Briefly describe the history of AES.

What will be an ideal response?


AES was approved by the National Institute of Standards and Technology (NIST) in late 2000 as a replacement for another cryptography algorithm known as Data Encryption Standard (DES). NIST published its requirements for a new encryption algorithm and requested proposals. The requirements stated that the new algorithm had to be fast and function on older computers with 8-bit processors as well as current 32-bit and future 64-bit processors. After a lengthy process that required the cooperation of the U.S. government, industry, and higher educational institutions, five finalists were chosen. The winner was an algorithm known as Rinjdael. Based on the Rinjdael algorithm, AES is now the official encryption standard for the U.S. government.

Computer Science & Information Technology

You might also like to view...

What happens when an association is made?

a. A wireless connection is obtained. b. The MAC address of the client is obtained. c. Unauthorized network access is prevented. d. Excessive routing is prevented.

Computer Science & Information Technology

The Template Gallery stores the templates for each program and opens by default when you open the program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If a website changes server locations or goes down due to technical difficulties or a power failure, the links to it become broken.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. It is possible to improve pipeline performance by automatically rearranging instructions within a program so that branch instructions occur later than actually desired. 2. Interrupt processing allows an application program to be suspended in order that a variety of interrupt conditions can be serviced and later resumed. 3. An interrupt is generated from software and it is provoked by the execution of an instruction. 4. While the processor is in user mode the program being executed is unable to access protected system resources or to change mode, other than by causing an exception to occur. 5. The exception modes have full access to system resources and can change modes freely.

Computer Science & Information Technology