{"id":1422,"date":"2020-05-05T17:09:26","date_gmt":"2020-05-05T11:39:26","guid":{"rendered":"https:\/\/binaryterms.com\/?p=1422"},"modified":"2021-01-18T11:40:35","modified_gmt":"2021-01-18T06:10:35","slug":"advanced-encryption-standard-aes","status":"publish","type":"post","link":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html","title":{"rendered":"Advanced Encryption Standard (AES)"},"content":{"rendered":"<p><strong>Advanced Encryption Standard (AES) <\/strong>was introduced by NIST in 2001 is a <strong>symmetric block cipher<\/strong> which overcomes the key size weakness of DES. AES comes with the variable key sizes i.e. 128-bit key, 192-bit key and a 256-bit key. AES does not follow the Feistel structure in fact it operates on entire plaintext block at once instead of dividing them into two halves.<\/p>\n<p>AES can be applied in both hardware and software. In this section, we will discuss the encryption and decryption process of AES in detail. We will also discuss the round function of AES in brief.<\/p>\n<h2>Content: Advanced Encryption Standard (AES)<\/h2>\n<ol>\n<li><a href=\"#WhatisAdvancedEncryptionStandard?\">What is Advanced Encryption Standard?<\/a><\/li>\n<li><a href=\"#AESEncryption\">AES Encryption<\/a><\/li>\n<li><a href=\"#RoundFunctions\">Round Functions<\/a><\/li>\n<li><a href=\"#AESDecryption\">AES Decryption<\/a><\/li>\n<li><a href=\"#AdvantageandDisadvantage\">Advantage and Disadvantage<\/a><\/li>\n<li><a href=\"#KeyTakeaways\">Key Takeaways<\/a><\/li>\n<\/ol>\n<p><a name=\"WhatisAdvancedEncryptionStandard?\"><\/a><\/p>\n<h3>What is Advanced Encryption Standard (AES)?<\/h3>\n<p>Advanced Encryption Standard was introduced by <strong>NIST<\/strong> (National Institute of Standard and Technology) in the year <strong>2001<\/strong>. It is a <strong>symmetric block cipher<\/strong> and \u00a0No doubt it was introduced to overcome the weakness of DES (Data Encryption Standard).<\/p>\n<p>AES cipher intakes the 128-bit plain text block accompanied by a 128-bit key to generate cipher text block of 128-bit. And while decryption it takes 128-bit cipher text block along with expanded key used in encryption in reverse order to recover the plain text block of 128-bit.<\/p>\n<p>AES being a symmetric block cipher <strong>does not<\/strong> use the <strong>Feistel structure<\/strong> like <strong>DES<\/strong> where the plain text is divided into two halves. And one half of the plain text block helps in modifying the other half of plain text block and then both the halves are swapped.<\/p>\n<p>AES operates on an <strong>entire block of plain text<\/strong> in the form of a single matrix at each round which includes substitution and permutation. AES has<br \/>\n10 rounds -&gt; 128-bit key<br \/>\n12 rounds -&gt; 192-bit key<br \/>\n14 rounds -&gt; 256-bit key<\/p>\n<p>Let us discuss some key point before moving to the encryption process of AES.<\/p>\n<ul>\n<li>AES operates on a 128-bit plain text block as a single <strong>4X4 matrix<\/strong> which would have a total size of 16 bytes. Every 4 bytes would represent a word.<\/li>\n<li>The 128-bit key is <strong>expanded<\/strong> to form an array containing <strong>44, 32-bit words<\/strong>. And at each round of AES 4 distinct words are served to the round key process from the expanded key.<\/li>\n<li>A round has four functions among which one is of permutation and three are of substitution:<br \/>\nSubstitute Byte, Mix Column and Add Round Key functions are <strong>substitution<\/strong> functions whereas Shift Rows is a <strong>permutation<\/strong> function.<\/li>\n<li>Both the <strong>encryption<\/strong> and <strong>decryption<\/strong> process starts with the <strong>Add Round Key<\/strong> function which is then followed by the nine-round which has all four substitutions and permutation function but the last tenth round has only three functions.<\/li>\n<li>Only the <strong>Add Round ke<\/strong>y function makes <strong>use<\/strong> of the <strong>key.<\/strong><\/li>\n<li>During decryption, the <strong>inverse functions<\/strong> of Substitute Bytes, Mix Columns and Shift Rows are used and the inverse of Add Round key is carried out by XORing the same round key as in encryption with the cipher block.<\/li>\n<li>While decryption the sequence of keys used during encryption is reversed.<\/li>\n<li>In both the encryption and decryption, the <strong>last round<\/strong> always has only <strong>three functions<\/strong>, Mix Column is ignored at the last round of AES.<\/li>\n<li>Every intermediate result is stored in the 4X4 <strong>state matrix<\/strong>.<\/li>\n<\/ul>\n<p><a name=\"AESEncryption\"><\/a><\/p>\n<h3>Advanced Encryption Standard (AES) Encryption<\/h3>\n<p>Knowing the Key points of AES now, let\u2019s discuss the encryption process in AES in details. Observe the figure given below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1426\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\" alt=\"AES Encryption\" width=\"393\" height=\"782\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg 393w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption-151x300.jpg 151w\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" \/><\/p>\n<p><strong>Step 1:<\/strong> Initially the 16-byte key or a 4-word key is expanded to an array of 44 words where each word is of 4 bytes.<\/p>\n<p><strong>Step 2:<\/strong> At the very first of encryption process the 16-byte plain text block or <strong>4-word plain text block<\/strong> is <strong>XORed<\/strong> with the <strong>4-word key<\/strong> i.e. W<sub>0<\/sub>, W<sub>1<\/sub>, W<sub>2<\/sub>, W<sub>3<\/sub>. The resultant of this XOR is provided to the 1<sup>st<\/sup> round.<\/p>\n<p><strong>Step 3:<\/strong> In the first round, the result of XOR is processed by the Substitute Bytes, Shift Rows, Mix Column and Add Round Key functions in the respective sequence.<\/p>\n<p>To the Add Round Key function, the next 4 words from the expanded key are provided that are W<sub>4<\/sub>, W<sub>5<\/sub>, W<sub>6<\/sub>, W<sub>7.<\/sub> The corresponding result of first-round is provided to the second round.<\/p>\n<p><strong>Step 4:<\/strong> All round till round nine, performs the same functions and in each round, a distinct key is provided from the expanded key. In round ten only three functions are performed on the input provided by round 9 that are Substitute Bytes, Shift Rows and Add Round Key function.<br \/>\nThe result of round 10 is the cipher text block of the corresponding pain text block.<br \/>\n<a name=\"RoundFunctions\"><\/a><\/p>\n<h3>Round Functions<\/h3>\n<p>Each round function has four stages or four functions those are as follows:<\/p>\n<p><strong>Substitute Bytes<\/strong><\/p>\n<p>The <strong>input<\/strong> to Substitute Byte is a <strong>4X4 state matrix<\/strong> of 16 bytes where each element of the matrix is of 1 byte. Now AES has defined a <strong>16X16 matrix<\/strong> namely<strong> S-box<\/strong> which contains a permutation of 256 8-bit values.<\/p>\n<p>The Substitute Bytes function maps each byte element of state matrix to the new value using the following procedure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1427\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Substitute-Bytes.jpg\" alt=\"Advanced-Encryption-Standard-Substitute-Bytes\" width=\"597\" height=\"369\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Substitute-Bytes.jpg 597w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Substitute-Bytes-300x185.jpg 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/p>\n<p><strong>Step 1:<\/strong> <strong>A byte element<\/strong> in the state matrix would have 8-bits. The <strong>leftmost 4-bit<\/strong> is used to retrieve the <strong>row value<\/strong> of S-box and the <strong>rightmost 4-bit<\/strong> are used to retrieve the <strong>column value<\/strong> of S-box.<\/p>\n<p><strong>Step 2:<\/strong> This row value and column value act as an index to get the new value from the S Box.<\/p>\n<p>Let\u2019s suppose a byte element S<sub>2,2 <\/sub>has a value 25 whose binary representation is 00011001. So, the leftmost 4-bit 0001 represents &#8216;1&#8217; and the rightmost 1001 represents &#8216;9&#8217;. So, intersection value at row 1 and column 9 in S-box is &#8216;D4&#8217;. In this way, the value 25 is mapped to the new value D4.<\/p>\n<p>The Substitute Byte function maps each element of 4X4 state matrix to the new value and forwards this newly formed 4X4 State matrix to Shift Rows function.<\/p>\n<p><strong>Shift Rows<\/strong><\/p>\n<p>The input to Shift Row function is a 4X4 state matrix forwarded from the Substitute Bytes function. The Shift row performs the <strong>circular left shift on the rows<\/strong> of the matrix. On the <strong>first row<\/strong>, the circular left shift is performed by<strong> 0 bytes<\/strong>.<\/p>\n<p>On the <strong>second row<\/strong>, a circular left shift is performed by <strong>1 byte<\/strong>. On the <strong>third row<\/strong>, the circular left shift is performed by <strong>2 bytes<\/strong>. On the <strong>fourth row<\/strong> of the input state matrix, the circular let shift is performed by <strong>3 bytes<\/strong>. The resultant 4X4 state matrix of Shift Rows function is forwarded to the Mix Column function.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1428\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Shift-Rows.jpg\" alt=\"Advanced-Encryption-Standard-Shift-Rows\" width=\"589\" height=\"260\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Shift-Rows.jpg 589w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Shift-Rows-300x132.jpg 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<p><strong>Mix Columns<\/strong><\/p>\n<p>The input 4X4 state matrix is <strong>multiplied<\/strong> with a <strong>constant predefined matrix<\/strong> as you can see in the figure below:<\/p>\n<p>Each byte element of the resultant matrix of Mix Column function is the sum of the product of one row of the defined matrix and one column of state matrix. The product matrix of the Mix Column function is forwarded to the last function of a round i.e. Add Round Key.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1429\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Mix-Columns.jpg\" alt=\"Advanced-Encryption-Standard-Mix-Columns\" width=\"600\" height=\"201\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Mix-Columns.jpg 600w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Mix-Columns-300x101.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Add Round Key<\/strong><\/p>\n<p>In the Add Round Key function, the input state matrix is <strong>XORed<\/strong> with the 4-words unique key. In each round the key used to XOR with state matrix is distinct.<\/p>\n<p>Add Round Key function is a <strong>column-wise<\/strong> function, a 4-byte state matrix column is XORed with a 4-byte word of a key. It can also be taken as <strong>byte-level<\/strong> function.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1430\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Add-Round-Key.jpg\" alt=\"Advanced-Encryption-Standard-Add-Round-Key\" width=\"600\" height=\"193\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Add-Round-Key.jpg 600w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Advanced-Encryption-Standard-Add-Round-Key-300x97.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/>\n<a name=\"AESDecryption\"><\/a><\/p>\n<h3>Advanced Encryption Standard (AES) Decryption<\/h3>\n<p>AES Encryption and\u00a0 AES Decryption process are the same and it also starts with the Add Round Key Function. The 16-byte cipher text in the form of 4X4 state matrix is XORed with the unique 4-word key.<\/p>\n<p>The key sequence in encryption is reversed during the decryption. And all the other round functions are also inversed in the decryption process to retrieve the original 16-byte plain text block.<br \/>\n<a name=\"AdvantageandDisadvantage\"><\/a><\/p>\n<h2>Advantage and Disadvantage<\/h2>\n<p><strong>Advantages<\/strong><\/p>\n<ol>\n<li>AES can be implemented on both hardware and software.<\/li>\n<li>AES has three key length 128-bits,192-bits and 256-bits.<\/li>\n<li>AES is implemented in a wide range of application as it is defined as the standard by NIST.<\/li>\n<\/ol>\n<p><strong>Disadvantage<\/strong><\/p>\n<p>The key used in AES if not employed properly it can cause a cryptanalytic attack. Therefore, key scheduling should be done carefully.<br \/>\n<a name=\"KeyTakeaways\"><\/a><\/p>\n<h3>Key Takeaways<\/h3>\n<div id=\"keytake\">\n<ul>\n<li>AES is a symmetric block cipher published by NIST in 2001.<\/li>\n<li>AES was introduced to overcome the weakness of DES.<\/li>\n<li>AES can be implemented with three key sizes 128-bit key, 192-bit key and a 256-bit key.<\/li>\n<li>The rounds in AES vary with the key length i.e. it conducts 10 rounds for a 128-bit key, 12 rounds for 192-bit key and 14 rounds for a 256-bit key.<\/li>\n<li>Each round has 4 functions Substitute Bytes, Shift Rows, Mix Columns and Add Round Key. But every last round in AES has only three functions Substitute Bytes, Shift Rows and Add Round Key.<\/li>\n<li>Encryption and decryption algorithm of AES are same, both start with Add Round Key.<\/li>\n<li>In decryption, the inverse of each function is used and the key sequence used during encryption is also reversed.<\/li>\n<\/ul>\n<\/div>\n<p>So, this is all about AES it\u2019s encryption, decryption and key scheduling. AES provides the best result if key scheduling is done properly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advanced Encryption Standard (AES) was introduced by NIST in 2001 is a symmetric block cipher which overcomes the key size weakness of DES. AES comes with the variable key sizes i.e. 128-bit key, 192-bit key and a 256-bit key. AES does not follow the Feistel structure in fact it operates on entire plaintext block at [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9],"tags":[],"class_list":{"0":"post-1422","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms<\/title>\n<meta name=\"description\" content=\"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms\" \/>\n<meta property=\"og:description\" content=\"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\" \/>\n<meta property=\"og:site_name\" content=\"Binary Terms\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T11:39:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-18T06:10:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\" \/>\n<meta name=\"author\" content=\"Neha T\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neha T\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\"},\"author\":{\"name\":\"Neha T\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\"},\"headline\":\"Advanced Encryption Standard (AES)\",\"datePublished\":\"2020-05-05T11:39:26+00:00\",\"dateModified\":\"2021-01-18T06:10:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\"},\"wordCount\":1484,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\",\"url\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\",\"name\":\"What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\",\"datePublished\":\"2020-05-05T11:39:26+00:00\",\"dateModified\":\"2021-01-18T06:10:35+00:00\",\"description\":\"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.\",\"breadcrumb\":{\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg\",\"width\":393,\"height\":782,\"caption\":\"AES Encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/binaryterms.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advanced Encryption Standard (AES)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binaryterms.com\/#website\",\"url\":\"https:\/\/binaryterms.com\/\",\"name\":\"Binary Terms\",\"description\":\"The Computer Science &amp; IT Guide\",\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/binaryterms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/binaryterms.com\/#organization\",\"name\":\"Binary Terms\",\"url\":\"https:\/\/binaryterms.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"width\":400,\"height\":63,\"caption\":\"Binary Terms\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\",\"name\":\"Neha T\",\"url\":\"https:\/\/binaryterms.com\/author\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms","description":"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html","og_locale":"en_GB","og_type":"article","og_title":"What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms","og_description":"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.","og_url":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html","og_site_name":"Binary Terms","article_published_time":"2020-05-05T11:39:26+00:00","article_modified_time":"2021-01-18T06:10:35+00:00","og_image":[{"url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg","type":"","width":"","height":""}],"author":"Neha T","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neha T","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#article","isPartOf":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html"},"author":{"name":"Neha T","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe"},"headline":"Advanced Encryption Standard (AES)","datePublished":"2020-05-05T11:39:26+00:00","dateModified":"2021-01-18T06:10:35+00:00","mainEntityOfPage":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html"},"wordCount":1484,"commentCount":1,"publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"image":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg","articleSection":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html","url":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html","name":"What is Advanced Encryption Standard (AES)? Definition, Encrption, Decryption, Advantages and Disadvantages - Binary Terms","isPartOf":{"@id":"https:\/\/binaryterms.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage"},"image":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg","datePublished":"2020-05-05T11:39:26+00:00","dateModified":"2021-01-18T06:10:35+00:00","description":"Advanced Encryption Standard (AES) is a symmetric block cipher which was introduced by NIST in 2001 to overcome the short key size weakness of DES.","breadcrumb":{"@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#primaryimage","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/AES-Encryption.jpg","width":393,"height":782,"caption":"AES Encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/binaryterms.com\/advanced-encryption-standard-aes.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/binaryterms.com\/"},{"@type":"ListItem","position":2,"name":"Advanced Encryption Standard (AES)"}]},{"@type":"WebSite","@id":"https:\/\/binaryterms.com\/#website","url":"https:\/\/binaryterms.com\/","name":"Binary Terms","description":"The Computer Science &amp; IT Guide","publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/binaryterms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/binaryterms.com\/#organization","name":"Binary Terms","url":"https:\/\/binaryterms.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","width":400,"height":63,"caption":"Binary Terms"},"image":{"@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe","name":"Neha T","url":"https:\/\/binaryterms.com\/author\/author"}]}},"_links":{"self":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/comments?post=1422"}],"version-history":[{"count":2,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1422\/revisions"}],"predecessor-version":[{"id":2211,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1422\/revisions\/2211"}],"wp:attachment":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/media?parent=1422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/categories?post=1422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/tags?post=1422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}