AES encryption

Posted on 2004-11-19
Medium Priority
Last Modified: 2010-04-11
Can someone please explain, in detail, how AES encryption works and why it might be a better solution than using PGP encryption?
Question by:sufabooma
LVL 14

Expert Comment

ID: 12628602
You're comparing apples and oranges.

AES is a 128-bit symmetric cypher. See http://www.esat.kuleuven.ac.be/~rijmen/rijndael/ and http://csrc.nist.gov/CryptoToolkit/aes/rijndael/ for more information on AES.

PGP is a framework for encrypting and signing data. It uses a variety of cryptographic algorithms under the hood to do this. See http://www.pgp.com/ and http://www.gnupg.org/ for more information on PGP.

Accepted Solution

VenkatNarayana earned 500 total points
ID: 12633153
AES is symmetric encryption algorithm. It is successor to DES as new encryption standard.
     AES encrypts data of 128 bit blocks with either 128/196/256 bit key. Brute force attack on encryption key is almost difficult as the key size is large.

   PGP uses asymmetric encryption to encrypt and sign data. Symmetric encrption is faster than asymmetric encryption.


Expert Comment

ID: 12633506
basically PGP is a cryptosystem... it uses both symmetric and asymmetric key cryptosystems.
on the symmetric side PGP uses DES, CAST, Triple DES, or IDEA for encryption

AES is the replacement for Triple DES....  
Hope this puts the pieces together for you....

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question