Skip to main content

The AES and Other Established Cryptographic Technologies

  • Chapter
  • First Online:
Encryption for Organizations and Individuals
  • 774 Accesses

Abstract

By now, you're aware of some historically relevant cryptographic concepts and how prime numbers relate to encryption algorithms. In this chapter we're moving on to the current-day de facto cryptographic staple, the Advanced Encryption Standard (AES), in addition to tackling many other relevant concepts in the field. We will first visit some basics, including the two major numeric systems in computer science: binary and hexadecimal, for those who feel they need a refresher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    M. Arora: “How Secure is AES against brute force attacks?”, EE Times, 2012

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Robert Ciesla

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ciesla, R. (2020). The AES and Other Established Cryptographic Technologies. In: Encryption for Organizations and Individuals. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6056-2_3

Download citation

Publish with us

Policies and ethics