7 µW always on Audio feature extraction with filter banks on TSMC 22nm uLL
U.S. unveils advanced encryption standard
![]() |
U.S. unveils advanced encryption standard
By George Leopold, EE Times
December 10, 2001 (3:54 a.m. EST)
URL: http://www.eetimes.com/story/OEG20011205S0060
WASHINGTON The Department of Commerce rolled out a new U.S. encryption standard for the federal government on Tuesday (Dec. 4) in hopes that industry will also embrace it. The Advanced Encryption Standard (AES) relies on the Rijndael symmetric encryption algorithm to protect sensitive government information. "AES will help the nation protect its critical information infrastructures and ensure privacy for personal information about individual Americans," Commerce Secretary Don Evans told an industry group. Evans' approval of the standard is the culmination of a four-year government effort to come up with a secure algorithm for AES. Researchers from 12 different countries submitted encryption algorithms as part of an international competition. The algorithm was selected by Commerce last October and incorporates the Rijndael encryption formula developed by two Belgian cryptogra phers. The algorithm can be used without paying royalty fees, the Commerce Department said. The AES competition required developers to submit algorithms that support key sizes of 128, 192 and 256 bits. For a 128-bit key size, U.S. officials said there are about 340 undecillion (340 followed by 36 zeroes) possible keys. The government said products implementing AES are expected to reach the marketplace soon. It estimated that AES has the potential to remain secure from key exhaustion attacks, a method where attackers constantly search for possible key values, for at least 20 years. The previous government spec, the Data Encryption Standard, lasted about 20 years. Government agencies will use AES to protect "sensitive, but unclassified" data. Industry and other private groups have been urged to use the standard but are not required to adopt AES. Other "block cipher" encryption algorithms are also available. Industry groups have proposed closer cooperation with the government to solve secur ity threats to their networks. Companies "understand that protecting the nation's information infrastructure cannot be done in a vacuum," said Robert Holleyman, president and chief executive of the Business Software Alliance. "Government and the private sector must work together to develop effective solutions to a shared threat."
Related News
- Configurable ARC Processor to Enable Encryption Capability for U.S. Government Satellite Scheduled for Launch In 2006
- U.S. revises encryption regulations
- Xiphera expands its Advanced Encryption Standard portfolio
- Alphacore To Develop Rad-Hard CMOS Standard Cell Library, Meeting DOD Standards, For U.S. Navy
- Altera FPGAs Enable Big Data Storage Security with Advanced Encryption Standard Rates of an Unprecedented 100-Gbps, Full Duplex
Breaking News
- Siemens delivers certified and automated design flows for TSMC 3DFabric technologies
- AheadComputing Raises $21.5M Seed Round and Introduces Breakthrough Microprocessor Architecture Designed for Next Era of General-Purpose Computing
- ZeroPoint Technologies Unveils Groundbreaking Compression Solution to Increase Foundational Model Addressable Memory by 50%
- Breker RISC-V SystemVIP Deployed across 15 Commercial RISC-V Projects for Advanced Core and SoC Verification
- Veriest Solutions Strengthens North American Presence at DVCon US 2025
Most Popular
- Intel in advanced talks to sell Altera to Silverlake
- S2C Teams Up with Arm, Xylon, and ZC Technology to Drive Software-Defined Vehicle Evolution
- Siemens to accelerate customer time to market with advanced silicon IP through new Alphawave Semi partnership
- Breker RISC-V SystemVIP Deployed across 15 Commercial RISC-V Projects for Advanced Core and SoC Verification
- Arteris Revolutionizes Semiconductor Design with FlexGen - Smart Network-on-Chip IP Delivering Unprecedented Productivity Improvements and Quality of Results
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |