{"id":895,"date":"2025-08-04T00:37:16","date_gmt":"2025-08-04T00:37:16","guid":{"rendered":"https:\/\/burakdonmezdev.com\/wordpress\/?p=895"},"modified":"2025-08-04T00:40:21","modified_gmt":"2025-08-04T00:40:21","slug":"cryptology","status":"publish","type":"post","link":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/","title":{"rendered":"International Encryption Standards"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">International Encryption Standards<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">What is Encryption?<\/h2>\n\n\n\n<p>Encryption (cryptography) is an information security technique used to ensure the confidentiality and integrity of data. In its simplest form, data is transformed into an unreadable format (ciphertext), which can only be decrypted by users who possess the correct key.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">International Organizations and the Standardization Process<\/h2>\n\n\n\n<p>Several major institutions around the world define and approve encryption standards:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NIST<\/strong> (National Institute of Standards and Technology \u2013 USA)<\/li>\n\n\n\n<li><strong>ISO<\/strong> (International Organization for Standardization)<\/li>\n\n\n\n<li><strong>IETF<\/strong> (Internet Engineering Task Force)<\/li>\n\n\n\n<li><strong>FIPS<\/strong> (Federal Information Processing Standards \u2013 USA)<\/li>\n\n\n\n<li><strong>ENISA<\/strong> (European Union Agency for Cybersecurity)<\/li>\n\n\n\n<li><strong>ITU-T<\/strong> (International Telecommunication Union \u2013 Telecommunication Standardization Sector)<\/li>\n<\/ul>\n\n\n\n<p>These organizations test, standardize, and document the security of cryptographic algorithms used in both public and private sectors.<\/p>\n\n\n<div class=\"tpgb-empty-space tpgb-block-afcf_895 \"><\/div>\n\n\n<div class=\"tpgb-wrap-2dd4_895  tpgb-view-animation tpgb-anim-dur-normal\" data-animationsetting=\"{&quot;anime&quot;:{&quot;md&quot;:&quot;flipInX&quot;}}\"><div class=\"wp-block-tpgb-tp-image tpgb-image tpgb-block-2dd4_895\"><figure class=\"tpgb-figure\"><img loading=\"lazy\" decoding=\"async\" width=\"917\" height=\"392\" src=\"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/Cryptologybanner.webp\" alt=\"Illustration of a cybersecurity analyst in a suit working at a computer with a digital world map in the background, representing global cyber operations.\" class=\"tpgb-img-inner wp-image-885\" loading=\"lazy\" title=\"International Encryption Standards\" srcset=\"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/Cryptologybanner.webp 917w, https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/Cryptologybanner-300x128.webp 300w, https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/Cryptologybanner-768x328.webp 768w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><\/figure><\/div><\/div>\n\n\n<div class=\"tpgb-empty-space tpgb-block-9914_895 \"><\/div>\n\n\n<h2 class=\"wp-block-heading\">Common and Widely Accepted Encryption Standards<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd38 1. AES (Advanced Encryption Standard)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organization<\/strong>: NIST (USA)<\/li>\n\n\n\n<li><strong>Year<\/strong>: 2001<\/li>\n\n\n\n<li><strong>Type<\/strong>: Symmetric encryption algorithm<\/li>\n\n\n\n<li><strong>Usage<\/strong>: Finance systems, government agencies, VPNs, Wi-Fi security (WPA2), etc.<\/li>\n\n\n\n<li>Available in <strong>AES-128, AES-192, AES-256<\/strong> variants.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd38 2. RSA (Rivest\u2013Shamir\u2013Adleman)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Developed at<\/strong>: MIT, later approved by NIST and others<\/li>\n\n\n\n<li><strong>Type<\/strong>: Asymmetric encryption algorithm (public\/private key)<\/li>\n\n\n\n<li><strong>Usage<\/strong>: Digital signatures, SSL\/TLS, email security.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd38 3. SHA (Secure Hash Algorithms)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organization<\/strong>: NIST<\/li>\n\n\n\n<li><strong>Type<\/strong>: Hash algorithms used to ensure data integrity<\/li>\n\n\n\n<li><strong>Note<\/strong>: SHA-1 is now considered insecure; SHA-2 and SHA-3 are recommended.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd38 4. TLS (Transport Layer Security)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organization<\/strong>: IETF<\/li>\n\n\n\n<li><strong>Type<\/strong>: Ensures secure data transmission over the internet<\/li>\n\n\n\n<li><strong>Usage<\/strong>: HTTPS, VPNs, email protocols.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd38 5. ECC (Elliptic Curve Cryptography)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Standardized by<\/strong>: NIST<\/li>\n\n\n\n<li><strong>Type<\/strong>: Offers equivalent security to RSA but with smaller keys<\/li>\n\n\n\n<li><strong>Usage<\/strong>: Mobile devices, IoT systems, digital signatures.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Other Standards at European and Global Level<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd39 ISO\/IEC 27001 \u2013 Information Security Management<\/h3>\n\n\n\n<p>Cryptography is part of the policies defined in an information security management system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd39 ENISA Guidelines<\/h3>\n\n\n\n<p>Provides recommendations in Europe for cryptographic key management and encryption strategy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd39 FIPS 140-3 \u2013 Cryptographic Module Validation<\/h3>\n\n\n\n<p>A U.S. government standard that defines security levels for cryptographic systems.<\/p>\n\n\n<div class=\"tpgb-empty-space tpgb-block-4b73_895 \"><\/div>\n\n\n<div class=\"tpgb-wrap-77fa_895  tpgb-view-animation tpgb-anim-dur-normal\" data-animationsetting=\"{&quot;anime&quot;:{&quot;md&quot;:&quot;flipInX&quot;}}\"><div class=\"wp-block-tpgb-tp-image tpgb-image tpgb-block-77fa_895\"><figure class=\"tpgb-figure\"><img loading=\"lazy\" decoding=\"async\" width=\"917\" height=\"418\" src=\"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptology2-1.webp\" alt=\"Digital illustration of a padlock and key placed over binary code, symbolizing data encryption, cybersecurity, and secure information access.\" class=\"tpgb-img-inner wp-image-887\" loading=\"lazy\" title=\"International Encryption Standards\" srcset=\"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptology2-1.webp 917w, https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptology2-1-300x137.webp 300w, https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptology2-1-768x350.webp 768w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><\/figure><\/div><\/div>\n\n\n<div class=\"tpgb-empty-space tpgb-block-4b1e_895 \"><\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Personal Reflection: Cryptography is Not Just Technical, It\u2019s Strategic<\/h2>\n\n\n\n<p>In my view, cryptographic standards are not only technical tools but also political and economic instruments. Some countries are developing their own national encryption algorithms (e.g., China \u2013 SM4, Russia \u2013 GOST), but internationally accepted standards still dominate due to their proven interoperability and global trust.<\/p>\n\n\n\n<p>Furthermore, with post-quantum cryptography discussions accelerating, it\u2019s inevitable that current standards will eventually be replaced by quantum-resistant algorithms. I believe that open, transparent, and widely accepted standards will be more sustainable in this transition process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>NIST \u2013 <a class=\"\" href=\"https:\/\/www.nist.gov\">https:\/\/www.nist.gov<\/a><\/li>\n\n\n\n<li>ISO\/IEC 27001 \u2013 <a class=\"\" href=\"https:\/\/www.iso.org\">https:\/\/www.iso.org<\/a><\/li>\n\n\n\n<li>IETF TLS Standard \u2013 <a class=\"\" href=\"https:\/\/datatracker.ietf.org\/wg\/tls\">https:\/\/datatracker.ietf.org\/wg\/tls<\/a><\/li>\n\n\n\n<li>ENISA Guidelines \u2013 <a class=\"\" href=\"https:\/\/www.enisa.europa.eu\">https:\/\/www.enisa.europa.eu<\/a><\/li>\n\n\n\n<li>FIPS 140-3 \u2013 <a class=\"\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/3\/final\">https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/3\/final<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>International Encryption Standards What is Encryption? Encryption (cryptography) is an information security technique used to ensure the confidentiality and integrity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":922,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tpgb_global_settings":"","_surecart_dashboard_logo_width":"180px","_surecart_dashboard_show_logo":true,"_surecart_dashboard_navigation_orders":true,"_surecart_dashboard_navigation_invoices":true,"_surecart_dashboard_navigation_subscriptions":true,"_surecart_dashboard_navigation_downloads":true,"_surecart_dashboard_navigation_billing":true,"_surecart_dashboard_navigation_account":true,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Global Encryption Standards | AES, RSA, TLS, SHA Explained<\/title>\n<meta name=\"description\" content=\"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global Encryption Standards | AES, RSA, TLS, SHA Explained\" \/>\n<meta property=\"og:description\" content=\"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/\" \/>\n<meta property=\"og:site_name\" content=\"Burak D\u00f6nmez\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-04T00:37:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-04T00:40:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"502\" \/>\n\t<meta property=\"og:image:height\" content=\"502\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#\\\/schema\\\/person\\\/2d0b0d079b1f4806a2fd22f33847fdaa\"},\"headline\":\"International Encryption Standards\",\"datePublished\":\"2025-08-04T00:37:16+00:00\",\"dateModified\":\"2025-08-04T00:40:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/\"},\"wordCount\":434,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cryptologyfeature-1.webp\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/\",\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/\",\"name\":\"Global Encryption Standards | AES, RSA, TLS, SHA Explained\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cryptologyfeature-1.webp\",\"datePublished\":\"2025-08-04T00:37:16+00:00\",\"dateModified\":\"2025-08-04T00:40:21+00:00\",\"description\":\"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#primaryimage\",\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cryptologyfeature-1.webp\",\"contentUrl\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cryptologyfeature-1.webp\",\"width\":502,\"height\":502,\"caption\":\"\u0130leri dijital g\u00fcvenlik ve \u015fifrelemeyi simgeleyen devre kart\u0131 desenli alt\u0131n asma kilit, f\u00fct\u00fcristik mavi teknoloji aray\u00fcz\u00fc arka plan\u0131na yerle\u015ftirilmi\u015ftir.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/blog\\\/cyberblog\\\/cryptology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#website\",\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/\",\"name\":\"Burak D\u00f6nmez\",\"description\":\"FullStack Developer\",\"publisher\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#organization\",\"name\":\"Burak D\u00f6nmez\",\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cropped-logo-4.png\",\"contentUrl\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cropped-logo-4.png\",\"width\":200,\"height\":67,\"caption\":\"Burak D\u00f6nmez\"},\"image\":{\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/#\\\/schema\\\/person\\\/2d0b0d079b1f4806a2fd22f33847fdaa\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\"],\"url\":\"https:\\\/\\\/burakdonmezdev.com\\\/wordpress\\\/author\\\/burakdonmezen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global Encryption Standards | AES, RSA, TLS, SHA Explained","description":"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/","og_locale":"en_US","og_type":"article","og_title":"Global Encryption Standards | AES, RSA, TLS, SHA Explained","og_description":"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.","og_url":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/","og_site_name":"Burak D\u00f6nmez","article_published_time":"2025-08-04T00:37:16+00:00","article_modified_time":"2025-08-04T00:40:21+00:00","og_image":[{"width":502,"height":502,"url":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#article","isPartOf":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/"},"author":{"name":"admin","@id":"https:\/\/burakdonmezdev.com\/wordpress\/#\/schema\/person\/2d0b0d079b1f4806a2fd22f33847fdaa"},"headline":"International Encryption Standards","datePublished":"2025-08-04T00:37:16+00:00","dateModified":"2025-08-04T00:40:21+00:00","mainEntityOfPage":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/"},"wordCount":434,"commentCount":0,"publisher":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#primaryimage"},"thumbnailUrl":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/","url":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/","name":"Global Encryption Standards | AES, RSA, TLS, SHA Explained","isPartOf":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#primaryimage"},"image":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#primaryimage"},"thumbnailUrl":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp","datePublished":"2025-08-04T00:37:16+00:00","dateModified":"2025-08-04T00:40:21+00:00","description":"Explore international encryption standards like AES, RSA, SHA, and TLS. Learn how NIST, ISO, and IETF shape secure global communication protocols.","breadcrumb":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#primaryimage","url":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp","contentUrl":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp","width":502,"height":502,"caption":"\u0130leri dijital g\u00fcvenlik ve \u015fifrelemeyi simgeleyen devre kart\u0131 desenli alt\u0131n asma kilit, f\u00fct\u00fcristik mavi teknoloji aray\u00fcz\u00fc arka plan\u0131na yerle\u015ftirilmi\u015ftir."},{"@type":"BreadcrumbList","@id":"https:\/\/burakdonmezdev.com\/wordpress\/blog\/cyberblog\/cryptology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/burakdonmezdev.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Cryptology"}]},{"@type":"WebSite","@id":"https:\/\/burakdonmezdev.com\/wordpress\/#website","url":"https:\/\/burakdonmezdev.com\/wordpress\/","name":"Burak D\u00f6nmez","description":"FullStack Developer","publisher":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/burakdonmezdev.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/burakdonmezdev.com\/wordpress\/#organization","name":"Burak D\u00f6nmez","url":"https:\/\/burakdonmezdev.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/burakdonmezdev.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cropped-logo-4.png","contentUrl":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cropped-logo-4.png","width":200,"height":67,"caption":"Burak D\u00f6nmez"},"image":{"@id":"https:\/\/burakdonmezdev.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/burakdonmezdev.com\/wordpress\/#\/schema\/person\/2d0b0d079b1f4806a2fd22f33847fdaa","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/burakdonmezdev.com\/wordpress"],"url":"https:\/\/burakdonmezdev.com\/wordpress\/author\/burakdonmezen\/"}]}},"tpgb_featured_images":{"full":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp",502,502,false],"tp-image-grid":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1-700x700.webp",700,700,true],"thumbnail":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1-150x150.webp",150,150,true],"medium":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1-300x300.webp",300,300,true],"medium_large":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp",502,502,false],"large":["https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/uploads\/2025\/08\/cryptologyfeature-1.webp",502,502,false],"default":"https:\/\/burakdonmezdev.com\/wordpress\/wp-content\/plugins\/the-plus-addons-for-block-editor\/assets\/images\/tpgb-placeholder.jpg"},"tpgb_post_meta_info":{"get_date":"August 4, 2025","get_modified_date":"August 4, 2025","category_list":{"category":[{"term_id":1,"name":"Uncategorized","slug":"uncategorized","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":2,"filter":"raw"}],"post_tag":false,"post_format":false},"author_name":"admin","author_url":"https:\/\/burakdonmezdev.com\/wordpress\/author\/burakdonmezen\/","author_email":"Burakdonmez.en@gmail.com","author_website":"https:\/\/burakdonmezdev.com\/wordpress","author_description":"","author_facebook":"","author_twitter":"","author_instagram":"","author_role":["administrator"],"author_firstname":"","author_lastname":"","user_login":"Burakdonmezen","author_avatar":"<img alt='' src='https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=200&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=400&#038;d=mm&#038;r=g 2x' class='avatar avatar-200 photo' height='200' width='200' decoding='async'\/>","author_avatar_url":"https:\/\/secure.gravatar.com\/avatar\/69ca26bd7ef70a8899bd7ce9f6929d5f5441863d2890c952b37431942f913c30?s=96&d=mm&r=g","comment_count":0,"post_likes":0,"post_views":0},"tpgb_post_category":{"category":"<a href=\"https:\/\/burakdonmezdev.com\/wordpress\/category\/uncategorized\/\" alt=\"Uncategorized\"  class=\"category-uncategorized\">Uncategorized<\/a> "},"_links":{"self":[{"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/posts\/895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/comments?post=895"}],"version-history":[{"count":2,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/posts\/895\/revisions"}],"predecessor-version":[{"id":899,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/posts\/895\/revisions\/899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/media\/922"}],"wp:attachment":[{"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/media?parent=895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/categories?post=895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/burakdonmezdev.com\/wordpress\/wp-json\/wp\/v2\/tags?post=895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}