES algorithm is another name for the Rijndael algorithm, which was chosen for use in the AES standard.

The Rijndael algorithm was chosen in an international competition to be included in AES. When the time came to think about replacing the Data Encryption Standard (DES) — which only had a 55-bit key length and was thought to be slow and place heavy demands on processors — the National Institute of Standards and Technology (NIST) invited cryptographers to come up with an advanced algorithm on which to base AES, i.e., to develop the AES algorithm. The invitation was made in 1997, and the 21 submissions developed by teams from 11 countries were considered. In 2000, the Rijndael algorithm was chosen to be the AES algorithm, which is why AES is sometimes referred to as AES algorithm (Rijndael).

Rijndael — variously pronounced as /RAIN dahl/ or /RINE dahl/ — was named by combining parts of the names of the two developers, Joan Daemen and Vincent Rijmen. The algorithm was based on an earlier algorithm they had developed together called Square. The new AES algorithm is a block algorithm, with data processed in 128-bit blocks. But while keys for DES were only 56 bits, those for Rijndael could be 128, 192, or 256 bits. Nevertheless, there have been some concerns about how secure the new algorithm is, and there are ongoing attempts to crack it.

The AES algorithm was chosen by the United States Government for unclassified, sensitive documents in 2000. In 2003, AES was adopted by the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) consortium. Also in 2003, the National Security Agency (NSA) decided to use AES’s highest bit keys for top secret documents. The Internet Key Exchange (IKE) also uses the AES algorithm to transmit the secret key to the recipient for decryption of the message. AES is also used in Internet Protocol Security (IPSec), a security protocol for authentication and encryption on the web.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary Elizabeth
By Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for EasyTechJunkie, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.
Discussion Comments
Mary Elizabeth
Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the...
Learn more
Share
https://www.easytechjunkie.com/what-is-the-aes-algorithm.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.