{"id":2797,"date":"2022-02-07T16:02:00","date_gmt":"2022-02-07T16:02:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2797"},"modified":"2022-01-18T16:06:33","modified_gmt":"2022-01-18T16:06:33","slug":"what-is-the-advanced-encryption-standard-aes-encryption-explained","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/","title":{"rendered":"What Is the Advanced Encryption Standard? AES Encryption Explained"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Encryption standards have come a long way since they first appeared in the 1970s. The first data encryption standard, DES, is obsolete and the world has moved onto AES encryption. The encryption provided by AES is much stronger than that of its predecessor. So, what is AES encryption and why does it hold a vital position in modern cybersecurity?<\/h2>\n\n\n\n<p>In a world where the internet is a necessity, encryption is crucial for the privacy and integrity of our data. In general, encryption is a cryptographic process that takes plaintext, readable data and turns it into something indecipherable. This is done using either a single key (symmetric encryption) or two different but related keys (asymmetric encryption) to, essentially, scramble or unscramble data shared between two parties.<\/p>\n\n\n\n<p>In an interview with <em>Time<\/em> magazine, Apple Inc. CEO <a href=\"https:\/\/time.com\/4261796\/tim-cook-transcript\/\">Tim Cook<\/a> emphasized the significance of encryption in our online transactions and shared how it protects us from being ripped off by criminals.<\/p>\n\n\n\n<p>Of course, there are different types of encryption and many more types of algorithms. One of the most popular, by far, is the advanced encryption standard, or AES. But what is AES encryption and why is it so important in online communications?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is AES Encryption? An AES Definition and Explanation<\/h2>\n\n\n\n<p>AES is a type of <a href=\"https:\/\/sectigostore.com\/blog\/types-of-encryption-what-to-know-about-symmetric-vs-asymmetric-encryption\/\">symmetric encryption<\/a>, meaning that it uses a single key to both encrypt and decrypt data. (This differs from asymmetric encryption, which uses a public key to encrypt and a private key to decrypt data.) The advanced encryption standard is endorsed by National Institute of Standards and Technology (NIST) and is used by the government agencies and contractors to secure sensitive information from prying eyes.<\/p>\n\n\n\n<p>At its core, cryptography is based on mathematical functions and calculations. The security of the algorithm is in direct proportion to the complexity of the calculations. AES is one of the most secure algorithms around and uses highly complex mathematical functions to encrypt data. Nevertheless, the AES algorithm is short, secure, and compatible with most hardware, software, and firmware.<\/p>\n\n\n\n<p>Today, the AES algorithm is used all over the world in software, hardware, and firmware in all kinds of devices. It&#8217;s free to use for public or private enterprises, for commercial or non-commercial purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AES Encryption Keys Come In Multiple Sizes to Offer Varying Levels of Security<\/h3>\n\n\n\n<p>It\u2019s available in different varieties based on the size of the encryption keys used:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AES 128 bits (or 3.4 x 10<sup>38<\/sup> possible combinations),<\/li><li>AES 192 bits (or 6.2 x 10<sup>57<\/sup> possible combinations), and<\/li><li>AES 256 bits (or 1.1 x 10<sup>77<\/sup> possible combinations).<\/li><\/ul>\n\n\n\n<p>So, what does all of this mean? Let\u2019s put it in a little perspective. According to <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2001\/12\/commerce-secretary-announces-new-standard-global-information-security\">NIST<\/a>: \u201cFor a 128-bit key size, there are approximately 340 undecillion (340 followed by 36 zeros) possible keys.\u201d AES-256 is an exceptionally strong algorithm and is considered quantum resistant algorithm \u2014 meaning that quantum computers won\u2019t be able to crack it in a practical amount of time to make quantum computing a threat to it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where Is AES Used?<\/h2>\n\n\n\n<p>AES is the most widely trusted encryption standard in the world. It\u2019s used to secure data in all kinds of public and private settings, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Online shopping and banking<\/li><li>Website SSL\/TLS certificates<\/li><li>Virtual private networks (VPNs)<\/li><li>Mobile apps including WhatsApp and LastPass<\/li><li>Computer processor chips and operating systems<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Benefits of Advanced Encryption Standard (AES)<\/h2>\n\n\n\n<p>There are many reasons why AES is so popular, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Robust Security.<\/strong> AES 256 is the most secure encryption developed so far and is used by the United States federal government for even the most sensitive information. Because of its impracticality to crack, it is accepted worldwide as a reliable algorithm.<\/li><li><strong>Standardized Algorithm.<\/strong> NIST has standardized the AES algorithm and made it an open-source resource, so it becomes easier for the general public to accept it as trustworthy. There are also no interoperability issues as hardware, software, and firmware all use the same algorithm.<\/li><li><strong>Variable Key Lengths. <\/strong>AES encryption can be done using different key lengths, including 128-bit, 192-bit, and 256-bit keys. For a businessperson using AES to protect their eCommerce account, 128-bit is ideal. Governments protecting their sensitive documents can use AES-256 for greater security.<\/li><li><strong>Fast Encryption\/Decryption Speed. <\/strong>The processing speed of AES encryption is faster than both DES and Triple-DES. On the same hardware, AES is around six times faster than Triple-DES.<\/li><li><strong>Low RAM Requirements. <\/strong>When NIST declared it wanted a replacement for DES, they specified that the new algorithm should be supported even on devices with limited computing capabilities. AES fulfills that requirement to a \u2019T\u2019. It works just as well on 8-bit smart cards as high-speed computers.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A Brief History of the Advanced Encryption Standard<\/h2>\n\n\n\n<p>The original <a href=\"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/\">data encryption standard (DES)<\/a> had serious limitations that made it vulnerable to brute force attacks. DES began to lose its footing as a secure algorithm and, in 1997, the NIST began looking for a more secure alternative. NIST wanted an algorithm that was more powerful than DES and Triple-DES, with longer keys for more security. This is where the advanced encryption standard came into play.<\/p>\n\n\n\n<p>Whereas DES was mainly supported by special-purpose hardware, AES was to be implemented on all kinds of software and hardware. It also had to work on hardware with limited computational capacities like smart cards or IoT devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Selection Process of the AES Algorithm<\/h2>\n\n\n\n<p>Some people mistrusted the DES algorithm, as the source code was not open. There were also rumors that the National Security Agency (NSA) had designed a backdoor in the algorithm to spy on users. Although NSA denied these allegations, trust was hard to recover. So, with AES, NIST wanted to involve the cyber community and the public from the start, hoping to win their trust. This process is one of the major reasons behind the widespread acceptance of AES.<\/p>\n\n\n\n<p>NIST announced AES development in January 1997, putting out a call for proposals in September the same year. They received <a href=\"https:\/\/www.ieee-security.org\/Cipher\/ConfReports\/conf-rep-aes.html\">15 viable proposals<\/a> from people around the world, including Australia, Belgium, the USA, South Africa, Japan, and Korea. These were announced at the <a href=\"https:\/\/www.nist.gov\/publications\/conference-report-first-advanced-encryption-standard-aes-candidate-conference-ventura\">first AES Candidate Conference<\/a> in August 1998.<\/p>\n\n\n\n<p>The second AES Candidate Conference (AES2) was held in March 1999 to discuss the proposed algorithms. Based on expert analysis and comments received from the public in <a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Cryptographic-Standards-and-Guidelines\/documents\/aes-development\/R1comments.pdf\">Round 1<\/a>, NIST selected the best five algorithms from the proposals<a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Cryptographic-Standards-and-Guidelines\/documents\/aes-development\/R1comments.pdf\">.<\/a><\/p>\n\n\n\n<p>In <a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Cryptographic-Standards-and-Guidelines\/documents\/aes-development\/R2comments.pdf\">Round 2<\/a> comments were again sought from the general public and an online forum was held to discuss the five finalist algorithms. NIST used this forum to examine and discuss issues around the algorithms, from implementation problems to intellectual property issues.<\/p>\n\n\n\n<p>AES3 was held with the developers of the five finalists in New York USA over two days in April 2000. Finally, on October 2, 2000, NIST declared the <a href=\"https:\/\/www.eng.tau.ac.il\/~yash\/crypto-netsec\/rijndael.htm\">Rijndael cipher<\/a> as the new advanced encryption standard.<\/p>\n\n\n\n<p>Details of the new AES were published as <a href=\"https:\/\/csrc.nist.rip\/publications\/detail\/fips\/197\/final\">Federal Information Processing Standards Publication 197<\/a> (FIPS 197) on November 26, 2001. Subsequently, NIST began <a href=\"https:\/\/csrc.nist.rip\/projects\/cryptographic-algorithm-validation-program\">a cryptographic algorithm validation program (CAVP)<\/a> to test every component of the algorithm before its implementation.<\/p>\n\n\n\n<p>NIST made a few alterations to the Rijndael algorithm, changing block sizes and key lengths. In the original Rijndael cipher, the block and the keys were of variable lengths ranging from 128 bits to 256 bits. Of course, Rijndael\u2019s authors Joan Daemen and Vincent Jijmen later <a href=\"https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-standards-and-guidelines\/documents\/aes-development\/rijndael-ammended.pdf\">expanded the variable key and block sizes<\/a> in the multiples of 32 bits, thereby expanding the list of key and block sizes to 128, 160, 192, 224, and 256.<\/p>\n\n\n\n<p>However, AES has a fixed block size of 128 bits and has the varying key lengths of 128, 192, and 256 bits that we touched on earlier.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s the Difference Between DES and AES Encryption Algorithms?<\/h2>\n\n\n\n<p>The difference between AES and DES extends beyond their respective security strengths. For example, AES is based on a substitution-permutation network. Just like its predecessor DES, AES is a block cipher, meaning it divides the plaintext into blocks before encrypting it. Additionally, like DES, AES is a symmetric cipher that uses the same keys to encrypt and decrypt the data. This is where the similarities between the two end and the <a href=\"https:\/\/sectigostore.com\/blog\/des-vs-aes-everything-to-know-about-aes-256-and-des-encryption\/\">differences between DES and AES<\/a> begin:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>&nbsp;<\/strong><\/td><td><strong>DES Encryption<\/strong><strong><\/strong><\/td><td><strong>AES Encryption<\/strong><strong><\/strong><\/td><\/tr><tr><td><strong>Still In Use and Considered Secure?<\/strong><\/td><td>No \u2014 DES has known vulnerabilities that can be exploited<\/td><td>Yes \u2014 AES has no known vulnerabilities, currently accepted as the standard for symmetric encryption<\/td><\/tr><tr><td><strong>Cipher Structure<\/strong><\/td><td>Based on the Feistel structure<\/td><td>Based on a substitution-permutation network<\/td><\/tr><tr><td><strong>Key Sizes<\/strong><\/td><td>Key size is 64 bits (8 of which are parity bits, meaning it\u2019s really a 56-bit key)<\/td><td>Keys are available in 128 bits, 192 bits, or 256 bits<\/td><\/tr><tr><td><strong>Block Sizes<\/strong><\/td><td>64-bit block size<\/td><td>128-bit block size<\/td><\/tr><tr><td><strong>Encryption Rounds<\/strong><\/td><td>16 rounds of encryption<\/td><td>Number of rounds depends on the key-length used \u2013 128-bit key has 10 rounds, &#8211; 192-bit key has 12 rounds, and &#8211; 256-bit key has 14 rounds.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How Does AES Encryption Work?<\/h2>\n\n\n\n<p>Let\u2019s briefly explore the process of how the advanced encryption standard works to scramble data. In a nutshell, AES encryption takes the plaintext input data and divides it into 128-bit chunks of data called blocks. A single cryptographic key is then used to generate different subkeys \u2014 sometimes called round keys because a separate subkey is used for each round of processing \u2014 that will be applied to the different chunks of data. This produces a ciphertext for that data block.<\/p>\n\n\n\n<p>Each block of ciphertext is then added onto the next until, finally, the final ciphertext is created that is the same size as the initial input data.<\/p>\n\n\n\n<p>Depending on the size of the key used, the data will go through 10, 12 or 14 rounds of processing. It\u2019s also important to note that no two round keys are similar. Moreover, as the AES encryption doesn\u2019t use an initial vector; one additional key is generated for encryption at the beginning.<\/p>\n\n\n\n<p>Here&#8217;s a great video that walks you through how the AES encryption process works:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"AES: Advanced Encryption Standard - a Conceptual Review\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/liKXtikP9F0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The detailed process of AES is explained in our next article. You will be able to learn more about all the jargon used in the process here.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Secure Is AES?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM Security<\/a> reports that if an organization using 256 AES encryption suffers a data breach, the average cost of the breach would be 29.4% ($1.25 million) less than breaches that involve data secured by no encryption or encryption that uses less secure algorithms. Because AES is much harder to crack than weaker encryption functions, less data would be at risk.<\/p>\n\n\n\n<p>So, just how hard is it to crack AES encryption, and how long does it take with current present processing power? To answer those questions, we\u2019ll have to do some math.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Grover\u2019s Algorithm<\/h3>\n\n\n\n<p><a href=\"https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/grovers-algorithm\">In 1996, when NIST was searching for a replacement for DES, Lov Grover was developing what would <\/a>come to be known as <a href=\"https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/grovers-algorithm\">Grover\u2019s algorithm<\/a>, or the quantum search algorithm. It\u2019s the most powerful tool that can be used against AES and other symmetric algorithms.<\/p>\n\n\n\n<p>Although Grover\u2019s algorithm can\u2019t completely crack symmetric encryption, it can weaken it significantly, thereby reducing the number of iterations needed to carry out a brute force attack. Using this algorithm, the number of iterations required to crack a 128-bit symmetric cryptographic key can be reduced from 2128 to 264. Similarly, a 256-bit symmetric key can be reduced to 2<sup>128<\/sup> iterations, thus reducing the time taken to perform a brute force attack. It still takes a very, very long time though.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Long Would It Take to Crack AES?<\/h3>\n\n\n\n<p>Just how much time does it take to carry out these iterations to try to crack an AES key? To find out, let\u2019s think about one of the most powerful systems operating today \u2014 the Bitcoin network. At its peak, the network performed <a href=\"https:\/\/www.blockchain.com\/en\/charts\/hash-rate?scale=1&amp;timespan=all\">150 * 10<sup>18 <\/sup>\u2248 2<sup>67 <\/sup>operations per second<\/a>. With this kind of power, it would take <a href=\"https:\/\/www.ubiqsecurity.com\/blog\/128bit-or-256bit-encryption-which-to-use\/\">70,000,000,000,000,000,000,000,000 years<\/a> to crack AES-128. Knowing that AES-256 has 2<sup>128 <\/sup>times as many keys as AES-128, it means that cracking a 256-bit key would take even longer. Much, much longer!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Which Key Length Is Best?<\/h3>\n\n\n\n<p>With an increase in key length comes an increase in processing power needed, putting AES-256 out of reach of most regular users. AES-128 is the optimum choice for regular business use, striking the balance between security and practicality.<\/p>\n\n\n\n<p>Although clearly, the 128-bit key is weaker than the 192-bit and 256-bit keys, nobody has cracked AES-128 to date, so using AES-128 is still considered secure \u2014 for now. However, AES-256 offers military-grade encryption that\u2019s impossible to break with current processing capabilities, so it\u2019s an option if you have enough processing power.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Economic Impact of AES<\/h2>\n\n\n\n<p>In 2018, NIST published <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/white-paper\/2018\/09\/07\/economic-impacts-of-the-advanced-encryption-standard-1996-2017\/final\">a study<\/a> on the economic impact of AES from 1996 to 2017. The positive economic impact of the program is estimated to be $250 billion over these years, and the report states that the economy as a whole benefited by a ratio of 1976-to-1 against the cost incurred by NIST.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"750\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-1024x750.png\" alt=\"A pie chart showing the percentage breakdown of AES's estimated benefits to the U.S. economy between 1996 and 2016\" class=\"wp-image-2804\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-1024x750.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-300x220.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-560x410.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-1536x1126.png 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-2048x1501.png 2048w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/estimated-benefits-of-aes-encryption-us-economy-940x689.png 940w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption> A chart showing AES&#8217;s percentages of estimated benefits to different sectors of the U.S. economy, totaling nearly $250.6 billion between 1996 and 2016. Data source <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/gcr\/2018\/NIST.GCR.18-017.pdf\">NIST<\/a> (page 27, column 7). <\/figcaption><\/figure>\n\n\n\n<p>The strong encryption provided by AES was integral to the rise of the eCommerce, remote work, and social media apps that we use every day.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on AES Encryption and the AES Algorithm<strong><\/strong><\/h2>\n\n\n\n<p>AES encryption is a system that uses complex mathematics to encrypt data, mainly data at rest (stored data). The algorithm is a block cipher that uses symmetric keys to encrypt the data. Due to its impeccable security, AES is recommended by NIST and the NSA in the US, leading to its acceptance as a trusted standard across the globe.<\/p>\n\n\n\n<p>AES is not only secure but is compatible with hardware, software, and firmware. The algorithm is capable of working on hardware with limited computing capacity making it irreplaceable in ecommerce. We\u2019ll look at how AES encryption works in more detail in the next article.<\/p>\n\n\n\n<p>Never forget that cybercriminals can exploit other weaknesses to access your network, like weak passwords, or badly configured <a href=\"https:\/\/sectigostore.com\/blog\/what-does-a-firewall-do\/\">firewalls<\/a>. AES is not a complete security solution but just one tool you should have in your security toolbox.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption standards have come a long way since they first appeared in the 1970s. The first data encryption standard, DES, is obsolete and the world has moved onto AES encryption&#8230;.<\/p>\n","protected":false},"author":19,"featured_media":2800,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[227,74],"class_list":["post-2797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption","tag-advanced-encryption-standard","tag-aes","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"AES encryption is the U.S. government&#039;s go-to symmetric encryption algorithm to secure data using a single key (it encrypts &amp; decrypts data).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"AES encryption is the U.S. government&#039;s go-to symmetric encryption algorithm to secure data using a single key (it encrypts &amp; decrypts data).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T16:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Megha Thakkar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megha Thakkar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/\"},\"author\":{\"name\":\"Megha Thakkar\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"headline\":\"What Is the Advanced Encryption Standard? AES Encryption Explained\",\"datePublished\":\"2022-02-07T16:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/\"},\"wordCount\":2318,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/aes-encryption-advanced-encryption-standard-feature.jpg\",\"keywords\":[\"Advanced Encryption Standard\",\"AES\"],\"articleSection\":[\"Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/\",\"name\":\"What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/aes-encryption-advanced-encryption-standard-feature.jpg\",\"datePublished\":\"2022-02-07T16:02:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"description\":\"AES encryption is the U.S. government's go-to symmetric encryption algorithm to secure data using a single key (it encrypts & decrypts data).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/aes-encryption-advanced-encryption-standard-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/aes-encryption-advanced-encryption-standard-feature.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-advanced-encryption-standard-aes-encryption-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is the Advanced Encryption Standard? AES Encryption Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\",\"name\":\"Megha Thakkar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"caption\":\"Megha Thakkar\"},\"description\":\"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?).\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights","description":"AES encryption is the U.S. government's go-to symmetric encryption algorithm to secure data using a single key (it encrypts & decrypts data).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/","og_locale":"en_US","og_type":"article","og_title":"What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights","og_description":"AES encryption is the U.S. government's go-to symmetric encryption algorithm to secure data using a single key (it encrypts & decrypts data).","og_url":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/","og_site_name":"InfoSec Insights","article_published_time":"2022-02-07T16:02:00+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg","type":"image\/jpeg"}],"author":"Megha Thakkar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Megha Thakkar","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/"},"author":{"name":"Megha Thakkar","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"headline":"What Is the Advanced Encryption Standard? AES Encryption Explained","datePublished":"2022-02-07T16:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/"},"wordCount":2318,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg","keywords":["Advanced Encryption Standard","AES"],"articleSection":["Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/","url":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/","name":"What Is the Advanced Encryption Standard? AES Encryption Explained - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg","datePublished":"2022-02-07T16:02:00+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"description":"AES encryption is the U.S. government's go-to symmetric encryption algorithm to secure data using a single key (it encrypts & decrypts data).","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/aes-encryption-advanced-encryption-standard-feature.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-advanced-encryption-standard-aes-encryption-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is the Advanced Encryption Standard? AES Encryption Explained"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da","name":"Megha Thakkar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","caption":"Megha Thakkar"},"description":"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?)."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2797"}],"version-history":[{"count":5,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2797\/revisions"}],"predecessor-version":[{"id":2809,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2797\/revisions\/2809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2800"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}