About 275,000 results
Open links in new tab
  1. encryption - How secure is AES-256? - Cryptography Stack Exchange

    Apr 1, 2012 · The cipher AES-256 is used among other places in SSL/TLS across the Internet. It's considered among the top ciphers. In theory it's not crackable since the combinations of keys are …

  2. how does AES encryption's algorithm actually work?

    Oct 23, 2015 · AES is described as a sequence of elementary operations called rounds; rounds are (mostly) identical except that they use distinct subkeys (extracted from the main encryption key), and …

  3. encryption - Why use RSA-2048 for plaintext when AES-256 is much …

    Jun 8, 2017 · Why do we use RSA encryption for ANY text/communication/data encryption when everybody on internet is writing that AES-256 is much stronger than RSA-2048? If this is true, why …

  4. Is AES-256 a post-quantum secure cipher or not?

    AES-256 is generally considered which is why no need for a post quantum counterpart. This is why I prefer "Quantum-Safe Cryptography" to denote all algorithms that are safe against quantum …

  5. RSA maximum bytes to encrypt, comparison to AES in terms of security?

    Mar 30, 2013 · Performance of encryption and decryption for the actual conversation data is very good. In terms of level of security, it doesn't really make much sense to compare RSA and AES.

  6. How does AES GCM encryption work - Cryptography Stack Exchange

    Jul 21, 2022 · Auth tag: the output of AES GCM when encrypting and decrypting needs it Can I prepend it to the encrypted cipher text so it's instantly available when decrypting? Or does it need to be …

  7. encryption - Why would I ever use AES-256-CBC if AES-256-GCM is …

    Apr 22, 2018 · If all of your systems support AES-256-GCM, and have the resources to run it, and have a higher security need, then use AES-256-GCM. For example, I have systems that do not support …

  8. Is AES encryption vulnerable? - Information Security Stack Exchange

    May 8, 2014 · I was reading weaknesses in AES encryption. Unfortunately, I have a website that uses AES: Its database is almost entirely AES encrypted. Is there a real threat? Would it be worth to …

  9. How long does a good AES encryption take?

    Mar 22, 2017 · AES itself is very fast. Your 'over a 1000 hash iterations' suggests you are using a Password-Based encryption scheme, which is different from plain AES. The Password-Based Key …

  10. aes gcm - Why GCM operation mode with AES-128 is recomended and …

    It happens that on the internet I often find that AES encryption should use a 128-bit key only if it is used in conjunction with the GCM mode of operation. Why only with 128-bit keys? What happen...