Advanced Encryption Standard

(redirected from Aes-192)

Advanced Encryption Standard

(cryptography, algorithm)
(AES) The NIST's replacement for the Data Encryption Standard (DES). The Rijndael /rayn-dahl/ symmetric block cipher, designed by Joan Daemen and Vincent Rijmen, was chosen by a NIST contest to be AES.

AES is Federal Information Processing Standard FIPS-197.

AES currently supports 128, 192 and 256-bit keys and encryption blocks, but may be extended in multiples of 32 bits.

http://csrc.nist.gov/CryptoToolkit/aes/.

Rijndael home page.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

AES

(Advanced Encryption Standard) A U.S. government encryption standard supported by the National Institute of Standards & Technology (NIST). AES is a cryptographic cipher that uses a block length of 128 bits and key lengths of 128, 192 or 256 bits. Officially replacing the Triple DES method in 2001, AES uses the Rijndael algorithm developed by Joan Daemen and Vincent Rijmen of Belgium. AES can be encrypted in one pass instead of three, and its key size is greater than Triple DES's 168 bits. In early 1997, the NIST invited cryptographers to submit an advanced algorithm. In late 2000, the Rijndael (pronounced "rine-doll") symmetric block cipher algorithm was selected out of submissions by 21 teams from 11 countries. See cipher, cryptography, NIST, DES and AES/CCMP.

(2) (Audio Engineering Society, Inc., New York, www.aes.org) A membership association devoted to audio technology research and development, marketing and education. Founded in 1948, technical standards have been continually developed under its auspices. AES is dedicated to ensuring that audio quality is maintained in the digital world. See AES/EBU.

(3) (Automated Export System) A U.S. Customs Service application that tracks goods exported to foreign countries.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Private documents held on their encrypted servers and comprised of AES-128, AES-192 and AES-256.
[5.] Alex Biryukov and Dmitry Khovratovich, "Related-key Cryptanalysis of the Full AES-192 and AES-256", Cryptology ePrint Archive, Report 2009/317.
The authors show that AES-192 is breakable by using two pairs of correct and fault ciphertexts whereas AES-256 is broken by using three pairs of correct and fault ciphertexts.
Kim, "Differential fault analysis against AES-192 and AES256 with minimal faults," in Proceedings of the 7th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, pp.
[20] Chong Hee Kim, "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults," 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-9, 21 Aug.
GatesAir announced the radio industry's first end-to-end, interoperable solution for transporting AES-192 signals over IP.
Though our attacks on them are not applicable to the full AES-192/256, these are superior to the attack results of [1] (AES-192) and [3](AES-256), respectively.
in August 2010, with topics such as differential fault analysis against AES-192 and AES-256 with minimal faults, optical faul masking attacks, and fault injection resilience.
The standard comprises three block ciphers, AES-128, AES-192 and AES-256 and specifies that each AES cipher has a 128-bit block size, with encryption key sizes of 128, 192 and 256 bits, respectively.
Algorithm Blowfish IDEA DES 3 DES Block size (bits) 64 64 64 64 Key size (bits) 128 128 56 112 Rounds 16 8 16 48 Algorithm AES-128 AES-192 AES-256 Block size (bits) 128 128 128 Key size (bits) 128 192 256 Rounds 10 12 14 Table 5: Key parameters used in the experiment.
[12] Biryukov, A., and Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256.