<s>
There	O
are	O
various	O
implementations	O
of	O
the	O
Advanced	B-Algorithm
Encryption	I-Algorithm
Standard	I-Algorithm
,	O
also	O
known	O
as	O
Rijndael	B-Algorithm
.	O
</s>
<s>
Rijndael	B-Algorithm
is	O
free	O
for	O
any	O
use	O
public	O
or	O
private	O
,	O
commercial	O
or	O
non-commercial	O
.	O
</s>
<s>
The	O
authors	O
of	O
Rijndael	B-Algorithm
used	O
to	O
provide	O
a	O
homepage	O
for	O
the	O
algorithm	O
.	O
</s>
<s>
Care	O
should	O
be	O
taken	O
when	O
implementing	O
AES	B-Algorithm
in	O
software	O
,	O
in	O
particular	O
around	O
side-channel	O
attacks	O
.	O
</s>
<s>
Encryption	O
of	O
shorter	O
blocks	O
is	O
possible	O
only	O
by	O
padding	B-Algorithm
the	O
source	O
bytes	O
,	O
usually	O
with	O
null	O
bytes	O
.	O
</s>
<s>
This	O
can	O
be	O
accomplished	O
via	O
several	O
methods	O
,	O
the	O
simplest	O
of	O
which	O
assumes	O
that	O
the	O
final	O
byte	O
of	O
the	O
cipher	O
identifies	O
the	O
number	O
of	O
null	O
bytes	O
of	O
padding	B-Algorithm
added	O
.	O
</s>
<s>
Careful	O
choice	O
must	O
be	O
made	O
in	O
selecting	O
the	O
mode	B-Algorithm
of	I-Algorithm
operation	I-Algorithm
of	O
the	O
cipher	O
.	O
</s>
<s>
Another	O
mode	O
,	O
Cipher	O
Block	O
Chaining	O
(	O
CBC	O
)	O
is	O
one	O
of	O
the	O
most	O
commonly	O
used	O
modes	O
of	O
AES	B-Algorithm
due	O
to	O
its	O
use	O
in	O
TLS	O
.	O
</s>
<s>
CBC	O
uses	O
a	O
random	O
initialization	O
vector	O
(	O
IV	B-Application
)	O
to	O
ensure	O
that	O
distinct	O
ciphertexts	O
are	O
produced	O
even	O
when	O
the	O
same	O
plaintext	O
is	O
encoded	O
multiple	O
times	O
.	O
</s>
<s>
The	O
IV	B-Application
can	O
be	O
transmitted	O
in	O
the	O
clear	O
without	O
jeopardizing	O
security	O
.	O
</s>
<s>
A	O
common	O
practice	O
is	O
to	O
prepend	O
the	O
16	O
byte	O
IV	B-Application
to	O
the	O
ciphertext	O
,	O
which	O
gives	O
the	O
decrypter	O
easy	O
access	O
to	O
the	O
IV	B-Application
.	O
</s>
<s>
Care	O
must	O
be	O
taken	O
to	O
use	O
a	O
new	O
IV	B-Application
for	O
every	O
encryption	O
operation	O
,	O
since	O
otherwise	O
an	O
attacker	O
can	O
recover	O
plaintext	O
.	O
</s>
<s>
Current	O
list	O
of	O
FIPS	O
140	O
validated	O
cryptographic	O
modules	O
with	O
validated	O
AES	B-Algorithm
implementations	I-Algorithm
(	O
hosted	O
by	O
NIST	O
)	O
–	O
Most	O
of	O
these	O
involve	O
a	O
commercial	O
implementation	O
of	O
AES	B-Algorithm
algorithms	O
.	O
</s>
<s>
Look	O
for	O
"	O
FIPS-approved	O
algorithms	O
"	O
entry	O
in	O
the	O
"	O
Level	O
/	O
Description	O
"	O
column	O
followed	O
by	O
"	O
AES	B-Algorithm
"	O
and	O
then	O
a	O
specific	O
certificate	O
number	O
.	O
</s>
<s>
The	O
Microsoft	O
AES	B-Algorithm
Cryptographic	O
Provider	O
was	O
introduced	O
in	O
Windows	B-Application
XP	O
and	O
can	O
be	O
used	O
with	O
any	O
version	O
of	O
the	O
Microsoft	O
CryptoAPI	O
.	O
</s>
<s>
Solaris	B-Application
Cryptographic	O
Framework	O
offers	O
multiple	O
implementations	O
,	O
with	O
kernel	B-Operating_System
providers	O
for	O
hardware	O
acceleration	O
on	O
x86	B-Operating_System
(	O
using	O
the	O
Intel	O
AES	B-Algorithm
instruction	I-Algorithm
set	I-Algorithm
)	O
and	O
on	O
SPARC	B-Architecture
(	O
using	O
the	O
SPARC	B-Architecture
AES	B-Algorithm
instruction	I-Algorithm
set	I-Algorithm
)	O
.	O
</s>
<s>
It	O
is	O
available	O
in	O
Solaris	B-Application
and	O
derivatives	O
,	O
as	O
of	O
Solaris	B-Application
10	I-Application
.	O
</s>
<s>
Compact	O
implementation	O
of	O
AES-128	B-Algorithm
encryption	O
in	O
C	O
,	O
x86	B-Operating_System
,	O
AMD64	B-Device
,	O
ARM32	O
and	O
ARM64	O
assembly	O
.	O
</s>
<s>
AES	B-Algorithm
code	O
with	O
optional	O
support	O
for	O
Intel	O
AES	B-Algorithm
NI	O
and	O
VIA	O
ACE	O
by	O
Dr.	O
Brian	O
Gladman	O
.	O
</s>
<s>
Crypto++	B-Language
A	O
comprehensive	O
C++	O
public-domain	O
implementation	O
of	O
encryption	O
and	O
hash	O
algorithms	O
.	O
</s>
<s>
As	O
of	O
version	O
3.5	O
of	O
the	O
.NET	B-Application
Framework	I-Application
,	O
the	O
System.Security.Cryptography	O
namespace	O
contains	O
both	O
a	O
fully	O
managed	O
implementation	O
of	O
AES	B-Algorithm
and	O
a	O
managed	O
wrapper	O
around	O
the	O
CAPI	O
AES	B-Algorithm
implementation	O
.	O
</s>
<s>
M2Crypto	O
–	O
M2Crypto	O
is	O
the	O
most	O
complete	O
OpenSSL	B-Language
wrapper	O
for	O
Python	B-Language
.	O
</s>
<s>
–	O
Python	B-Language
library	O
which	O
exposes	O
cryptographic	O
recipes	O
and	O
primitives	O
.	O
</s>
<s>
Away	O
RJN	O
Cryptography	O
uses	O
Rijndael	B-Algorithm
Algorithm	I-Algorithm
(	O
NIST	O
AES	B-Algorithm
)	O
256-bit	O
Data	O
Blocks	O
,	O
Cipher	O
Key	O
and	O
CTR	O
(	O
Counter	O
Mode	O
)	O
for	O
any	O
and	O
all	O
Document	O
or	O
picture	O
encryption	O
in	O
Windows	B-Application
only	O
.	O
</s>
<s>
Most	O
encrypting	O
file	O
systems	O
use	O
AES	B-Algorithm
,	O
e.g.	O
</s>
<s>
IEEE	B-Protocol
802.11i	I-Protocol
,	O
an	O
amendment	O
to	O
the	O
original	O
IEEE	O
802.11	O
standard	O
specifying	O
security	O
mechanisms	O
for	O
wireless	O
networks	O
,	O
uses	O
AES-128	B-Algorithm
in	O
CCM	O
mode	O
(	O
CCMP	B-Protocol
)	O
.	O
</s>
<s>
The	O
ITU-T	B-General_Concept
G.hn	I-General_Concept
standard	O
,	O
which	O
provides	O
a	O
way	O
to	O
create	O
a	O
high-speed	O
(	O
up	O
to	O
1	O
Gigabit/s	O
)	O
local	B-General_Concept
area	I-General_Concept
network	I-General_Concept
using	O
existing	O
home	O
wiring	O
(	O
power	B-Device
lines	I-Device
,	O
phone	O
lines	O
and	O
coaxial	B-Protocol
cables	I-Protocol
)	O
,	O
uses	O
AES-128	B-Algorithm
for	O
encryption	O
.	O
</s>
<s>
GPG	B-Application
,	O
GPL-licensed	O
,	O
includes	O
AES	B-Algorithm
,	O
AES-192	B-Algorithm
,	O
and	O
AES-256	B-Algorithm
as	O
options	O
.	O
</s>
<s>
supports	O
AES	O
128/256	O
in	O
CBC	O
,	O
ECB	O
and	O
CTR	O
modes	O
for	O
file	O
and	O
folder	O
encryption	O
on	O
the	O
Windows	B-Application
platform	O
.	O
</s>
<s>
Javascrypt	O
Free	O
open-source	O
text	O
encryption	O
tool	O
runs	O
entirely	O
in	O
web	B-Application
browser	I-Application
,	O
send	O
encrypted	O
text	O
over	O
insecure	O
e-mail	O
or	O
fax	O
machine	O
.	O
</s>
<s>
PyEyeCrypt	O
Free	O
open-source	O
text	O
encryption	O
tool/GUI	O
with	O
user-selectable	O
AES	B-Algorithm
encryption	I-Algorithm
methods	O
and	O
PBKDF2	O
iterations	O
.	O
</s>
<s>
Certain	O
games	O
and	O
engines	O
,	O
such	O
as	O
the	O
Rockstar	B-Operating_System
Advanced	I-Operating_System
Game	I-Operating_System
Engine	I-Operating_System
used	O
in	O
Grand	B-Application
Theft	I-Application
Auto	I-Application
IV	I-Application
,	O
use	O
AES	B-Algorithm
to	O
encrypt	O
game	O
assets	O
in	O
order	O
to	O
deter	O
hacking	O
in	O
multiplayer	O
.	O
</s>
<s>
x86-64	B-Device
and	O
ARM	B-Architecture
processors	I-Architecture
include	O
the	O
AES	B-Algorithm
instruction	I-Algorithm
set	I-Algorithm
.	O
</s>
<s>
On	O
IBM	O
zSeries	O
mainframes	O
,	O
AES	B-Algorithm
is	O
implemented	O
as	O
the	O
KM	O
series	O
of	O
assembler	O
opcodes	O
when	O
various	O
Message	O
Security	O
Assist	O
facilities	O
are	O
installed	O
.	O
</s>
<s>
SPARC	B-Architecture
S3	O
core	O
processors	O
include	O
the	O
AES	B-Algorithm
instruction	I-Algorithm
set	I-Algorithm
,	O
which	O
is	O
used	O
with	O
SPARC	B-Device
T4	I-Device
and	O
SPARC	B-Device
T5	I-Device
systems	O
.	O
</s>
