Advanced Encryption Standard (AES) is a standardization for block cipher published by NIST, the National Institute of Standards and Technology, in 1997.
Block cipher can be seen as a machine or set of instructions that are applied to a fixed length of bits in order to encrypt the data. The algorithms that use the block cipher mechanism are developed under the AES specifications, which replaced the previous Data Encryption Standard (DES).
Keep reading to learn all about the AES standard. Specifically, I’ll cover the popular Rijndael algorithm that won the NIST competition as the chosen AES standard algorithm to ensure data confidentiality.
Let’s start with a brief description of the Rijndael algorithm (pronounced "rain-doll"). This is a Symmetric Key Encryption scheme developed by two Belgian scientists, Vincent Rijmen and Joan Daemen — hence the name, Rijndael Algorithm.
Symmetric encryption refers to the cryptographic algorithm that uses the same (private) key for encryption and decryption. The decryption function is simply the inverse of the encryption function on the data using the same key. This is an efficient cryptographic method that can be used to secure large amounts of data. According to the AES standard, the key length can be 128, 192 or 256 bits for a block cipher of length 128 bits.
This is different from asymmetric encryption, which requires an additional public key verifiable by a certifying authority. Asymmetric encryption is a slower cryptographic process that consumes more resources in comparison — but it provides authenticity and non-repudiation in addition to data confidentiality.
The typical key length size is 2048 bits or higher. Common algorithms used for Asymmetric encryption include:
(Read cryptography & data encryption intros for more on these concepts.)
Now let’s look at the block cipher that is used to implement the Rijndael AES algorithm. The Substitution-Permutation (SP) Network block performs the instructions as specified by the Rijndael algorithm. S is the substitution block, P is the permutation block.
The SP-network takes a plaintext and encryption keys as the input and returns the encrypted ciphertext. The blocks apply several rounds of alternating layers containing Substitution and Permutation operations. The decryption process is simply the reverse operation of these rounds. This process is described in the following steps:
The goal of the AES call for algorithms twofold: To find a cryptographic algorithm candidate that performs better than the preceding DES algorithms and to demonstrate the following security properties for data confidentiality:
In addition to demonstrating the K-Secure and Hermetic security properties, the Rijndael algorithm offers the following key advantages.
The algorithm can be implemented on low-memory devices such as smart cards. Speed improvements can be achieved by using smaller state tables for applications facing lower security requirements. The round transformation operation is parallel by design and the block cipher has no bias toward specific processor architectures.
The algorithm bases its security on well understood mathematical operations across iterative rounds, which means that it does not rely on obscurity or complex processes to guarantee security.
The algorithm can use variable block and key lengths, depending on the evolving security requirements.
One of the important limitations of this block cipher relates to the decryption process and how it may be implemented in different settings:
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.