Member-only story

Encryption: Different standards and Protocols

Gupta Bless
6 min readMar 19, 2023

Source

In a previous blog we already discussed encryption, its limitations and how we use encryption but in this blog we are going to cover encryption standards and its protocol. If you’re interested in learning more about encryption, you can do so by reading my earlier blog post on the subject.:

https://gupta-bless.medium.com/challenges-and-limitations-of-encryption-33b79ed046d4

Why we use Encryption standards and protocols

These encryption standards and protocols are responsible for providing a framework for securely transmitting data over networks, such as the internet, by converting plaintext into ciphertext. These standards not only maintain privacy but also protect sensitive information over the internet. Standards and protocols play a critical role by ensuring the confidentiality, integrity of data. We have different types of encryption protocols and their standards. Let’s discuss them in detail:

Different types of protocols standards

Source

AES (Advanced Encryption Standard)

Advanced Encryption Standard (AES) is a widely used encryption algorithm standard designed to secure sensitive information. AES operates on a fixed block size of 128 bits and supports key sizes of 128, 192, and 256 bits. The algorithm uses a series of transformations, including substitution and permutation in order to encrypt and decrypt data. AES uses symmetric key encryption, meaning the same key is used for both encryption and decryption, making it fast and efficient for large-scale data encryption.

AES has been used in a wide range of applications such as file, disk encryption, over SSL/TLS, also used in WPA and VPN. AES protocol also suits the resource-constrained environment such as embedded systems and mobile devices.

However, AES does have some limitations. AES encryption is vulnerable to brute force attacks, where an attacker tries every possible key combination until the correct one is found. Additionally, AES is limited to a fixed block size of 128…

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Gupta Bless
Gupta Bless

Written by Gupta Bless

Security enthusiast working to secure web for others.

No responses yet

Write a response