AES Introduction PDF
AES Introduction PDF
0x8c1a3291 0x56de57
0x5f8a153d
axd8c447ae 8820572
5228 0xf32 4856
0x19df c2fe97 0xd61b
White Paper 0x3fe63453 0xa3bdff8
2 0x30e571cf
6a 0x100daa87
0x36e0045b 0xad22db
255ba12 bdff8
0x48df 0x5ef8189b 0x
0xf08cde96
AES Encryption
www.townsendsecurity.com
724 Columbia Street NW, Suite 400 • Olympia, WA 98501 • 360.359.4400 • 800.357.1019 • fax 360.357.9047 • www.townsendsecurity.com
Introduction to AES Encryption by Townsend Security
The AES encryption algorithm is a block cipher that uses Each mode uses AES in a different way. For example,
an encryption key and several rounds of encryption. A ECB encrypts each block of data independently. CTR
block cipher is an encryption algorithm that works on a mode encrypts a 128-bit counter and then adds that value
to the data to encrypt it. CBC mode uses an initialization Key management systems provide a wide variety of
vector and adds the encrypted value of each block to the functions including:
data in the next block before encrypting it. Some modes
require you to only encrypt data that is a multiple of the • Key creation
16-byte block size; others allow you to truncate • Key rotation, or key change
unused data. • Key expiration
• Key import and export
It is important to note that you can use strong encryption • Key usage control
in a weak way resulting in poor security for your sensitive • Secure key storage
data. Using an inappropriate mode of encryption, or • Access controls
using a mode of encryption improperly, can leave • Key escrow, or archival
your data exposed to loss. Fully understanding the • Compliance logging
implications and management requirements of each
mode is a vital part of planning for encryption. A good key management system is crucial for a good
data security strategy.
Data Security And The Law Payment card industry rules for credit card security can
be found here:
A number of federal and state laws have taken effect https://www.pcisecuritystandards.org/document_library
which require or encourage the encryption of sensitive
data. Some examples are the California Privacy
Notification law (SB1386), Massachusetts Privacy
Townsend Security
We know that data gets out, and that it can and routinely
does fall into the wrong hands. When this happens, our
solutions for encryption, key management, and system
logging ensure that your Enterprise is compliant with
regulations and that your sensitive data is protected.
Our data security solutions work on a variety of server
platforms including IBM i, IBM z, Windows, and Linux.
Many of these solutions are currently used by leaders in
retail, health care, banking, and government.
Web: www.townsendsecurity.com
Phone: (800) 357-1019 or (360) 359-4400
International: +1 360 359 4400
Email: [email protected]