What are the main characteristics of AES?
What will be an ideal response?
Due to its short key length, DES is not considered to be secure and needed to be replaced. In 1997, the National Institute of Standards and Technology (NIST) called for submissions for an advanced encryption standard (AES). It was expected that the chosen algorithm would be used worldwide and analyzed extensively. Five algorithms were finalists: MARS, Serpent, Twofish, Rijndael, and RC6. Rijndael was chosen in November 2001. Since that time, AES has also been called Rijndael. Two Belgian cryptographers, Joan Daemen and Vincent Rijmen, developed the cipher, and the AES is essentially a subset of the Rijndael cipher. Although in practice they are used interchangeably, strictly speaking, AES is not Rijndael. The Rijndael cipher supports a larger range of block and key sizes. AES has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits. The Rijndael cipher can be specified with key and block sizes in any multiple of 32 bits, with a minimum of 128 bits and a maximum of 256 bits.
You might also like to view...
Which of the following is false?
a) WCF is a set of technologies for building distributed systems in which system components communicate with one another over networks. b) Since WCF is a common framework for all communication between systems, it allows you to learn only one programming model to use WCF. c) Web services promote software reusability in distributed systems that typically execute across the Internet. d) Web services allow their methods to be called by methods on other machines via different data formats and protocols.
Each cell of the table can hold only text or numbers.
Answer the following statement true (T) or false (F)
A hacker modifying a Web site to display an official looking message that informs the user that a particular software program must be downloaded to use the site is an example of _________. A. Web site alteration B. Web site proliferation C. Web site phishing D. Web site driving
Fill in the blank(s) with the appropriate word(s).
In the Schedule table, the ____ field is the number of days that a task could be delayed without affecting its successor task.
A. Total Slack B. Late Start C. Free Slack D. Late Finish