This is the trusted encryption standard that is six times faster than Triple DES. It consists of four processes like Byte substitution, shift rows, mix columns and add round key. It is a widely accepted and adopted technique. It has a flexible key length size and there are no attacks against this algorithm till date.
Published in Chapter:
Citizen Data in Distributed Computing Environments: Privacy and Protection Mechanisms
Beaulah Soundarabai P (Christ University (Deemed), Bangalore, India),
Pethuru Raj (Reliance Jio Platforms Ltd., Bangalore, India), and
Zaigham Mahmood (University of Northampton, UK & Shijiazhuang Tiedao University, China)
Copyright: © 2021
|Pages: 21
DOI: 10.4018/978-1-7998-4570-6.ch009
Abstract
Data security is paramount in the increasingly connected world. Securing data, while in transit and rest, and while under usage, is essential for deriving actionable insights out of data heaps. Incorrect or wrong data can lead to incorrect decisions. So, the confidentiality and integrity of data have to be guaranteed through a host of technology-inspired security solutions. Organizational data is kept confidentially by the businesses and governments, often in distant locations (e.g., in cloud environments), though more sensitive data is normally kept in house. As the security mechanisms are getting more sophisticated, cyber security attacks are also becoming more intensive, so there is a constant battle between the organisations and the hackers to be one step ahead of the other. In this chapter, the aim is to discuss various mechanisms of accomplishing citizens' data confidentiality and privacy and to present solution approaches for ensuring impenetrable security for personal data.