{"blog_url":"https://kaeken.hatenablog.com/","description":"AES\uff08Advanced Encryption Standard\uff09 \u6982\u8981\u3068\u7279\u5fb4 \u5206\u985e \u4e0a\u4f4d\u6982\u5ff5\u30fb\u4e0b\u4f4d\u6982\u5ff5 \u30e1\u30ea\u30c3\u30c8 \u30c7\u30e1\u30ea\u30c3\u30c8 \u65e2\u5b58\u3068\u306e\u6bd4\u8f03 \u7af6\u5408 \u5c0e\u5165\u30dd\u30a4\u30f3\u30c8 \u6ce8\u610f\u70b9 \u4eca\u5f8c \u95a2\u9023\u30ad\u30fc\u30ef\u30fc\u30c9 AES\uff08Advanced Encryption Standard\uff09 \u6982\u8981\u3068\u7279\u5fb4 \u5b9a\u7fa9: AES\u306f\u3001\u30a2\u30e1\u30ea\u30ab\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u306b\u3088\u3063\u3066\u5236\u5b9a\u3055\u308c\u305f\u30d6\u30ed\u30c3\u30af\u6697\u53f7\u5316\u6a19\u6e96\u3067\u3059\u3002 \u30d6\u30ed\u30c3\u30af\u9577: 128\u30d3\u30c3\u30c8\u306e\u56fa\u5b9a\u30d6\u30ed\u30c3\u30af\u9577\u3092\u4f7f\u7528\u3057\u307e\u3059\u3002 \u9375\u9577: 128\u30d3\u30c3\u30c8\u3001192\u30d3\u30c3\u30c8\u3001\u307e\u305f\u306f256\u30d3\u30c3\u30c8\u306e\u9375\u9577\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u307e\u3059\u3002 \u69cb\u9020: SPN (Substitution-Permutation Network)\u69cb\u9020\u306b\u2026","width":"100%","version":"1.0","image_url":null,"author_url":"https://blog.hatena.ne.jp/kaeken/","blog_title":"kaeken(\u5609\u6c38\u5cf6\u5065\u53f8)\u30d6\u30ed\u30b0","url":"https://kaeken.hatenablog.com/entry/2025/08/05/000000","author_name":"kaeken","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fkaeken.hatenablog.com%2Fentry%2F2025%2F08%2F05%2F000000\" title=\"AES\uff08Advanced Encryption Standard\uff09 - kaeken(\u5609\u6c38\u5cf6\u5065\u53f8)\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["Security"],"height":"190","published":"2025-08-05 00:00:00","provider_name":"Hatena Blog","title":"AES\uff08Advanced Encryption Standard\uff09","provider_url":"https://hatena.blog"}