AES system in protecting the use of American government documents globally
To protect the use of American government documents globally, AES has been established. AES system has protected the documents from various attacks. Side-channel attacks are the initial risk where the crypto structure can be attacked through physical execution. Second, numerous keys are generated by the administration, which makes the system prone to attack. Third, Leakage of key caused by carelessness and human errors which risk the information to misuse.
Fourth, Lack of secure channels where the files sent through the system are susceptible to attack. Finally, Attack against a key creating structure creates random numbers where the system can be manipulated to generate the same random number sequence.
AES and DES algorithm is the chosen method by NIST. Initially, NIST focused its assessment on calculating C code’s effectiveness on various phases using different compilers such as Borland C++ 5.0 and DJGPP, speed and memory utilization of the execution of Java, and the statistical arbitrariness of results from the made calculations was the final goal in round 1. In round 1, NIST mainly concentrated on utilizing the 128-bit key size after execution calculation. The encryption and unscrambling of data will evaluate the level of productivity.
On the other hand, the second round identified fifty sex sets of open remarks that were gotten after round 1 and were made available at the AES landing page after the period erupted. Later NIST held a conference that was attended by major technology players.
To identify the worthiness necessities, evaluation criteria, and accommodation prerequisites for the AES were the workshop objectives. NIST agreed that unclassified investigations would be open. Second, both equipment and programming execution denied the accommodation of calculations that could be implemented in fittings. Third, It is interested in the solitary or flexible key length to facilitate the implementation of AES.