Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Algorithms - Part 1 - AES (Advanced Algorithm Standard)
August 21, 2019 •Walt Paley
Let’s talk about cryptographic algorithms. Algs (yes, we’re on a nickname basis, no big deal) provide the backbone for the crypto methods that we use in modern computing, and yet we’re generally willing to just refer to them tangentially, in passing, and without too much scrutiny. This is the first of three blog posts, delivering digestible information on algorithm topics that should be understood individually and in the context of FIPS 140 to help you make better strategic decisions. Let’s start with AES.
It’s gotta be the most popular of the algs, judging by the number of marketing references. Walk around the RSA Conference or the Black Hat expo and count the number of times that you hear “AES” dropped casually into conversation or plastered across booth signage - it’s pretty significant. Why? Well, two reasons. First, because it was established purposefully as the primary go-to algorithm in a competition hosted by NIST. And second, because many marketing folks don’t really understand it.
The selection process of what is actually the Rijndael cipher to become the Advanced Encryption Standard (AES) was actually pretty cool. NIST knew that the Data Encryption Standard (DES) would need to be phased out and replaced with something more resilient for future-proofing, so in 1997, NIST announced a call for submissions. The parameters were defined to be a block cipher, supporting a block size of 128 bits and key sizes of 128, 192, and 256 bits. After several rounds of analysis and debate, Rijndael was announced as the new AES in October of 2000. Developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, the cipher is based on a design principle known as a substitution–permutation network. It’s a fascinating process that we aren’t going to dive into deeper here, but you should check it out if that intrigues you.
To formalize Rijndael as the Advanced Encryption Standard, NIST issued FIPS Publication 197 in November 2001. AES implementations are tested and certified for FIPS 197 as part of the Cryptographic Algorithm Validation Program (CAVP), generally as part of the overall cryptographic module evaluation against the FIPS 140-2 standard. The FIPS 197 CAVP certificate alone does not satisfy procurement requirements for the U.S. federal government, for example, because purchasing officers rely on the FIPS 140-2 validation to confirm that the implementation was completed correctly within the context of cryptographic module. Common Criteria certification is one exception, but that’s a rabbit hole for another day.
This has confused many and has led to many marketers blowing smoke about AES. The existence of FIPS 197 and the public availability of algorithm test vectors spawned an urban legend of sorts, that the use of AES alone met requirements for federal and regulated industries by being “FIPS 197 compliant”. Nothing could be further from the truth. While AES is the workhorse of most cryptographic modules, that’s exactly what it’s designed to do. It’s an oversimplification and fallacy to believe that the AES algorithm by itself is a competitive differentiator or represents compliance of any sort. Lazy marketers who point to AES aren’t doing themselves any favors. It’s like proudly announcing a new sports car that runs on premium unleaded gasoline. That’s not going to garner any accolades, it’s just going to make potential customers think that you don’t actually know what you’re talking about.
So to recap - AES is the Advanced Encryption Standard, the algorithm selected by NIST to be worthy of everyday use, but it is the FIPS 140-2 validated module that opens doors in regulated industries. As an end-user, you must remember that the CMVP certification matters more than the implemented algs. To that point, a cryptographic module can achieve FIPS 140-2 validation without using AES at all! As a marketer, don’t risk damaging your credibility by over-emphasizing AES or any single algorithm. Wait until you have a validated module to promote, and then go to town. (Use SafeLogic and you won’t be waiting long at all. Shameless plug, I know, but hey, it’s our blog.)
I will vacate my soapbox now, but please join me next week for a look at Suite B algorithms.
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)