213.253.216.248 (talk) Undid revision 590827611 by Animesh.roark (talk) |
Animesh.roark (talk | contribs) m Undid revision 590829144 by 213.253.216.248 (talk) do not spam, this is your final warning & your IP will be banned If you spam again! |
||
Line 58: | Line 58: | ||
* [[Private Disk]] |
* [[Private Disk]] |
||
=== Online |
=== Online File Encryption === |
||
[ |
*[https://socialdocs.net/share/encrypt/index.html Online 256-bit AES Encryption] |
||
=== Security for communications in Local Area Networks === |
=== Security for communications in Local Area Networks === |
Revision as of 16:04, 15 January 2014
There are various implementations of the Advanced Encryption Standard, also known as Rijndael.
Libraries
Rijndael is free for any use public or private, commercial or non-commercial. The authors of Rijndael used to provide a homepage[1] for the algorithm. Care should be taken when implementing AES in software. Like most encryption algorithms, Rijndael was designed on big-endian systems. For this reason, little-endian systems return correct test vector results only through swapping bytes of the input and output words.
The algorithm operates on plaintext blocks of 16 bytes. Encryption of shorter blocks is possible only by padding the source bytes, usually with null bytes. This can be accomplished via several methods, the simplest of which assumes that the final byte of the cipher identifies the number of null bytes of padding added.
Careful choice must be made in selecting the mode of operation of the cipher. The simplest mode encrypts and decrypts each 128-bit block separately. In this mode, called "electronic code book (ECB)", blocks that are identical will be encrypted identically, which is entirely insecure. This will make some of the plaintext structure visible in the ciphertext. Selecting other modes, such as empressing a sequential counter over the block prior to encryption (CTR mode) and removing it after decryption avoids this problem.
- Current list of FIPS 197 validated cryptographic modules (hosted by NIST)
- Current list of FIPS 140 validated cryptographic modules with validated AES implementations (hosted by NIST) - Most of these involve a commercial implementation of AES algorithms. Look for "FIPS-approved algorithms" entry in the "Level / Description" column followed by "AES" and then a specific certificate number.
C/ASM library
- OpenSSL
- GnuTLS
- PolarSSL (single header and source file AES implementation AES Source Code)
- Microsoft CryptoAPI uses Cryptographic Service Providers to offer encryption implementations. The Microsoft AES Cryptographic Provider was introduced in Windows XP and can be used with any version of the Microsoft CryptoAPI. [2]
- AES-256 a byte-oriented portable AES-256 implementation in C
- Solaris Cryptographic Framework offers multiple implementations, with kernel providers for hardware acceleration on x86 (using the Intel AES instruction set) and on SPARC (using the SPARC AES instruction set). It is available in Solaris and derivatives, as of Solaris 10.[3]
- OpenAES portable C cryptographic library - Nabil S. Al Ramli
- AES code in C - Brian Gladman
C++ library
- Botan has implemented Rijndael since its very first release in 2001
- Crypto++ A comprehensive C++ semi-public-domain implementation of encryption and hash algorithms. FIPS validated
C# /.NET
- As of version 3.5 of the .NET Framework, the System.Security.Cryptography namespace contains both a fully managed implementation of AES and a managed wrapper around the CAPI AES implementation.
- Bouncy Castle Crypto Library
Java
- Java Cryptography Extension, integrated in the Java Runtime Environment since version 1.4.2
- IAIK JCE
- Bouncy Castle Crypto Library
Applications
Archive and compression tools
File system
- Encrypting File System in Windows 2000 and later Windows versions.[4]
Disk encryption
- DiskCryptor
- BitLocker (part of "Enterprise" and "Ultimate" editions of Windows Vista and Windows 7 operating systems)
- FileVault (part of the Mac OS X operating system, and also the included Disk Utility makes AES-encrypted drive images)
- FreeOTFE
- GBDE
- Geli (software)
- LUKS
- TrueCrypt
- Private Disk
Online File Encryption
Security for communications in Local Area Networks
- IEEE 802.11i, an amendment to the original IEEE 802.11 standard specifying security mechanisms for wireless networks, uses AES-128 in CCM mode.
- The ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 Gigabit/s) Local area network using existing home wiring (power lines, phone lines and coaxial cables), uses AES-128 for encryption.
Miscellaneous
- GPG, GPL-licensed, includes AES, AES-192, and AES-256 as options.
- IPsec
- KeePass Password Safe
- IronKey Uses AES 128-bit and 256-bit CBC-mode hardware encryption
- OpenSSL includes AES cipher support as of version 0.9.7 (released in 2002) and is dual-licensed under the terms of the OpenSSL License and the original SSLeay license. FIPS validated via IBM
- Pidgin (software), has a plugin that allows for AES Encryption
- XFire uses AES-128, AES-192 and AES 256 to encrypt usernames and passwords
- CyaSSL includes AES cipher support YaSSL HomePage
- DataLockerUses AES 256-bit CBC and XTS mode hardware encryption
- Linux kernel's Crypto API, now exposed to userspace
- Network Security Services includes AES cipher support with acceleration by AES instruction set/CLMUL instruction set
Hardware
- Intel and AMD processors include the AES instruction set.
- On IBM zSeries mainframes, AES is implemented as the KM series of assembler opcodes when various Message Security Assist facilities are installed.
- SPARC S3 core processors include the AES instruction set, which is used with SPARC T4 and SPARC T5 systems.
References
- ^ Original homepage and archived copy
- ^ "Microsoft AES Cryptographic Provider".
- ^ "System Administration Guide: Security Services, Chapter 13 Solaris Cryptographic Framework (Overview)". Oracle. September 2010. Retrieved 2012-11-27.
- ^ Encrypting File System in Windows XP and Windows Server 2003