Posted on 2014-04-23
Last Modified: 2014-04-23
I assume that AES 256 is the Advanced Encryption standard with 256 bit keys

For AES types, what is the highest AES level, and what is the lowest

Anything else I should know about AES256

Question by:Anthony Lucia
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
LVL 33

Accepted Solution

Dave Howe earned 500 total points
ID: 40018236
I assume that AES 256 is the Advanced Encryption standard with 256 bit keys
That is correct, yes.

For AES types, what is the highest AES level, and what is the lowest
Supported block size is 128 bits, supported key sizes are 128, 192, and 256 bits.

Anything else I should know about AES256
AES is actually called Rijndael, and was the winner of a crypto competition to design the new American standard for encryption. Rijndael actually supports a wider range of block sizes and key sizes, but only the three listed are "officially" supported as AES.  
There is a related-key attack against AES in theory that makes 256 bit keys *weaker* than 192 bit ones. In practice though, this is not considered computationally feasible.
Both WinZip and 7-Zip support AES for encrypting archives (zipfiles)
Truecrypt supports AES for encrypting hard drives.
AES is a possible suite for SSL, and for IPSEC (vpn)

Probably lots more, but that's all I can think of interesting off the top of my head :)

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question