Properties (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
encryption algorithm
|
gptkbp:developedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:engine |
128 bits
|
gptkbp:hasAppearedIn |
differential cryptanalysis
linear cryptanalysis |
https://www.w3.org/2000/01/rdf-schema#label |
AES 256-bit
|
gptkbp:isAttendedBy |
financial institutions
cloud service providers |
gptkbp:isCompatibleWith |
VPNs
|
gptkbp:isConsidered |
a benchmark for encryption algorithms
a strong encryption method secure against brute-force attacks the gold standard for encryption |
gptkbp:isEvaluatedBy |
cryptanalysis
|
gptkbp:isFoundIn |
3DES
|
gptkbp:isLocatedIn |
software and hardware
Wi-Fi security |
gptkbp:isPartOf |
cryptography
Advanced Encryption Standard encryption standards information security data protection strategies network security protocols data integrity measures |
gptkbp:isRecognizedFor |
NIST
sensitive data protection |
gptkbp:isSuitableFor |
cloud storage security
|
gptkbp:isSupportedBy |
most programming languages
hardware security modules encryption libraries |
gptkbp:isUsedBy |
government agencies
|
gptkbp:isUsedFor |
file encryption
secure file transfer |
gptkbp:isUsedIn |
disk encryption
secure communications industry digital rights management database encryption secure backups |
gptkbp:isUtilizedIn |
gptkb:SSL/TLS
mobile device security IoT security email encryption |
gptkbp:keyIssues |
256 bits
|
gptkbp:notableEvent |
symmetric key algorithm
|
gptkbp:operatesIn |
blocks of data
|
gptkbp:provides |
confidentiality
|
gptkbp:replacedBy |
DES
|
gptkbp:security |
high
|
gptkbp:standardFeatures |
2001
|
gptkbp:supports |
multiple encryption modes
|
gptkbp:usedIn |
data encryption
|