- Over 20 years after the implementation of the…data encryption standard,…Nest issued a request for proposal for an…encryption standard to replace DES…as a government standard.…Requirements included many of the same…original requirements such as efficient,…flexible, and simple symmetric block cipher.…However, new requirements specified the algorithm…needed to support a block size of 128 bits…and support key lengths of 128,…192, and 256 bits.…
It was also to be available on a worldwide,…non-exclusive royalty-free basis.…Over a dozen participants published algorithms.…The Rijndael algorithm was selected…and now is the official standard…which became standard in 2002.…AES is used in all modern applications,…including IEEE 802.11i.…AES is not a Feistel network in that it doesn't swap sides.…
It processes the entire block through a set of…four operations from nine to 11 rounds…depending on key length.…From a 128 bit block of plain text…and 128 bit key,…each block of text goes through…different transformations including…substitute bytes, shift rows,…
Author
Released
8/12/2015- Differentiate between confidentiality, integrity, and accountability.
- Compare symmetric and asymmetric encryption.
- Describe the Feistel Cipher.
- Differentiate between block and stream ciphers.
- Explain what Secure Sockets Layer (SSL) is used for.
- Define Internet Protocol Security (IPSec) and explain how it works.
- Explain the transport mode in IPSec.
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome1m 17s
-
-
1. Network Security
-
2. Symmetric Encryption
-
Using Wireshark to crack WEP4m 17s
-
3. Asymmetric Encryption and Digital Signatures
-
Managing keys3m 38s
-
Using certificates3m 3s
-
4. Hash Algorithms, Message Digests, and Authentication
-
5. Secure Sockets Layer (SSL)
-
6. Email Security
-
7. Internet Protocol Security
-
Using operating mechanisms3m 16s
-
Conclusion
-
Next steps55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Working with the Advanced Encryption Standard (AES)