From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

AES, Blowfish, and Twofish

AES, Blowfish, and Twofish

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

AES, Blowfish, and Twofish

- [Instructor] There are many other symmetric algorithms available to meet the modern encryption needs of organizations. Three of these are the Advanced Encryption Standard, Blowfish, and Twofish. The Advanced Encryption Standard, or AES, came as a result of a competition led by the National Institute for Standards and Technology to replace the Data Encryption Standard with a more secure alternative. The competition included five algorithms, and the winner was an algorithm called Rijndael, which is now better known as AES. Like DES, AES uses a combination of substitution and transposition functions to achieve strong encryption. AES is widely used today in many different cryptographic applications, ranging from web security to encrypted voice communications. Let's take a look at how AES works. I'm logged in to a Linux system that has the AES Crypt package installed. AES Crypt is an open-source package available for all…

Contents