Infokommunikacionnye tehnologiiInfokommunikacionnye tehnologii2073-3909Povolzhskiy State University of Telecommunications and Informatics5627310.18469/ikt.2017.15.4.08Research ArticleON AES STANDARD IMPLEMENTATION FOR CORPORATE NETWORKSSakit Gambay ogluS. Ginfo_tel@inbox.ruNagiyevaAbabil Faxraddin qızınagiyevaababil@gmail.comAzerbaijan Technological University, Ganja, Azerbaijan1512201715436637020122020Copyright © 2017, Sakit Gambay oglu S.G., Nagiyeva A.F.2017In this article corporate information protection by data encryption is considered. For plaintext encryption the usage of Rijndael algorithm is proposed. The algorithm operates on sequences of blocks called “states”. Encryption involves four transformation stages named as follows: SubByte, ShiftRows, MixColumns and AddRoundKey. In the article an example of AES encryption of a typical plaintext representing a corporate mail is shown. It is confirmed that ciphertext length (160 bytes) is almost the same as plaintext length (159 bytes), which corresponds to the requirements. Field test results show the advantages of the proposed encryption method for telecommunication systems with limited computational capabilities.Shift Rowsinformation protectioncorporate networkscryptographydata encryptionplaintextRijndael algorithmAdvanced Encryption StandardAESiterative transformationsSubByteShiftRowsMixColumnsAddRoundKeycorporate mailзащита информациикорпоративные сетикриптографияшифрование данныхоткрытые текстыалгоритм Rijndaelстандарт AESитерационные превращенияпроцедуры Sub ByteMix Columns и Add Round Key[Нагиева А. Ф. Корпоративные сети и проблемы Безопасности // Молодой ученый (Казань). № 29 (133), 2016. - С. С. 34-36.][Шаньгин В.Ф. Информационная безопасность компьютерных систем и сетей. М.: ИД «Форум-Инфра-М», 2011. - С. 45-48.][Əliquliyev R.M. İmamverdiyev Y.M. Kriptoqrafiyanın əsasları // İnformasiya texnologiyaları (Bakı) //. 2006. - С. 688.][Əliquliyev R.M., İmamverdiyev Y.M. Kriptografiya tarixi // İnformasiya texbologiyaları (Bakı), 2006. - С. 190-192.][Cheswick W., Bellovin S., Addison W. Firewalls and Internet security // URL: http://www. Anatoy.Su.Oz.au/danny/bookreview//firewals_ and_Internet Security. html (д.о. 15.12.2016).][Şeker Şadi Evren. AES (Advanced Encryption Standard) Kriptoloji. // http: //www.bilgisayar kavramlari. html (д.о. 20.12.2016).][Bender W., Gruhl D., Morimoto N., Lu A. Techniques for data hiding // IBM Systems Journal. Vol. 45, №3&4, 2006. - P. 336.][Bassard J. Modern Cryptology // Springer-Verlag, Berlin- Heidelberg. №23, 2008. - P. 103-106.][Cachin C. An Information-Theoretic Model for Cryptology // Lecture Notes in Computer Science. Springer, №10, 2008. - P. 23-26.][Nabiyev V.V. İç- içe bölütlenmiş gizli görüntü paylaşım şeması // 2014 İEEE 22nd Signal Processing and Communications Applications Conference, Trabzon, 2014. - P. 2074-2077.]