gptkbp:instance_of
|
gptkb:regulations
|
gptkbp:applies_to
|
data encryption
|
gptkbp:defines
|
key sizes
|
gptkbp:describes
|
gptkb:crypt
|
gptkbp:developed_by
|
gptkb:NIST
|
https://www.w3.org/2000/01/rdf-schema#label
|
FIPS PUB 197
|
gptkbp:is_adopted_by
|
gptkb:private_sector
data protection
telecommunications industry
healthcare industry
|
gptkbp:is_based_on
|
Rijndael algorithm
|
gptkbp:is_cited_in
|
gptkb:ISO/_IEC_18033-3
gptkb:academic_research
gptkb:legal_frameworks
policy documents
security audits
|
gptkbp:is_discussed_in
|
gptkb:Documentation
cryptography textbooks
|
gptkbp:is_evaluated_by
|
security frameworks
cryptographic modules
third-party assessors
|
gptkbp:is_implemented_in
|
gptkb:software
gptkb:cloud_services
hardware devices
|
gptkbp:is_part_of
|
FIPS standards
encryption standards
cryptographic standards
information security framework
encryption protocols
data security policies
federal cybersecurity strategy
|
gptkbp:is_recognized_by
|
international standards organizations
|
gptkbp:is_referenced_in
|
gptkb:NIST_SP_800-131_A
gptkb:NIST_Special_Publication_800-38_A
government regulations
security best practices
|
gptkbp:is_related_to
|
gptkb:crypt
data confidentiality
symmetric key cryptography
data breach prevention
|
gptkbp:is_standardized_by
|
gptkb:AES
|
gptkbp:is_subject_to
|
security compliance
|
gptkbp:is_updated_by
|
subsequent FIPS publications
|
gptkbp:is_used_by
|
government agencies
|
gptkbp:is_used_for
|
data integrity
identity verification
network security
secure communications
secure storage
|
gptkbp:is_used_in
|
financial transactions
government contracts
|
gptkbp:publication_year
|
November 26, 2001
|
gptkbp:published_by
|
gptkb:National_Academy_of_Sciences
|
gptkbp:replaces
|
FIPS PUB 46-3
|
gptkbp:requires
|
federal agencies
|
gptkbp:specifies
|
gptkb:blockade
|
gptkbp:supports
|
128-bit key
192-bit key
256-bit key
|
gptkbp:title
|
gptkb:Advanced_Encryption_Standard_(AES)
|
gptkbp:bfsParent
|
gptkb:security
|
gptkbp:bfsLayer
|
4
|