aboutsummaryrefslogtreecommitdiff
path: root/content/blog/2018-11-28-aes-encryption.md
diff options
context:
space:
mode:
authorChristian Cleberg <hello@cleberg.net>2024-05-01 21:45:52 -0500
committerChristian Cleberg <hello@cleberg.net>2024-05-01 21:45:52 -0500
commitdc1261d703ae1e1a14841b030888e3f87ff7c38f (patch)
tree71139c9021b09704b2d45be3b64d54e2acbae55f /content/blog/2018-11-28-aes-encryption.md
parentba6b552c8256cc2e071c910ef7821c82443f1f82 (diff)
downloadcleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.tar.gz
cleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.tar.bz2
cleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.zip
prettier formatting and rewrap lines
Diffstat (limited to 'content/blog/2018-11-28-aes-encryption.md')
-rw-r--r--content/blog/2018-11-28-aes-encryption.md19
1 files changed, 9 insertions, 10 deletions
diff --git a/content/blog/2018-11-28-aes-encryption.md b/content/blog/2018-11-28-aes-encryption.md
index 5da599e..7c2ff3a 100644
--- a/content/blog/2018-11-28-aes-encryption.md
+++ b/content/blog/2018-11-28-aes-encryption.md
@@ -13,8 +13,7 @@ If you're not familiar with encryption techniques,
National Institute of Standards and Technology, sub-selected from the Rijndael
family of ciphers (128, 192, and 256 bits) in 2001. Furthering its popularity
and status, the US government chose AES as their default encryption method for
-top-secret data, removing the previous standard which had been in place since
-1977.
+top-secret data, removing the previous standard which had been in place since 1977.
AES has proven to be an extremely safe encryption method, with 7-round and
8-round attacks making no material improvements since the release of this
@@ -24,8 +23,8 @@ encryption standard almost two decades ago.
> fastest single-key attacks on round-reduced AES variants [20, 33] so far are
> only slightly more powerful than those proposed 10 years ago [23,24].
>
-> - [Bogdonav, et
-> al.](http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf)
+> - [Bogdonav, et
+> al.](http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf)
# How Secure is AES?
@@ -99,8 +98,8 @@ where feasible:
1. Privacy is a human right and is recognized as a national right in some
countries (e.g., [US Fourth
Amendment](https://www.law.cornell.edu/wex/fourth_amendment)).
-2. "Why not?" Encryption rarely affects performance or speed, so there's
- usually not a reason to avoid it in the first place.
+2. "Why not?" Encryption rarely affects performance or speed, so there's usually
+ not a reason to avoid it in the first place.
3. Your digital identity and activity (texts, emails, phone calls, online
accounts, etc.) are extremely valuable and can result in terrible
consequences, such as identity theft, if leaked to other parties. Encrypting
@@ -110,10 +109,10 @@ where feasible:
devices.
5. Corporations, governments, and other nefarious groups/individuals are
actively looking for ways to collect personal information about anyone they
- can. If someone's data is unencrypted, that person may become a target due
- to the ease of data collection.
+ can. If someone's data is unencrypted, that person may become a target due to
+ the ease of data collection.
​**Read More:**
-- [Federal Information Processing Standards Publication
- 197](http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf)
+- [Federal Information Processing Standards Publication
+ 197](http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf)