The purpose of this document is to make the Advanced Encryption Standard (AES) Key Wrap algorithm conveniently available to the Internet community. The United States of America has adopted AES as the new encryption standard. The AES Key Wrap algorithm will probably be adopted by the USA for encryption of AES keys. The authors took most of the text in this document from the draft AES Key Wrap posted by NIST.
RFC Downloads
Cited By
- Zuevsky V (2024). Proof of Work and Secure Element in CDN-assisted voting, Digital Government: Research and Practice, 5:3, (1-11), Online publication date: 30-Sep-2024.
- Bicakci K, Crispo B and Oligeri G (2013). LAKE, ACM Transactions on Internet Technology, 13:2, (1-27), Online publication date: 1-Dec-2013.
- Skillen A, Barrera D and van Oorschot P Deadbolt Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, (3-14)
- Marin-Lopez R, Pereniguez F, Bernal F and Gomez A (2010). Secure three-party key distribution protocol for fast network access in EAP-based wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2651-2673), Online publication date: 1-Oct-2010.
- Marin R, Fernandez P and Gomez A 3-party approach for fast handover in EAP-based wireless networks Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1734-1751)
- Crampton J, Lim H and Paterson K What can identity-based cryptography offer to web services? Proceedings of the 2007 ACM workshop on Secure web services, (26-36)
- Lee J, Lee S and Shin S A secure DRM framework for user's domain and key management Proceedings of the 4th international conference on Autonomic and Trusted Computing, (420-429)
Recommendations
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Devoted to the rapid publication of short contributions to information processingIn 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon ...