From the course: CompTIA Security+ (SY0-701) Cert Prep: 1 General Security Concepts

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

AES, Blowfish, and Twofish

AES, Blowfish, and Twofish

There are many other symmetric algorithms available to meet the modern encryption needs of organizations. Three of these are the Advanced Encryption Standard, Blowfish, and Twofish. The Advanced Encryption Standard or AES came as the result of a competition led by the National Institute for Standards and Technology to replace the Data Encryption Standard with a more secure alternative. The competition included five algorithms, and the winner was an algorithm called Rijndael which is now better known as AES. Like DES, AES uses a combination of substitution and transposition functions to achieve strong encryption. AES is widely used today in many different cryptographic applications, ranging from web security to encrypted voice communications. Let's take a look at how AES works. I'm logged in to a Linux system that has the AES crypt package installed. AES crypt is an open-source package available for all modern operating systems that you can download from AESCrypt.com. I have a file on…

Contents