id
stringlengths
1
5
text
stringlengths
472
972
title
stringclasses
280 values
embeddings
listlengths
768
768
5101
in 358 "Semi-Arianism". This is considered unfair by Kelly who states that some members of the group were virtually orthodox from the start but disliked the adjective "homoousios" while others had moved in that direction after the out-and-out Arians had come into the open. The debates among these groups resulted in numerous synods, among them the Council of Sardica in 343, the Council of Sirmium in 358 and the double Council of Rimini and Seleucia in 359, and no fewer than fourteen further creed formulas between 340 and 360, leading the pagan observer Ammianus Marcellinus to comment sarcastically: "The highways
Arianism
[ 0.3132662773132324, -0.10449479520320892, -0.2804642617702484, -0.045217160135507584, -0.8348614573478699, 0.24676746129989624, 0.9056880474090576, 0.11371520161628723, 0.011121170595288277, -0.3597070276737213, 0.28090420365333557, 0.3522423207759857, -0.47447848320007324, 0.3006697893142...
5102
were covered with galloping bishops." None of these attempts were acceptable to the defenders of Nicene orthodoxy: writing about the latter councils, Saint Jerome remarked that the world "awoke with a groan to find itself Arian." After Constantius' death in 361, his successor Julian, a devotee of Rome's pagan gods, declared that he would no longer attempt to favor one church faction over another, and allowed all exiled bishops to return; this resulted in further increasing dissension among Nicene Christians. The Emperor Valens, however, revived Constantius' policy and supported the "Homoian" party, exiling bishops and often using force. During this
Arianism
[ 0.1813765913248062, -0.5037723183631897, -0.4638369083404541, 0.20860858261585236, -0.9757219552993774, 0.2808498740196228, 0.7744460701942444, 0.5182051062583923, -0.16900020837783813, -0.04661259800195694, -0.023128101602196693, 0.4963245391845703, -0.8294516801834106, 0.1972980797290802...
5103
persecution many bishops were exiled to the other ends of the Empire (e.g., St Hilary of Poitiers to the Eastern provinces). These contacts and the common plight subsequently led to a rapprochement between the Western supporters of the Nicene Creed and the "homoousios" and the Eastern semi-Arians. It was not until the co-reigns of Gratian and Theodosius that Arianism was effectively wiped out among the ruling class and elite of the Eastern Empire. Theodosius' wife St Flacilla was instrumental in his campaign to end Arianism. Valens died in the Battle of Adrianople in 378 and was succeeded by Theodosius I,
Arianism
[ -0.033330727368593216, -0.4022790491580963, -0.33881399035453796, 0.2957448959350586, -0.8859609961509705, 0.40630635619163513, 1.0125694274902344, 0.440375417470932, -0.4474102556705475, -0.2586749494075775, 0.053306035697460175, 0.3884504437446594, -0.7091852426528931, 0.3232506811618805...
5104
who adhered to the Nicene Creed. This allowed for settling the dispute. Two days after Theodosius arrived in Constantinople, 24 November 380, he expelled the Homoiousian bishop, Demophilus of Constantinople, and surrendered the churches of that city to Gregory Nazianzus, the leader of the rather small Nicene community there, an act which provoked rioting. Theodosius had just been baptized, by bishop Acholius of Thessalonica, during a severe illness, as was common in the early Christian world. In February he and Gratian had published an edict that all their subjects should profess the faith of the bishops of Rome and Alexandria
Arianism
[ 0.16642755270004272, -0.2922825217247009, -0.4716966152191162, 0.21967381238937378, -0.7096405029296875, 0.3250076472759247, 0.893425703048706, 0.1774197816848755, -0.18271483480930328, -0.06950308382511139, 0.013691001571714878, 0.32467442750930786, -0.9087374210357666, 0.1950425952672958...
5105
(i.e., the Nicene faith), or be handed over for punishment for not doing so. Although much of the church hierarchy in the East had opposed the Nicene Creed in the decades leading up to Theodosius' accession, he managed to achieve unity on the basis of the Nicene Creed. In 381, at the Second Ecumenical Council in Constantinople, a group of mainly Eastern bishops assembled and accepted the Nicene Creed of 381, which was supplemented in regard to the Holy Spirit, as well as some other changes: see Comparison between Creed of 325 and Creed of 381. This is generally considered
Arianism
[ 0.06120371073484421, -0.4869978725910187, -0.4006827771663666, -0.08598924428224564, -0.9100291132926941, 0.2951967716217041, 0.7057119607925415, 0.08273648470640182, -0.1791069209575653, -0.25731953978538513, -0.05209945887327194, 0.3595259487628937, -0.5741726756095886, 0.014849209226667...
5106
the end of the dispute about the Trinity and the end of Arianism among the Roman, non-Germanic peoples. During the time of Arianism's flowering in Constantinople, the Gothic convert and Arian bishop Ulfilas (later the subject of the letter of Auxentius cited above) was sent as a missionary to the Gothic tribes across the Danube, a mission favored for political reasons by the Emperor Constantius II. Ulfilas' translation of the Bible in Gothic language and his initial success in converting the Goths to Arianism was strengthened by later events; the conversion of Goths led to a widespread diffusion of Arianism
Arianism
[ 0.07443126291036606, -0.13587655127048492, -0.36519744992256165, -0.06615304946899414, -0.5349316000938416, 0.5285310745239258, 0.8362036943435669, 0.28171464800834656, -0.13869571685791016, -0.2865370512008667, -0.20809513330459595, 0.0959324985742569, -0.7546170353889465, 0.3392395079135...
5107
among other Germanic tribes as well (Vandals, Longobards, Svevi and Burgundians). When the Germanic peoples entered the provinces of the Western Roman Empire and began founding their own kingdoms there, most of them were Arian Christians. The conflict in the 4th century had seen Arian and Nicene factions struggling for control of Western Europe. In contrast, among the Arian German kingdoms established in the collapsing Western Empire in the 5th century were entirely separate Arian and Nicene Churches with parallel hierarchies, each serving different sets of believers. The Germanic elites were Arians, and the Romance majority population was Nicene. The
Arianism
[ 0.1332685500383377, -0.5156054496765137, -0.2300417721271515, -0.013259024359285831, -1.0220979452133179, 0.17346027493476868, 0.9913876056671143, 0.6071575284004211, -0.15301066637039185, -0.16057579219341278, -0.03266412019729614, 0.19173413515090942, -0.49244657158851624, 0.425099611282...
5108
Arian Germanic tribes were generally tolerant towards Nicene Christians and other religious minorities, including the Jews. However, the Vandals tried for several decades to force their Arian beliefs on their North African Nicene subjects, exiling Nicene clergy, dissolving monasteries, and exercising heavy pressure on non-conforming Nicene Christians. The apparent resurgence of Arianism after Nicaea was more an anti-Nicene reaction exploited by Arian sympathizers than a pro-Arian development. By the end of the 4th century it had surrendered its remaining ground to Trinitarianism. In Western Europe, Arianism, which had been taught by Ulfilas, the Arian missionary to the Germanic tribes, was
Arianism
[ 0.20947057008743286, -0.2705081105232239, -0.5438644289970398, -0.1811828911304474, -1.0496413707733154, 0.4647725224494934, 0.8468979001045227, 0.7255244255065918, -0.008263087831437588, -0.17609025537967682, -0.2779928743839264, 0.5595518946647644, -0.5843948721885681, 0.3187821209430694...
5109
dominant among the Goths, Longobards and Vandals. By the 8th century, it had ceased to be the tribes' mainstream belief as the tribal rulers gradually came to adopt Nicene orthodoxy. This trend began in 496 with Clovis I of the Franks, then Reccared I of the Visigoths in 587 and Aripert I of the Lombards in 653. The Franks and the Anglo-Saxons were unlike the other Germanic peoples in that they entered the Western Roman Empire as Pagans and were forcibly converted to Chalcedonian Christianity by their kings, Clovis I and Æthelberht of Kent (see also Christianity in Gaul and
Arianism
[ 0.057471487671136856, -0.5838879942893982, -0.2529745399951935, -0.02925807796418667, -0.9217879772186279, 0.3197173774242401, 0.9230242371559143, 0.6370201110839844, -0.23771177232265472, -0.052183397114276886, -0.1110784262418747, 0.3750587999820709, -0.26119691133499146, 0.2133692502975...
5110
Christianisation of Anglo-Saxon England). The remaining tribes – the Vandals and the Ostrogoths – did not convert as a people nor did they maintain territorial cohesion. Having been militarily defeated by the armies of Emperor Justinian I, the remnants were dispersed to the fringes of the empire and became lost to history. The Vandalic War of 533–534 dispersed the defeated Vandals. Following their final defeat at the Battle of Mons Lactarius in 553, the Ostrogoths went back north and (re)settled in south Austria. Much of south-eastern Europe and central Europe, including many of the Goths and Vandals respectively, had embraced
Arianism
[ -0.14435793459415436, -0.6087824106216431, -0.17380504310131073, -0.22023053467273712, -0.9630471467971802, 0.42448973655700684, 1.2189817428588867, 0.5335885882377625, -0.22945308685302734, -0.1177220270037651, -0.14251264929771423, -0.05090336501598358, -0.22959940135478973, 0.1873555183...
5111
Arianism (the Visigoths converted to Arian Christianity in 376), which led to Arianism being a religious factor in various wars in the Roman Empire. In the west, organized Arianism survived in North Africa, in Hispania, and parts of Italy until it was finally suppressed in the 6th and 7th centuries. Visigothic Spain converted to Catholicism at the Third Council of Toledo in 589. Grimwald, King of the Lombards (662–671), and his young son and successor Garibald (671), were the last Arian kings in Europe. Following the Protestant Reformation from 1517, it did not take long for Arian and other nontrinitarian
Arianism
[ 0.06717554479837418, -0.3550466001033783, -0.13400357961654663, -0.04611232876777649, -0.8311809301376343, 0.07147209346294403, 1.0768622159957886, 0.7669239640235901, -0.34701359272003174, -0.18427810072898865, -0.17203007638454437, 0.363140344619751, -0.4065572917461395, 0.20531196892261...
5112
views to resurface. The first recorded English antitrinitarian was John Assheton, who was forced to recant before Thomas Cranmer in 1548. At the Anabaptist Council of Venice 1550, the early Italian instigators of the Radical Reformation committed to the views of Miguel Servetus, who was burned alive by the orders of John Calvin in 1553, and these were promulgated by Giorgio Biandrata and others into Poland and Transylvania. The antitrinitarian wing of the Polish Reformation separated from the Calvinist "ecclesia maior" to form the "ecclesia minor" or Polish Brethren. These were commonly referred to as "Arians" due to their rejection
Arianism
[ 0.17992974817752838, -0.37498554587364197, -0.3985992670059204, -0.500827968120575, -0.9828357696533203, 0.2884271740913391, 0.9879437685012817, 0.17807412147521973, 0.22411654889583588, -0.24789047241210938, -0.21850642561912537, 0.40035146474838257, -0.5942423343658447, 0.383269250392913...
5113
of the Trinity, though in fact the Socinians, as they were later known, went further than Arius to the position of Photinus. The epithet "Arian" was also applied to the early Unitarians such as John Biddle, though in denial of the pre-existence of Christ they were again largely Socinians, not Arians. In 1683, when Anthony Ashley Cooper, 1st Earl of Shaftesbury, lay dying in Amsterdam – driven into exile by his outspoken opposition to King Charles II – he spoke to the minister Robert Ferguson, and professed himself an Arian. In the 18th century the "dominant trend" in Britain, particularly
Arianism
[ 0.2270715832710266, -0.2783040702342987, -0.35585862398147583, -0.4687463343143463, -0.9302399754524231, 0.27502334117889404, 1.0918138027191162, 0.17959874868392944, -0.15076541900634766, 0.05997778847813606, 0.010907710529863834, 0.4275377094745636, -0.5185418725013733, 0.510497450828552...
5114
in Latitudinarianism, was towards Arianism, with which the names of Samuel Clarke, Benjamin Hoadly, William Whiston and Isaac Newton are associated. To quote the "Encyclopædia Britannica" article on Arianism: "In modern times some Unitarians are virtually Arians in that they are unwilling either to reduce Christ to a mere human being or to attribute to him a divine nature identical with that of the Father." However, their doctrines cannot be considered representative of traditional Arian doctrines or vice versa. A similar view was held by the ancient anti-Nicene Pneumatomachi (Greek: , "breath" or "spirit" and "fighters", combining as "fighters against
Arianism
[ 0.12104800343513489, 0.010128331370651722, -0.8453234434127808, -0.3054542541503906, -0.8526650071144104, 0.6162462830543518, 0.8897486925125122, 0.20228207111358643, 0.009752911515533924, -0.3867342174053192, -0.24805885553359985, 0.1691887378692627, -0.6273671984672546, 0.502592682838439...
5115
the spirit"), so called because they opposed the deifying of the Nicene Holy Ghost. However, the Pneumatomachi were adherents of Macedonianism, and though their beliefs were somewhat reminiscent of Arianism, they were a distinct group. The teachings of the first two ecumenical councils – which entirely reject Arianism – are held by the Roman Catholic Church, the Eastern Orthodox Church, the Oriental Orthodox Churches, the Assyrian Church of the East and all churches founded during the Reformation in the 16th century or influenced by it (Lutheran, Reformed/Presbyterian, and Anglican). Also, nearly all Protestant groups (such as Methodists, Baptists, and most
Arianism
[ 0.4697995185852051, 0.05347380042076111, -0.33953601121902466, -0.24074997007846832, -0.8960480690002441, 0.1406857967376709, 0.967971920967102, 0.23143719136714935, 0.1527433544397354, -0.2563433051109314, -0.1866655796766281, 0.34045228362083435, -0.6478931307792664, 0.24359697103500366,...
5116
Pentecostals) entirely reject the teachings associated with Arianism. Modern groups which currently appear to embrace some of the principles of Arianism include Unitarians and Jehovah's Witnesses. Although the origins of their beliefs are not necessarily attributed to the teachings of Arius, many of the core beliefs of Unitarians and Jehovah's Witnesses are very similar to them. The Church of Jesus Christ of Latter-day Saints doctrine concerning the nature of the God Head teaches a nontrinitarian theology. The 1st Article of Faith of The Church is: "We believe in God, the Eternal Father, and in His Son, Jesus Christ, and in
Arianism
[ 0.5980342030525208, 0.3633892834186554, -0.5055045485496521, -0.3788744807243347, -0.559644341468811, 0.138387992978096, 0.7233421206474304, 0.3233951926231384, 0.16691331565380096, -0.4059180021286011, -0.11198710650205612, 0.314542293548584, -0.47157108783721924, 0.40254372358322144, -...
5117
the Holy Ghost." The Doctrine and Covenants 130:22 states: "The Father has a body of flesh and bones as tangible as man’s; the Son also; but the Holy Ghost has not a body of flesh and bones, but is a personage of Spirit. Were it not so, the Holy Ghost could not dwell in us." The church's view of the Godhead breaks with Nicene Creed tradition and believes it returns to the teachings taught by Jesus. It does not accept the creed's definition of Trinity that the three are "consubstantial" nor the Athanasian Creed's statement that they are "incomprehensible", arguing
Arianism
[ 0.08867238461971283, -0.08758577704429626, -0.0172247476875782, -0.40277570486068726, -0.510028600692749, -0.008378224447369576, 0.6459370255470276, 0.3510204553604126, -0.20321427285671234, -0.4309960901737213, -0.06856430321931839, 0.4060514271259308, -0.41530898213386536, 0.213745951652...
5118
that the LDS view is self-evident in the Bible that the Father, the Son, and the Holy Ghost are separate persons—three divine beings as illustrated in Jesus' , his baptism at the hands of John, his transfiguration, and the martyrdom of Stephen. Jehovah's Witnesses are often referred to as "modern-day Arians" or they are sometimes referred to as "Semi-Arians", usually by their opponents. While there are some significant similarities in theology and doctrine, the Witnesses differ from Arians by saying that the Son can fully know the Father (something which Arius himself denied), and by their denial of personality to
Arianism
[ 0.46314477920532227, 0.38238072395324707, -0.4400908052921295, -0.2046404927968979, -0.637738049030304, 0.15455172955989838, 0.755852997303009, 0.27148178219795227, 0.13542644679546356, -0.04939195141196251, -0.08254347741603851, 0.37990254163742065, -0.30017125606536865, 0.661608278751373...
5119
the Holy Spirit. The original Arians also generally prayed directly to Jesus, whereas the Witnesses pray to God, through Jesus as a mediator. The Church of God (7th day) - Salem Conference, a line of Sabbatarian Adventists hold views similar to Arianism: Other groups which oppose the belief in the Trinity are not necessarily Arian. Arianism Arianism is a nontrinitarian Christological doctrine which asserts the belief that Jesus Christ is the Son of God who was begotten by God the Father at a point in time, a creature distinct from the Father and is therefore subordinate to him, but the
Arianism
[ 0.45979079604148865, 0.1721632182598114, -0.39216774702072144, -0.3683767020702362, -0.5265093445777893, 0.4568377733230591, 0.7992120385169983, 0.4312378168106079, 0.013511309400200844, -0.3525324761867523, -0.3702770173549652, 0.41659292578697205, -0.49635350704193115, 0.3969365656375885...
5120
Antoninus Pius Antoninus Pius (; ; 19 September 867 March 161 AD), also known as Antoninus, was Roman emperor from 138 to 161. He was one of the Five Good Emperors in the Nerva–Antonine dynasty and the Aurelii. Born into a senatorial family, Antoninus held various offices during the reign of emperor Hadrian, acquiring favor which saw him adopted as Hadrian's son and successor shortly before Hadrian's death. He acquired the name Pius after his accession to the throne, either because he compelled the Senate to deify his adoptive father Hadrian, or because he had saved senators sentenced to death
"Antoninus Pius"
[ -0.3860470652580261, -0.33963674306869507, -0.29240331053733826, -0.08444621413946152, -0.20750544965267181, 1.1936817169189453, 0.30134591460227966, 0.6915252208709717, -0.7194791436195374, -0.5052645802497864, -0.09461060166358948, -0.4367527663707733, -0.8076996207237244, 0.316361665725...
5121
by Hadrian in his later years. His reign is notable for the peaceful state of the Empire, with no major revolts or military incursions during this time, and for his governing without ever leaving Italy. A successful military campaign in southern Scotland early in his reign resulted in the construction of the Antonine Wall. Antoninus was an effective administrator, leaving his successors a large surplus in the treasury, expanding free access to drinking water throughout the Empire, encouraging legal conformity, and facilitating the enfranchisement of freed slaves. He died of illness in 161 and was succeeded by his adopted sons
"Antoninus Pius"
[ -0.4389376640319824, -0.3168443739414215, -0.4145338535308838, -0.17412562668323517, -0.16494113206863403, 0.8002810478210449, 0.6065448522567749, 0.5568214654922485, -0.5500634908676147, -0.5252671241760254, -0.20498016476631165, -0.5514878630638123, -0.5199987292289734, 0.293133348226547...
5122
Marcus Aurelius and Lucius Verus as co-emperors. He was born as the only child of Titus Aurelius Fulvus, consul in 86, whose family came from Nemausus (modern Nîmes). Titus Aurelius Fulvius was the son of a senator of the same name, who, as legate of Legio III Gallica, had supported Vespasian in his bid to the Imperial office and been rewarded with a suffect consulship, plus an ordinary one under Domitian in 85. The Aurelii Fulvii were therefore a relatively new senatorial family from Gallia Narbonensis whose rise to prominence was supported by the Flavians. The link between Antoninus' family
"Antoninus Pius"
[ -0.5345203280448914, -0.27577275037765503, 0.15196004509925842, -0.09002580493688583, -0.41405123472213745, 0.9732314348220825, 0.03343185782432556, 0.5242974758148193, -0.3517845869064331, -0.8062530755996704, 0.14410816133022308, -0.3143407106399536, -0.5317454934120178, 0.18640349805355...
5123
and their home province explains the increasing importance of the post of Proconsul of Gallia Narbonensis during the late Second Century. Antoninus was born near Lanuvium and his mother was Arria Fadilla. Antoninus’ father died shortly after his 89 ordinary consulship, and Antoninus was raised by his maternal grandfather Gnaeus Arrius Antoninus, reputed by contemporaries to be a man of integrity and culture and a friend of Pliny the Younger. The Arrii Antoninii were an older senatorial family from Italy, very influential during Nerva's reign. Arria Fadilla, Antoninus' mother, married afterwards Publius Julius Lupus, suffect consul in 98; from that
"Antoninus Pius"
[ -0.36662164330482483, -0.28459587693214417, -0.17260824143886566, -0.1790124475955963, -0.3951966464519501, 1.191780686378479, 0.20598146319389343, 0.4766138195991516, -0.40384548902511597, -0.7152208685874939, 0.13386593759059906, -0.505791187286377, -0.3934282958507538, 0.177448853850364...
5124
marriage came two daughters, Arria Lupula and Julia Fadilla. Some time between 110 and 115, Antoninus married Annia Galeria Faustina the Elder. They are believed to have enjoyed a happy marriage. Faustina was the daughter of consul Marcus Annius Verus and Rupilia Faustina (a half-sister to the Empress Vibia Sabina). Faustina was a beautiful woman, and despite (basically unproven) rumours about her character, it is clear that Antoninus cared for her deeply. Faustina bore Antoninus four children, two sons and two daughters. They were: When Faustina died in 141, Antoninus was greatly distressed. In honour of her memory, he asked
"Antoninus Pius"
[ -0.48723986744880676, -0.2906387150287628, -0.06644055247306824, 0.013068498112261295, -0.3906311094760895, 1.4506115913391113, 0.28596287965774536, 0.3899841010570526, -0.672079861164093, -0.6193899512290955, 0.32014939188957214, -0.47758162021636963, -0.38223281502723694, 0.4815576076507...
5125
the Senate to deify her as a goddess, and authorised the construction of a temple to be built in the Roman Forum in her name, with priestesses serving in her temple. He had various coins with her portrait struck in her honor. These coins were scripted ‘"DIVA FAUSTINA"’ and were elaborately decorated. He further created a charity which he founded and called it "Puellae Faustinianae" or "Girls of Faustina", which assisted destitute girls of good family. Finally, Antoninus created a new "alimenta" (see Grain supply to the city of Rome). The emperor never remarried. Instead, he lived with Galena Lysistrata,
"Antoninus Pius"
[ 0.1125355064868927, -0.3455069363117218, -0.4520411193370819, 0.12821011245250702, -0.36311230063438416, 1.4074963331222534, 0.13810785114765167, 0.19735093414783478, -0.5088226199150085, -0.12256350368261337, 0.004185448866337538, -0.4090966284275055, -0.3363173007965088, 0.31242290139198...
5126
one of Faustina's freed women. Concubinage was a form of female companionship sometimes chosen by powerful men in Ancient Rome, especially widowers like Vespasian, and Marcus Aurelius. Their union could not produce any legitimate offspring who could threaten any heirs, such as those of Antoninus. Also, as one could not have a wife and an official concubine (or two concubines) at the same time, Antoninus avoided being pressed into a marriage with a noblewoman from another family (later, Marcus Aurelius would also reject the advances of his former fiancée Ceionia Fabia, Lucius Verus's sister, on the grounds of protecting his
"Antoninus Pius"
[ -0.3728916049003601, -0.636028528213501, 0.08860570192337036, 0.18634356558322906, -0.16019928455352783, 0.8429973125457764, -0.06925640255212784, 0.30548909306526184, -0.13528507947921753, -0.14445020258426666, 0.12334129959344864, -0.17014026641845703, -0.38782352209091187, 0.25159770250...
5127
children from a stepmother, and took a concubine instead). Having filled the offices of quaestor and praetor with more than usual success, he obtained the consulship in 120. He was next appointed by the Emperor Hadrian as one of the four proconsuls to administer Italia, then greatly increased his reputation by his conduct as proconsul of Asia, probably during 134–135. He acquired much favor with Hadrian, who adopted him as his son and successor on 25 February 138, after the death of his first adopted son Lucius Aelius, on the condition that Antoninus would in turn adopt Marcus Annius Verus,
"Antoninus Pius"
[ -0.4550051689147949, -0.36699333786964417, 0.014363538473844528, -0.12589791417121887, -0.1957993060350418, 1.0852810144424438, 0.10403435677289963, 0.3336629569530487, -0.5171778798103333, -0.5915566086769104, 0.02439308352768421, -0.4010280966758728, -0.5394170880317688, 0.22062446177005...
5128
the son of his wife's brother, and Lucius, son of Lucius Aelius, who afterwards became the emperors Marcus Aurelius and Lucius Verus. On his accession, Antoninus' name and style became "Imperator Caesar Titus Aelius Hadrianus Antoninus Augustus Pontifex Maximus". One of his first acts as Emperor was to persuade the Senate to grant divine honours to Hadrian, which they had at first refused; his efforts to persuade the Senate to grant these honours is the most likely reason given for his title of "Pius" (dutiful in affection; compare "pietas"). Two other reasons for this title are that he would support
"Antoninus Pius"
[ -0.1631271243095398, -0.3331027925014496, -0.08629836142063141, -0.011168928816914558, -0.47601544857025146, 0.8717387318611145, 0.09774276614189148, 0.35054096579551697, -0.25910747051239014, -0.8098498582839966, 0.09500397741794586, -0.28148820996284485, -0.5416903495788574, 0.2196801155...
5129
his aged father-in-law with his hand at Senate meetings, and that he had saved those men that Hadrian, during his period of ill-health, had condemned to death. Immediately after Hadrian's death, Antoninus approached Marcus and requested that his marriage arrangements be amended: Marcus' betrothal to Ceionia Fabia would be annulled, and he would be betrothed to Faustina, Antoninus' daughter, instead. Faustina's betrothal to Ceionia's brother Lucius Commodus would also have to be annulled. Marcus consented to Antoninus' proposal. Antoninus built temples, theaters, and mausoleums, promoted the arts and sciences, and bestowed honours and financial rewards upon the teachers of rhetoric
"Antoninus Pius"
[ -0.133366197347641, -0.23570148646831512, -0.21326060593128204, 0.11641976982355118, -0.20058830082416534, 1.1133153438568115, -0.08270079642534256, 0.2780440151691437, -0.2955976724624634, -0.5217134356498718, 0.13870105147361755, -0.4061572551727295, -0.47024568915367126, 0.4308296442031...
5130
and philosophy. Antoninus made few initial changes when he became emperor, leaving intact as far as possible the arrangements instituted by Hadrian. Epigraphical and prosopographical research has revealed that Antoninus' imperial ruling team centered around a group of closely knit senatorial families, most of them members of the priestly congregation for the cult of Hadrian, the "sodales Hadrianales". According to the German historian H.G. Pflaum, prosopographical research of Antoninus' ruling team allows us to grasp the deeply conservative character of the ruling senatorial caste. There are no records of any military related acts in his time in which he participated.
"Antoninus Pius"
[ -0.24845556914806366, -0.10363046079874039, -0.5888975858688354, -0.15253375470638275, -0.3898513615131378, 0.4977545440196991, 0.4364509880542755, 0.327128529548645, -0.33679458498954773, -0.491439551115036, -0.29909759759902954, -0.20600734651088715, -0.3283769190311432, -0.0886195749044...
5131
One modern scholar has written "It is almost certain not only that at no time in his life did he ever see, let alone command, a Roman army, but that, throughout the twenty-three years of his reign, he never went within five hundred miles of a legion". His reign was the most peaceful in the entire history of the Principate, notwithstanding the fact that there were several military disturbances throughout the Empire in his time. Such disturbances happened in Mauretania – where a senator was named as governor of Mauretania Tingitana in place of the usual equestrian procurator and cavalry
"Antoninus Pius"
[ -0.5123900175094604, -0.45962777733802795, -0.49708282947540283, -0.14748980104923248, -0.2372046858072281, 0.5342040061950684, 0.5764431953430176, 0.6225122213363647, -0.7660917639732361, -0.3093659579753876, 0.020934302359819412, -0.3391803205013275, -0.5217810869216919, 0.04727345705032...
5132
reinforcements from Pannonia were brought in, towns such as Sala and Tipasa being fortified. Similar disturbances took place in Judea, and amongst the Brigantes in Britannia, none of them being considered serious. It was however in Britain that Antoninus decided to follow a new, more aggressive path, with the appointment of a new governor in 139, Quintus Lollius Urbicus, a native of Numidia and previously governor of Germania Inferior. Under instructions from the emperor, Lollius undertook an invasion of southern Scotland, winning some significant victories, and constructing the Antonine Wall from the Firth of Forth to the Firth of Clyde.
"Antoninus Pius"
[ -0.41561684012413025, -0.44148483872413635, 0.07269535213708878, -0.45802193880081177, -0.10988956689834595, 0.8022982478141785, 0.5790333151817322, 0.45250752568244934, -0.41810342669487, -0.3727101981639862, -0.03557751700282097, -0.29991409182548523, -0.3637479543685913, 0.1995441168546...
5133
The wall, however, was soon gradually decommissioned during the mid-150s and eventually abandoned late during the reign (early 160s), for reasons that are still not quite clear. Antonine's Wall is mentioned in just one literary source, Antoninus' biography in the Historia Augusta. Pausanias makes a brief and confused mention of a war in Britain. In one inscription honoring Antoninus, erected by Legio II Augusta, which participated in the building of the Wall, a relief showing four naked prisoners, one of them beheaded, seems to stand for some actual warfare. Although Antonine's Wall was, in principle, much shorter and at first
"Antoninus Pius"
[ 0.051409635692834854, -0.3305913209915161, -0.4056470990180969, -0.09547662734985352, -0.2705933451652527, 0.8794493675231934, 0.5829386115074158, 0.28766876459121704, -0.7511712908744812, -0.5862289071083069, -0.09744324535131454, -0.3692927062511444, -0.5339158177375793, 0.19556827843189...
5134
sight more defensible than Hadrian's Wall, the additional area that it enclosed within the Empire was barren, with the effect that supply lines to it were strained enough that the costs from maintaining the additional territory outweighed the benefits of doing so. It has been therefore speculated that the invasion of Lowland Scotland and the building of the wall had to do mostly with internal politics, that is, offering Antoninus an opportunity to gain some modicum of necessary military prestige at the start of his reign. Actually, the campaign in Britannia was followed by an Imperial salutation – that is,
"Antoninus Pius"
[ -0.11363361030817032, -0.25204765796661377, -0.313237726688385, -0.3825937509536743, -0.4230427145957947, 0.5259087681770325, 0.5986752510070801, 0.4180123209953308, -0.2873630225658417, -0.25725969672203064, -0.09715385735034943, -0.38076940178871155, -0.24831631779670715, 0.1429875344038...
5135
by Antoninus formally taking for the second (and last) time the title of Imperator – in 142. The fact that around the same time coins were struck announcing a victory in Britain points to Antoninus' need to publicize his achievements. The orator Fronto was later to say that, although Antoninus bestowed the direction of the British campaign to others, he should be regarded as the helmsman who directed the voyage, whose glory, therefore, belonged to him. That this quest for some military achievement responded to an actual need is proved by the fact that, although generally peaceful, Antoninus' reign was
"Antoninus Pius"
[ -0.29030129313468933, -0.3800068497657776, -0.12295947968959808, -0.005837053060531616, -0.4136524200439453, 0.45764416456222534, 0.40862348675727844, 0.6070358753204346, -0.6660864353179932, -0.43108853697776794, -0.05251151695847511, -0.23848238587379456, -0.36437538266181946, 0.27534165...
5136
not free from attempts at usurpation: Historia Augusta mentions two, made by the senators Cornelius Priscianus (by the way, Lollius Urbicus' successor as governor of Britain) and Atilius Rufius Titianus – both confirmed by the Fasti Ostienses as well as by the erasing of Priscianus' name from an inscription. In both cases, Antoninus was not in formal charge of the ensuing repression: Priscianus committed suicide and Titianus was found guilty by the Senate, with Antoninus abstaining from sequestering their families' properties. There were also some troubles in Dacia Inferior which required the granting of additional powers to the procurator governor
"Antoninus Pius"
[ -0.31544622778892517, -0.5642929077148438, -0.22604167461395264, 0.01943739503622055, -0.49448731541633606, 0.8678620457649231, 0.19739452004432678, 0.11745018512010574, -0.49548131227493286, -0.27020522952079773, 0.04526593163609505, -0.25670066475868225, -0.6961357593536377, 0.1197392791...
5137
and the dispatch of additional soldiers to the province. On the Northern Black Sea coast, the Greek city of Olbia was held against the Scythians. Also during his reign the governor of Upper Germany, probably Caius Popillius Carus Pedo, built new fortifications in the Agri Decumates, advancing the Limes Germanicus fifteen miles forward in his province and neighboring Raetia. In the East, Roman suzerainty over Armenia was retained by the choice in AD 140 of Arsacid scion Sohaemus as client king. Nevertheless, Antoninus was virtually unique among emperors in that he dealt with these crises without leaving Italy once during
"Antoninus Pius"
[ -0.5966613292694092, -0.37461480498313904, -0.22299405932426453, 0.14020739495754242, -0.28309494256973267, 0.8262091279029846, 0.43236589431762695, 0.5083325505256653, -0.624138355255127, -0.4868416488170624, 0.05412473902106285, -0.5338041186332703, -0.48306334018707275, 0.16746260225772...
5138
his reign, but instead dealt with provincial matters of war and peace through their governors or through imperial letters to the cities such as Ephesus (of which some were publicly displayed). This style of government was highly praised by his contemporaries and by later generations. Antoninus was the last Roman Emperor recognised by the Indian Kingdoms. Raoul McLaughlin quotes Aurelius Victor as saying "The Indians, the Bactrians and the Hyrcanians all sent ambassadors to Antoninus. They had all heard about the spirit of justice held by this great emperor, justice that was heightened by his handsome and grave countenance, and
"Antoninus Pius"
[ -0.33607810735702515, -0.3373880386352539, -0.35445353388786316, -0.016088107600808144, -0.3769531846046448, 0.5502983927726746, 0.5117741227149963, 0.6778421401977539, -0.5074353218078613, -0.3399756848812103, -0.17861729860305786, -0.1991414874792099, -0.4896564185619354, 0.0622355453670...
5139
his slim and vigorous figure." Due to the outbreak of the Antonine epidemic and wars against northern Germanic tribes, the reign of Marcus Aurelius was forced to alter the focus of foreign policies, and matters relating to the Far East were increasingly abandoned in favour of those directly concerning the Empire's survival. Antoninus was regarded as a skilled administrator and as a builder. In spite of an extensive building directive – the free access of the people of Rome to drinking water was expanded with the construction of aqueducts, not only in Rome but throughout the Empire, as well as
"Antoninus Pius"
[ -0.12355733662843704, -0.3641680181026459, -0.38085272908210754, 0.17028875648975372, -0.006633772514760494, 0.9331896305084229, 0.1654393970966339, 0.6738383769989014, -0.5001431107521057, -0.6310867667198181, 0.050692763179540634, -0.3190274238586426, -0.46837174892425537, 0.165603801608...
5140
bridges and roads – the emperor still managed to leave behind a sizable public treasury of around two and a half million sesterces (Rome would not witness another Emperor leaving his successor with a surplus for a long time). But this treasury was depleted almost immediately after Antoninus's reign due to the plague brought back by soldiers after the Parthian victory. The Emperor also famously suspended the collection of taxes from cities affected by natural disasters, such as when fires struck Rome and Narbona, and earthquakes affected Rhodes and the Province of Asia. He offered hefty financial grants for rebuilding
"Antoninus Pius"
[ -0.2752559185028076, -0.2903282642364502, -0.7004724740982056, 0.41590791940689087, -0.33843639492988586, 0.9365277290344238, 0.42679542303085327, 0.4905335009098053, -0.4757766127586365, -0.20947282016277313, 0.12474733591079712, -0.30516135692596436, -0.7774296402931213, 0.27068662643432...
5141
and recovery of various Greek cities after two serious earthquakes: the first, "circa" 140, which affected mostly Rhodes and other islands; the second, in 152, which hit Cyzicus (where the huge and newly built Temple to Hadrian was destroyed), Ephesus, and Smyrna. Antoninus' financial help earned him praise by Greek writers such as Aelius Aristides and Pausanias. These cities received from Antoninus the usual honorific accolades, such as when he commanded that all governors of Asia should enter the province, when taking office, by way of Ephesus. Ephesus was specially favoured by Antoninus, who confirmed and upheld its first place
"Antoninus Pius"
[ -0.5996932983398438, -0.3204858899116516, -0.2027246057987213, 0.008808481507003307, -0.20869359374046326, 0.7525079250335693, 0.5524406433105469, 0.5327257513999939, -0.6932373046875, -0.35974475741386414, -0.053868368268013, -0.40935495495796204, -0.4431125223636627, 0.2554369270801544, ...
5142
in the list of imperial honor titles, as opposed to Smyrna and Pergamon. In his dealings with Greek-speaking cities, Antoninus followed the policy adopted by Hadrian of ingratiating himself with local elites, especially with local intellectuals: philosophers, teachers of literature, rhetoricians and physicians were explicitly exempted from any duties involving private spending for civic purposes – a privilege granted by Hadrian that Antoninus confirmed by means of an edict preserved in the Digest (27.1.6.8). Antoninus also created a chair for the teaching of rhetoric in Athens. Antoninus was known as an avid observer of rites of religion and of formal
"Antoninus Pius"
[ -0.003686785465106368, -0.29326140880584717, -0.4404921531677246, 0.1644308716058731, -0.45718586444854736, 0.6743952035903931, 0.12461020797491074, 0.3829965591430664, -0.24131740629673004, -0.29960766434669495, -0.20355495810508728, -0.02464403584599495, -0.4305630326271057, -0.246545538...
5143
celebrations – both Roman and foreign. He is known for having increasingly formalized the official cult offered to the Great Mother, which from his reign onwards included a bull sacrifice, a taurobolium, formerly only a private ritual, now being also performed for the sake of the Emperor's welfare. Antoninus also offered patronage to the worship of Mithras, to whom he erected a temple in Ostia. In 148, he presided over the celebrations of the 900th anniversary of the founding of Rome. Antoninus tried to portray himself as a magistrate of the "res publica", no matter how extended and ill-defined his
"Antoninus Pius"
[ 0.1891690492630005, -0.2222214639186859, -0.295989990234375, -0.2069419026374817, -0.5728632211685181, 0.8699848055839539, 0.2584863603115082, 0.6550461053848267, -0.6569254398345947, -0.33588775992393494, 0.0016409601084887981, -0.23517093062400818, -0.19400924444198608, 0.391428649425506...
5144
competencies were. He is credited with the splitting of the imperial treasury, the Fiscus. This splitting had to do with the division of imperial properties into two parts: firstly, the fiscus itself – or "patrimonium", meaning the properties of the "Crown", the hereditary properties of each succeeding person that sat on the throne, transmitted to his successors in office, regardless of their membership in the imperial family; secondly, the "res privata", the "private" properties tied to the personal maintenance of the Emperor and his family. An anecdote in the Historia Augusta biography, where Antoninus replies to Faustina – who complained
"Antoninus Pius"
[ -0.11203999817371368, -0.6229553818702698, -0.5247734785079956, 0.19314810633659363, -0.22317977249622345, 0.7391852140426636, -0.03891364112496376, 0.152001291513443, -0.5516413450241089, -0.2702021300792694, 0.04454183205962181, -0.0828946903347969, -0.4609421491622925, 0.266311883926391...
5145
about his stinginess – that "we have gained an empire [and] lost even what we had before" possibly relates to Antoninus' actual concerns at the creation of the "res privata". While still a private citizen, Antoninus had increased his personal fortune greatly by mean of various legacies, the consequence – we are told – of his caring scrupulously for his relatives. The "res privata" lands could be sold and/or given away, while the "patrimonium" properties were regarded as public. It was a way of pretending that the Imperial function – and most properties attached to it – was a public
"Antoninus Pius"
[ -0.018605347722768784, -0.26025334000587463, -0.46862730383872986, 0.24321970343589783, -0.1669566035270691, 0.6197044849395752, 0.23096047341823578, 0.3034031093120575, -0.4978587329387665, -0.20034772157669067, -0.20374689996242523, -0.048849642276763916, -0.4473227262496948, 0.280972361...
5146
one, formally subject to the authority of the Senate and the Roman people. That the distinction played no part in subsequent political history – that the "personal" power of the princeps absorbed his role as office-holder – proves that the autocratic logic of the imperial order had already subsumed the old republican institutions. Of the public transactions of this period there is only the scantiest of information, but, to judge by what is extant, those twenty-two years were not remarkably eventful in comparison to those before and after the reign. However, Antoninus did take a great interest in the revision
"Antoninus Pius"
[ -0.22611470520496368, -0.4248291254043579, -0.35904616117477417, 0.14554721117019653, -0.17384794354438782, 0.352083683013916, 0.12730278074741364, 0.44519662857055664, -0.5278319716453552, -0.3257780373096466, 0.040864504873752594, -0.043503932654857635, -0.354021817445755, -0.13295361399...
5147
and practice of the law throughout the empire. One of his chief concerns was to having local communities conform their legal procedures to existing Roman norms: in a case concerning repression of banditry by local police officers ("irenarchs") in Asia Minor, Antoninus ordered that these officers should not treat suspects as already condemned, and also keep a detailed copy of their interrogations, to be used in the possibility of an appeal to the Roman governor. Also, although Antoninus was not an innovator, he would not always follow the absolute letter of the law; rather he was driven by concerns over
"Antoninus Pius"
[ -0.015554535202682018, -0.40265756845474243, -0.39859941601753235, 0.07123712450265884, -0.18907827138900757, 0.5664270520210266, 0.6704802513122559, 0.06843669712543488, -0.4493325352668762, -0.2692214250564575, -0.02490030787885189, 0.05185174196958542, -0.8295170068740845, -0.1313506215...
5148
humanity and equality, and introduced into Roman law many important new principles based upon this notion. In this, the emperor was assisted by five chief lawyers: L. Fulvius Aburnius Valens, an author of legal treatises; L. Ulpius Marcellus, a prolific writer; and three others. These last three included L. Volusius Maecianus, a former military officer turned by Antoninus into a civil procurator, and who, in view of his subsequent career (discovered on the basis of epigraphical and prosopographical research), was the Emperor's most important legal adviser. Maecianus would eventually be chosen to occupy various prefectures (see below) as well as
"Antoninus Pius"
[ -0.20061030983924866, 0.1301548033952713, -0.1284841001033783, 0.08475739508867264, -0.03963712230324745, 1.1564687490463257, -0.11051901429891586, -0.03455149382352829, -0.21213556826114655, -0.8045139312744141, 0.17041699588298798, 0.4117395579814911, -0.5338433384895325, -0.272801518440...
5149
to conduct the legal studies of Marcus Aurelius. He was also the author of a large work on Fidei Commissa (Testamentary Trusts). As a hallmark of the increased connection between jurists and the imperial government, Antoninus' reign also saw the appearance of the "Institutes of Gaius", an elementary legal manual for beginners (see Gaius (jurist)). Antoninus passed measures to facilitate the enfranchisement of slaves. Mostly, he favoured the principle of "favor libertatis", giving the putative freedman the benefit of the doubt when the claim to freedom was not clearcut. Also, he punished the killing of a slave by his/her master
"Antoninus Pius"
[ -0.16972120106220245, -0.3206927478313446, -0.5330421328544617, 0.23274657130241394, -0.12338762730360031, 0.7038416266441345, 0.032845932990312576, 0.26142358779907227, -0.30546876788139343, -0.466592937707901, -0.07089502364397049, -0.01614169403910637, -0.5623492002487183, 0.10403107106...
5150
without previous trial and determined that slaves could be forcibly sold to another master by a proconsul in cases of consistent mistreatment. Antoninus upheld the enforcement of contracts for selling of female slaves forbidding their further employment in prostitution. In criminal law, Antoninus introduced the important principle that accused persons are not to be treated as guilty before trial – as in the case of the irenarchs (see above). He also asserted the principle that the trial was to be held, and the punishment inflicted, in the place where the crime had been committed. He mitigated the use of torture
"Antoninus Pius"
[ -0.22047407925128937, -0.3198796808719635, -0.6918660402297974, -0.12979821860790253, -0.1281966269016266, 0.9188581109046936, 0.35707759857177734, 0.2561560273170471, -0.3344994783401489, -0.5339599847793579, 0.05539340153336525, 0.05431842431426048, -0.6913162469863892, 0.017837477847933...
5151
in examining slaves by certain limitations. Thus he prohibited the application of torture to children under fourteen years, though this rule had exceptions. However, it must be stressed that Antoninus "extended", by means of a rescript, the use of torture as a means of obtaining evidence to pecuniary cases, when it had been applied up until then only in criminal cases. Also, already at the time torture of free men of low status ("humiliores") had become legal, as proved by the fact that Antoninus exempted town councillors expressly from it, and also free men of high rank ("honestiores") in general.
"Antoninus Pius"
[ -0.17178644239902496, -0.3398437798023224, -0.4117479920387268, 0.022440172731876373, 0.10641972720623016, 0.514733612537384, 0.3547370135784149, 0.18647225201129913, -0.4159439504146576, -0.2610659599304199, -0.017942829057574272, -0.08428751677274704, -0.40753600001335144, 0.100497804582...
5152
One highlight during his reign occurred in 148, with the nine-hundredth anniversary of the foundation of Rome being celebrated by the hosting of magnificent games in Rome. It lasted a number of days, and a host of exotic animals were killed, including elephants, giraffes, tigers, rhinoceroses, crocodiles and hippopotami. While this increased Antoninus’s popularity, the frugal emperor had to debase the Roman currency. He decreased the silver purity of the denarius from 89% to 83.5% — the actual silver weight dropping from 2.88 grams to 2.68 grams. Scholars name Antoninus Pius as the leading candidate for an individual identified as
"Antoninus Pius"
[ -0.2501797378063202, -0.1383339911699295, -0.6896634101867676, 0.2800089716911316, -0.5022819638252258, 0.8267815113067627, 0.5846228003501892, 0.5125128626823425, -0.7901585698127747, -0.14270639419555664, 0.0058799549005925655, -0.30383792519569397, -0.4289039671421051, 0.537045776844024...
5153
a friend of Rabbi Judah the Prince. According to the Talmud (Avodah Zarah 10a-b), Rabbi Judah was very wealthy and greatly revered in Rome. He had a close friendship with "Antoninus", possibly Antoninus Pius, who would consult Rabbi Judah on various worldly and spiritual matters. In 156, Antoninus Pius turned 70. He found it difficult to keep himself upright without stays. He started nibbling on dry bread to give him the strength to stay awake through his morning receptions. Marcus Aurelius had already been created consul with Antoninus in 140, receiving the title of Caesar – i.e., heir apparent. As
"Antoninus Pius"
[ -0.029523735865950584, 0.15066589415073395, -0.012595754116773605, -0.3822140097618103, -0.33717814087867737, 0.9112185835838318, 0.390823632478714, 0.4580884575843811, -0.2246549129486084, -0.9696772694587708, -0.24149735271930695, -0.5591560006141663, -0.348293662071228, 0.49472501873970...
5154
Antoninus aged, Marcus would take on more administrative duties, more still after the deathin 156 or 157of one of Antoninus' most trusted advisers, Gavius Maximus, who had been praetorian prefect (an office that was as much secretarial as military) for twenty years. Gavius Maximus, who had been one of the most important members of Antoninus' "team" of long standing advisers, had been awarded with the consular insignia and the honors due a senator. He had developed a reputation as a most strict disciplinarian ("vir severissimus", according to "Historia Augusta") as well as some lasting grudges among fellow equestrian procurators –
"Antoninus Pius"
[ -0.19134259223937988, -0.17472897469997406, -0.07909907400608063, -0.035096678882837296, -0.5650416612625122, 0.6149761080741882, 0.14818325638771057, 0.24211937189102173, -0.42524802684783936, -0.7756843566894531, -0.1976817101240158, -0.18323072791099548, -0.4802420139312744, 0.288034737...
5155
one of them, by predeceasing Gavius and vilifying him in his will, created a serious embarrassment to one of the heirs, the orator Fronto. Gavius Maximus' death offered the opportunity to a welcome change in the ruling team, and it has been speculated that it was the legal adviser Volusius Maecianus who—after a brief spell as Praefect of Egypt, and a subsequent term as Praefectus annonae in Rome – assumed the role of grey eminence precisely in order to prepare the incoming – and altogether new – joint succession. In 160, Marcus and Lucius were designated joint consuls for the
"Antoninus Pius"
[ -0.16527330875396729, -0.2009829729795456, -0.08086591958999634, -0.13459725677967072, -0.38385558128356934, 0.8859485387802124, 0.11961378157138824, 0.48633888363838196, -0.4612434208393097, -0.5814362168312073, 0.05180773511528969, -0.16245506703853607, -0.577512264251709, 0.400224804878...
5156
following year. Perhaps Antoninus was already ill; in any case, he died before the year was out. Two days before his death, the biographer reports, Antoninus was at his ancestral estate at Lorium, in Etruria, about twelve miles (19 km) from Rome. He ate Alpine Gruyere cheese at dinner quite greedily. In the night he vomited; he had a fever the next day. The day after that, 7 March 161, he summoned the imperial council, and passed the state and his daughter to Marcus. The emperor gave the keynote to his life in the last word that he uttered: when
"Antoninus Pius"
[ -0.1957436501979828, -0.14390820264816284, -0.05576327443122864, -0.2263556569814682, -0.13665500283241272, 0.6860036253929138, 0.37324315309524536, 0.32694029808044434, -0.4238641858100891, -0.5518881678581238, -0.1391347050666809, -0.4091216027736664, -0.32938048243522644, 0.610991299152...
5157
the tribune of the night-watch came to ask the password, he responded, "aequanimitas" (equanimity). He then turned over, as if going to sleep, and died. His death closed out the longest reign since Augustus (surpassing Tiberius by a couple of months). His record for the second-longest reign would be unbeaten for 168 years, until 329 when it was surpassed by Constantine the Great. Antoninus Pius' funeral ceremonies were, in the words of the biographer, "elaborate". If his funeral followed the pattern of past funerals, his body would have been incinerated on a pyre at the Campus Martius, while his spirit
"Antoninus Pius"
[ -0.07720595598220825, -0.3481377959251404, -0.2822432518005371, 0.04436047002673149, -0.46035340428352356, 0.6210064888000488, 0.7634151577949524, 0.44659218192100525, -0.3146132528781891, -0.47615158557891846, -0.13413099944591522, -0.31706035137176514, -0.5245971083641052, 0.452820062637...
5158
would rise to the gods' home in the heavens. However, it seems that this was not the case: according to his Historia Augusta biography (which seems to reproduce an earlier, detailed report) Antoninus' body (and not his ashes) was buried in Hadrian's mausoleum. After a seven-day interval ("justitium"), Marcus and Lucius nominated their father for deification. In contrast to their behavior during Antoninus' campaign to deify Hadrian, the senate did not oppose the emperors' wishes. A "flamen", or cultic priest, was appointed to minister the cult of the deified Antoninus, now "Divus Antoninus". A column was dedicated to Antoninus on
"Antoninus Pius"
[ 0.19213084876537323, -0.11322177201509476, -0.3454124331474304, -0.0955619066953659, -0.6072442531585693, 0.7552632689476013, 0.43832775950431824, 0.4209769070148468, -0.30826297402381897, -0.48210054636001587, -0.08164969831705093, -0.2886408567428589, -0.5220003724098206, 0.3146480917930...
5159
the Campus Martius, and the temple he had built in the Forum in 141 to his deified wife Faustina was rededicated to the deified Faustina and the deified Antoninus. It survives as the church of San Lorenzo in Miranda. The first group of people claiming to be an ambassadorial mission of Romans to China was recorded in 166 AD by the "Hou Hanshu". The embassy came to Emperor Huan of Han China from "Andun" (; Emperor Antoninus Pius), "king of Daqin" (Rome). As Antoninus Pius died in 161, leaving the empire to his adoptive son Marcus Aurelius (Antoninus), and the
"Antoninus Pius"
[ -0.2206653207540512, 0.09355761110782623, -0.109414242208004, -0.27482447028160095, -0.22208109498023987, 1.0550180673599243, 0.268055260181427, 0.5696352124214172, -0.433549702167511, -0.2913514971733093, -0.12340876460075378, -0.40749096870422363, -0.42704683542251587, 0.1313493698835373...
5160
envoy arrived in 166, confusion remains about who sent the mission given that both Emperors were named 'Antoninus'. The Roman mission came from the south (therefore probably by sea), entering China by the frontier province of Jiaozhi at Rinan or Tonkin (present-day northern Vietnam). It brought presents of rhinoceros horns, ivory, and tortoise shell, probably acquired in Southern Asia. The text specifically states that it was the first time there had been direct contact between the two countries. Furthermore, a piece of Republican-era Roman glassware has been found at a Western Han tomb in Guangzhou along the South China Sea,
"Antoninus Pius"
[ -0.3664761781692505, 0.1296398937702179, -0.2463158220052719, -0.035235486924648285, 0.11869743466377258, 0.7486042380332947, 0.4758480191230774, 0.7193865776062012, -0.49240610003471375, -0.3531649708747864, 0.0812717080116272, -0.5323148369789124, -0.3115467429161072, 0.38975727558135986...
5161
dated to the early 1st century BC. Roman golden medallions made during the reign of Antoninus Pius and perhaps even Marcus Aurelius have been found at Óc Eo in southern Vietnam, then part of the Kingdom of Funan near the Chinese province of Jiaozhi. This may have been the port city of Kattigara, described by Ptolemy (c. 150) as being visited by a Greek sailor named Alexander and laying beyond the Golden Chersonese (i.e., Malay Peninsula). Roman coins from the reigns of Tiberius to Aurelian have been discovered in Xi'an, China (site of the Han capital Chang'an), although the significantly
"Antoninus Pius"
[ -0.18009839951992035, 0.02075585536658764, -0.26187044382095337, 0.005957177374511957, 0.08762088418006897, 0.9199332594871521, 0.14756834506988525, 0.7120290398597717, -0.46960756182670593, -0.3297179043292999, -0.010593648999929428, -0.5227028727531433, -0.27378225326538086, 0.2321849465...
5162
greater amount of Roman coins unearthed in India suggest the Roman maritime trade for purchasing Chinese silk was centered there, not in China or even the overland Silk Road running through ancient Iran. The only intact account of his life handed down to us is that of the "Augustan History", an unreliable and mostly fabricated work. Nevertheless, it still contains information that is considered reasonably sound – for instance, it is the only source that mentions the erection of the Antonine Wall in Britain. Antoninus is unique among Roman emperors in that he has no other biographies. Antoninus in many
"Antoninus Pius"
[ -0.14630413055419922, -0.0911085307598114, -0.8716945052146912, -0.13753609359264374, -0.12399996817111969, 0.6900995373725891, 0.5678325295448303, 0.6467307209968567, -0.5631601810455322, -0.4327363967895508, -0.19385677576065063, -0.4062093496322632, -0.36869287490844727, 0.0790576934814...
5163
ways was the ideal of the landed gentleman praised not only by ancient Romans, but also by later scholars of classical history, such as Edward Gibbon or the author of the article on Antoninus Pius in the "Encyclopædia Britannica" Eleventh Edition. Some historians have a less positive view of his reign. According to the historian J. B. Bury, German historian Ernst Kornemann has had it in his "Römische Geschichte" [2 vols., ed. by H. Bengtson, Stuttgart 1954] that the reign of Antoninus comprised "a succession of grossly wasted opportunities," given the upheavals that were to come. There is more to
"Antoninus Pius"
[ -0.0018843525322154164, -0.3769690990447998, -0.3741892874240875, 0.09979202598333359, -0.10476396232843399, 0.4218534529209137, 0.6754035949707031, 0.36327657103538513, -0.4871699810028076, -0.8362312912940979, -0.4525422155857086, 0.13731586933135986, -0.017568573355674744, -0.0921348556...
5164
this argument, given that the Parthians in the East were themselves soon to make no small amount of mischief after Antoninus' passing. Kornemann's brief is that Antoninus might have waged preventive wars to head off these outsiders. Michael Grant agrees that it is possible that had Antoninus acted decisively sooner (it appears that, on his death bed, he was preparing a large-scale action against the Parthians), the Parthians might have been unable to choose their own time, but current evidence is not conclusive. Grant opines that Antoninus and his officers did act in a resolute manner dealing with frontier disturbances
"Antoninus Pius"
[ -0.4065888226032257, -0.21488192677497864, -0.40065568685531616, 0.0479130893945694, -0.3123697340488434, 0.4422573149204254, 0.545974612236023, 0.39088016748428345, -0.3912671208381653, -0.5022218823432922, -0.1647820770740509, -0.21167004108428955, -0.32630735635757446, 0.214584797620773...
5165
of his time, although conditions for long-lasting peace were not created. On the whole, according to Grant, Marcus Aurelius' eulogistic picture of Antoninus seems deserved, and Antoninus appears to have been a conservative and nationalistic (although he respected and followed Hadrian's example of Philhellenism moderately) Emperor who was not tainted by the blood of either citizen or foe, combined and maintained Numa Pompilius' good fortune, pacific dutifulness and religious scrupulousness, and whose laws removed anomalies and softened harshnesses. Krzysztof Ulanowski argues that the claims of military inability are exaggerated, considering that although the sources praise Antoninus' love for peace and
"Antoninus Pius"
[ -0.35843780636787415, -0.1710241138935089, -0.6073133945465088, 0.17586775124073029, -0.5514779686927795, 0.6073400974273682, 0.34713849425315857, 0.3494959771633148, -0.303598016500473, -0.50829017162323, -0.15127524733543396, -0.1588064581155777, -0.6267755627632141, 0.09766959398984909,...
5166
his efforts "rather to defend, than enlarge the provinces", he could hardly be considered a pacifist, as shown by the conquest of the Lowlands, the building of the Antonine Wall and the expansion of Germania Superior. Ulianowski also praises Antoninus for being successful in deterrence by diplomatic means. Although only one of his four children survived to adulthood, Antoninus came to be ancestor to four generations of prominent Romans, including the Emperor Commodus. Hans-Georg Pflaum has identified five direct descendants of Antoninus and Faustina who were consuls in the first half of the third century. Antoninus Pius Antoninus Pius (;
"Antoninus Pius"
[ -0.3089747726917267, -0.4302726686000824, -0.43956121802330017, -0.02133864350616932, -0.457042932510376, 1.1399412155151367, 0.6938489079475403, 0.5389326214790344, -0.601760745048523, -0.7287070155143738, 0.03943508863449097, -0.4038485586643219, -0.5800603628158569, 0.2776927649974823, ...
5167
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three
"Advanced Encryption Standard"
[ -0.10791015625, 0.32446548342704773, 0.048000793904066086, -0.15791839361190796, 0.11799193918704987, -0.11594448238611221, 0.22254565358161926, -0.46346795558929443, 0.16278621554374695, -0.08029983937740326, -0.22253665328025818, 0.47936514019966125, -0.2790162265300751, -0.4060287177562...
5168
different key lengths: 128, 192 and 256 bits. AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES), which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001. This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the
"Advanced Encryption Standard"
[ -0.051698196679353714, 0.12349963933229446, 0.2188957929611206, -0.25511306524276733, 0.24081900715827942, -0.2797853946685791, 0.06236422806978226, -0.1577373594045639, 0.030791854485869408, -0.1334933489561081, -0.3229615092277527, 0.7017488479614258, -0.5753145813941956, -0.031648449599...
5169
most suitable (see Advanced Encryption Standard process for more details). AES became effective as a federal government standard on May 26, 2002, after approval by the Secretary of Commerce. AES is included in the ISO/IEC 18033-3 standard. AES is available in many different encryption packages, and is the first (and only) publicly accessible cipher approved by the National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module (see Security of AES, below). The Advanced Encryption Standard (AES) is defined in each of: AES is based on a design principle known as a substitution–permutation network,
"Advanced Encryption Standard"
[ 0.19226275384426117, 0.4034996032714844, 0.10384748131036758, -0.1527988165616989, 0.21061140298843384, -0.4771534502506256, 0.23965121805667877, -0.13964277505874634, 0.04913175106048584, -0.08438767492771149, -0.2861115336418152, 0.6847363114356995, -0.4933055639266968, -0.17319393157958...
5170
and is efficient in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, Rijndael "per se" is specified with block and key sizes that may be any multiple of 32 bits, with a minimum of 128 and a maximum of 256 bits. AES operates on a 4 × 4 column-major order array of bytes, termed the "state". Most AES calculations are done in a particular finite field.
"Advanced Encryption Standard"
[ 0.02640947699546814, 0.0946602076292038, -0.029220430180430412, -0.1284400373697281, 0.16379712522029877, -0.13160616159439087, 0.2931439280509949, -0.452079713344574, 0.21872961521148682, -0.2334173321723938, -0.3554467260837555, 0.4532164931297302, -0.4896875023841858, -0.344674795866012...
5171
For instance, if there are 16 bytes, formula_1, these bytes are represented as this two-dimensional array: The key size used for an AES cipher specifies the number of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of rounds are as follows: Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. In the SubBytes step, each byte formula_3 in the "state" array is replaced
"Advanced Encryption Standard"
[ -0.15802623331546783, -0.03702007606625557, 0.1860915720462799, -0.2908303141593933, 0.1993480622768402, -0.07430790364742279, 0.21254415810108185, -0.6590255498886108, 0.1510535329580307, -0.19065037369728088, -0.4542560577392578, 0.6680402159690857, -0.1808205246925354, -0.33309280872344...
5172
with a SubByte formula_4 using an 8-bit substitution box. This operation provides the non-linearity in the cipher. The S-box used is derived from the multiplicative inverse over , known to have good non-linearity properties. To avoid attacks based on simple algebraic properties, the S-box is constructed by combining the inverse function with an invertible affine transformation. The S-box is also chosen to avoid any fixed points (and so is a derangement), i.e., formula_5, and also any opposite fixed points, i.e., formula_6. While performing the decryption, the InvSubBytes step (the inverse of SubBytes) is used, which requires first taking the inverse
"Advanced Encryption Standard"
[ -0.3036486506462097, 0.006339420564472675, 0.19851477444171906, -0.23254293203353882, 0.2581239938735962, -0.3170509338378906, 0.221710205078125, -0.5238078236579895, 0.06758078187704086, -0.08267226815223694, -0.7053758502006531, 0.5951132774353027, -0.4508393704891205, -0.366991579532623...
5173
of the affine transformation and then finding the multiplicative inverse. The ShiftRows step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain offset. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. In this way, each column of the output state of the ShiftRows step is composed of bytes from each column of the input state. The importance of this step is to avoid the
"Advanced Encryption Standard"
[ -0.16318543255329132, -0.11208843439817429, 0.08469920605421066, -0.22218340635299683, 0.33178362250328064, -0.3655971586704254, 0.046087659895420074, -0.40494754910469055, 0.17633070051670074, -0.10186419636011124, -0.46025216579437256, 0.7225080132484436, -0.3255140781402588, -0.36654454...
5174
columns being encrypted independently, in which case AES degenerates into four independent block ciphers. In the MixColumns step, the four bytes of each column of the state are combined using an invertible linear transformation. The MixColumns function takes four bytes as input and outputs four bytes, where each input byte affects all four output bytes. Together with ShiftRows, MixColumns provides diffusion in the cipher. During this operation, each column is transformed using a fixed matrix (matrix left-multiplied by column gives new value of column in the state): Matrix multiplication is composed of multiplication and addition of the entries. Entries are
"Advanced Encryption Standard"
[ 0.1055065169930458, -0.008334839716553688, 0.2623385190963745, -0.32986533641815186, 0.26521775126457214, -0.1626657396554947, 0.10064040124416351, -0.6414011120796204, 0.14898747205734253, -0.02313339337706566, -0.5078173875808716, 0.6078534126281738, -0.5833568572998047, -0.4042542874813...
5175
8-bit bytes treated as coefficients of polynomial of order formula_8. Addition is simply XOR. Multiplication is modulo irreducible polynomial formula_9. If processed bit by bit, then, after shifting, a conditional XOR with 1B should be performed if the shifted value is larger than FF (overflow must be corrected by subtraction of generating polynomial). These are special cases of the usual multiplication in formula_10. In more general sense, each column is treated as a polynomial over formula_10 and is then multiplied modulo formula_12 with a fixed polynomial formula_13. The coefficients are displayed in their hexadecimal equivalent of the binary representation of
"Advanced Encryption Standard"
[ -0.3389042317867279, 0.02847898192703724, 0.19486761093139648, -0.1707010269165039, 0.27872923016548157, -0.35770919919013977, 0.07922185212373734, -0.27466845512390137, 0.066783107817173, 0.009172586724162102, -0.5904691219329834, 0.7362527847290039, -0.3088546097278595, -0.50769609212875...
5176
bit polynomials from formula_14. The MixColumns step can also be viewed as a multiplication by the shown particular MDS matrix in the finite field formula_10. This process is described further in the article Rijndael MixColumns. In the AddRoundKey step, the subkey is combined with the state. For each round, a subkey is derived from the main key using Rijndael's key schedule; each subkey is the same size as the state. The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise XOR. On systems with 32-bit or larger words, it is
"Advanced Encryption Standard"
[ -0.08787231147289276, -0.07409997284412384, 0.25134333968162537, -0.3224598467350006, 0.3396625518798828, -0.33061182498931885, 0.18589280545711517, -0.5694149136543274, 0.18852460384368896, -0.01868842914700508, -0.5691112279891968, 0.7451055645942688, -0.3628655970096588, -0.393220424652...
5177
possible to speed up execution of this cipher by combining the SubBytes and ShiftRows steps with the MixColumns step by transforming them into a sequence of table lookups. This requires four 256-entry 32-bit tables (together occupying 4096 bytes). A round can then be performed with 16 table lookup operations and 12 32-bit exclusive-or operations, followed by four 32-bit exclusive-or operations in the AddRoundKey step. Alternatively, the table lookup operation can be performed with a single 256-entry 32-bit table (occupying 1024 bytes) followed by circular rotation operations. Using a byte-oriented approach, it is possible to combine the SubBytes, ShiftRows, and MixColumns
"Advanced Encryption Standard"
[ -0.24112765491008759, 0.019832124933600426, 0.17751137912273407, -0.23022222518920898, 0.15453752875328064, -0.0849100723862648, 0.1755855828523636, -0.695659339427948, 0.03963439539074898, -0.12222099304199219, -0.6222218871116638, 0.5826810002326965, -0.3886163830757141, -0.3868726789951...
5178
steps into a single round operation. Until May 2009, the only successful published attacks against the full AES were side-channel attacks on some specific implementations. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for U.S. Government non-classified data. In June 2003, the U.S. Government announced that AES could be used to protect classified information: The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require
"Advanced Encryption Standard"
[ -0.10925167798995972, 0.18674926459789276, -0.014096197672188282, -0.2254948765039444, 0.2590949833393097, -0.26088470220565796, 0.414919376373291, -0.4792916178703308, 0.19200854003429413, 0.09187029302120209, -0.26736801862716675, 0.7098674774169922, -0.3590610921382904, -0.3309113085269...
5179
use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use. AES has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. By 2006, the best known attacks were on 7 rounds for 128-bit keys, 8 rounds for 192-bit keys, and 9 rounds for 256-bit keys. For cryptographers, a cryptographic "break" is anything faster than a brute-force attack – i.e., performing one trial decryption for each possible key
"Advanced Encryption Standard"
[ -0.14564403891563416, 0.19425855576992035, -0.030246591195464134, -0.21639227867126465, 0.41071224212646484, -0.10510034114122391, 0.5013552308082581, -0.6058268547058105, -0.07294974476099014, 0.14324018359184265, -0.36434993147850037, 0.6435642242431641, -0.27269598841667175, -0.38540509...
5180
in sequence (see Cryptanalysis). A break can thus include results that are infeasible with current technology. Despite being impractical, theoretical breaks can sometimes provide insight into vulnerability patterns. The largest successful publicly known brute-force attack against a widely implemented block-cipher encryption algorithm was against a 64-bit RC5 key by distributed.net in 2006. The key space increases by a factor of 2 for each additional bit of key length, and if every possible value of the key is equiprobable, this translates into a doubling of the average brute-force key search time. This implies that the effort of a brute-force search increases
"Advanced Encryption Standard"
[ -0.18575553596019745, -0.1524118185043335, -0.21000681817531586, -0.11332586407661438, -0.11224545538425446, -0.23434169590473175, 0.32511746883392334, -0.28505900502204895, -0.18819372355937958, 0.15314911305904388, -0.3221808671951294, 0.4821484684944153, -0.35102999210357666, -0.1249875...
5181
exponentially with key length. Key length in itself does not imply security against attacks, since there are ciphers with very long keys that have been found to be vulnerable. AES has a fairly simple algebraic framework. In 2002, a theoretical attack, named the "XSL attack", was announced by Nicolas Courtois and Josef Pieprzyk, purporting to show a weakness in the AES algorithm, partially due to the low complexity of its nonlinear components. Since then, other papers have shown that the attack, as originally presented, is unworkable; see XSL attack on block ciphers. During the AES selection process, developers of competing
"Advanced Encryption Standard"
[ -0.33447185158729553, 0.12191714346408844, -0.14838962256908417, -0.11493921279907227, 0.027903560549020767, -0.20381440222263336, 0.34362471103668213, -0.47019216418266296, 0.28070297837257385, -0.09460077434778214, -0.299967885017395, 0.6678898334503174, -0.6117072701454163, -0.307498306...
5182
algorithms wrote of Rijndael's algorithm "...we are concerned about [its] use ... in security-critical applications." In October 2000, however, at the end of the AES selection process, Bruce Schneier, a developer of the competing algorithm Twofish, wrote that while he thought successful academic attacks on Rijndael would be developed someday, he did not "believe that anyone will ever discover an attack that will allow someone to read Rijndael traffic". In 2009, a new related-key attack was discovered that exploits the simplicity of AES's key schedule and has a complexity of 2. In December 2009 it was improved to 2. This
"Advanced Encryption Standard"
[ -0.31045377254486084, -0.04758790135383606, -0.0031578715424984694, -0.27993640303611755, 0.13314121961593628, -0.406779021024704, 0.47613322734832764, -0.4451230764389038, -0.003541266778483987, -0.11740525811910629, -0.2904895544052124, 0.7634734511375427, -0.4561254680156708, -0.3413403...
5183
is a follow-up to an attack discovered earlier in 2009 by Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolić, with a complexity of 2 for one out of every 2 keys. However, related-key attacks are not of concern in any properly designed cryptographic protocol, as a properly designed protocol (i.e., implementational software) will take care not to allow related keys, essentially by constraining an attacker's means of selecting keys for relatedness. Another attack was blogged by Bruce Schneier on July 30, 2009, and released as a preprint on August 3, 2009. This new attack, by Alex Biryukov, Orr Dunkelman, Nathan Keller,
"Advanced Encryption Standard"
[ -0.347904235124588, 0.2607231140136719, 0.06601123511791229, -0.2835415303707123, 0.14334115386009216, -0.16396911442279816, 0.45329058170318604, -0.7724586725234985, 0.11512855440378189, 0.025934593752026558, -0.42899858951568604, 0.5780567526817322, -0.658401608467102, -0.160537630319595...
5184
Dmitry Khovratovich, and Adi Shamir, is against AES-256 that uses only two related keys and 2 time to recover the complete 256-bit key of a 9-round version, or 2 time for a 10-round version with a stronger type of related subkey attack, or 2 time for an 11-round version. 256-bit AES uses 14 rounds, so these attacks aren't effective against full AES. The practicality of these attacks with stronger related keys has been criticized, for instance, by the paper on "chosen-key-relations-in-the-middle" attacks on AES-128 authored by Vincent Rijmen in 2010. In November 2009, the first known-key distinguishing attack against a
"Advanced Encryption Standard"
[ -0.4627689719200134, 0.18061909079551697, -0.0354362316429615, -0.16248692572116852, 0.29507237672805786, -0.0691491961479187, 0.23521961271762848, -0.614617645740509, 0.2225673496723175, -0.06690161675214767, -0.44928687810897827, 0.5425783395767212, -0.3625909090042114, -0.26147842407226...
5185
reduced 8-round version of AES-128 was released as a preprint. This known-key distinguishing attack is an improvement of the rebound, or the start-from-the-middle attack, against AES-like permutations, which view two consecutive rounds of permutation as the application of a so-called Super-Sbox. It works on the 8-round version of AES-128, with a time complexity of 2, and a memory complexity of 2. 128-bit AES uses 10 rounds, so this attack isn't effective against full AES-128. The first key-recovery attacks on full AES were due to Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger, and were published in 2011. The attack is a
"Advanced Encryption Standard"
[ -0.36779525876045227, 0.11338180303573608, 0.020475218072533607, -0.2627761960029602, 0.17887866497039795, 0.09803669154644012, 0.35229185223579407, -0.7288339138031006, 0.2606002688407898, -0.14248427748680115, -0.534584641456604, 0.520654022693634, -0.48392659425735474, -0.46072256565093...
5186
biclique attack and is faster than brute force by a factor of about four. It requires 2 operations to recover an AES-128 key. For AES-192 and AES-256, 2 and 2 operations are needed, respectively. This result has been further improved to 2 for AES-128, 2 for AES-192 and 2 for AES-256, which are the current best results in key recovery attack against AES. This is a very small gain, as a 126-bit key (instead of 128-bits) would still take billions of years to brute force on current and foreseeable hardware. Also, the authors calculate the best attack using their technique
"Advanced Encryption Standard"
[ -0.30531951785087585, 0.0023007623385638, 0.13240674138069153, -0.06197451800107956, 0.26027682423591614, -0.21806752681732178, 0.32521870732307434, -0.6419667601585388, 0.11802802234888077, -0.23206160962581635, -0.42044559121131897, 0.7402104139328003, -0.2894292175769806, -0.43689796328...
5187
on AES with a 128 bit key requires storing 2 bits of data. That works out to about 38 trillion terabytes of data, which is more than all the data stored on all the computers on the planet in 2016. As such, this is a seriously impractical attack which has no practical implication on AES security. The space complexity has later been improved to 2 bits, which is 9007 terabytes. According to the Snowden documents, the NSA is doing research on whether a cryptographic attack based on tau statistic may help to break AES. At present, there is no known
"Advanced Encryption Standard"
[ 0.04123925045132637, 0.17759931087493896, -0.00547726871445775, -0.014047992415726185, 0.386282742023468, -0.2896741032600403, 0.54985111951828, -0.4765421152114868, 0.08054795861244202, -0.2917705774307251, -0.19420288503170013, 0.6416962742805481, -0.3886019289493561, -0.2472855597734451...
5188
practical attack that would allow someone without knowledge of the key to read data encrypted by AES when correctly implemented. Side-channel attacks do not attack the cipher as a black box, and thus are not related to cipher security as defined in the classical context, but are important in practice. They attack implementations of the cipher on hardware or software systems that inadvertently leak data. There are several such known attacks on various implementations of AES. In April 2005, D.J. Bernstein announced a cache-timing attack that he used to break a custom server that used OpenSSL's AES encryption. The attack
"Advanced Encryption Standard"
[ 0.006850858218967915, 0.09694911539554596, -0.07839072495698929, -0.21553146839141846, 0.06488759815692902, -0.6332472562789917, 0.4666524827480316, -0.5962651968002319, 0.18803977966308594, -0.049539972096681595, -0.20347031950950623, 0.47552794218063354, -0.46110793948173523, -0.00390274...
5189
required over 200 million chosen plaintexts. The custom server was designed to give out as much timing information as possible (the server reports back the number of machine cycles taken by the encryption operation); however, as Bernstein pointed out, "reducing the precision of the server's timestamps, or eliminating them from the server's responses, does not stop the attack: the client simply uses round-trip timings based on its local clock, and compensates for the increased noise by averaging over a larger number of samples." In October 2005, Dag Arne Osvik, Adi Shamir and Eran Tromer presented a paper demonstrating several cache-timing
"Advanced Encryption Standard"
[ -0.18681269884109497, 0.2823590338230133, -0.26246410608291626, -0.22675567865371704, 0.030499711632728577, -0.04852919280529022, 0.18728762865066528, -0.6438565850257874, 0.1321319043636322, 0.0003540795296430588, -0.3266141414642334, 0.5740269422531128, -0.4758068323135376, -0.3849551677...
5190
attacks against the implementations in AES found in OpenSSL and Linux's codice_1 partition encryption function. One attack was able to obtain an entire AES key after only 800 operations triggering encryptions, in a total of 65 milliseconds. This attack requires the attacker to be able to run programs on the same system or platform that is performing AES. In December 2009 an attack on some hardware implementations was published that used differential fault analysis and allows recovery of a key with a complexity of 2. In November 2010 Endre Bangerter, David Gullasch and Stephan Krenn published a paper which described
"Advanced Encryption Standard"
[ -0.2277262657880783, 0.19053077697753906, -0.022777710109949112, -0.22358764708042145, 0.07907503843307495, -0.29232877492904663, 0.4551471769809723, -0.6967074871063232, 0.11099378019571304, -0.36829107999801636, -0.33095595240592957, 0.6369807124137878, -0.4212362766265869, -0.2558954060...
5191
a practical approach to a "near real time" recovery of secret keys from AES-128 without the need for either cipher text or plaintext. The approach also works on AES-128 implementations that use compression tables, such as OpenSSL. Like some earlier attacks this one requires the ability to run unprivileged code on the system performing the AES encryption, which may be achieved by malware infection far more easily than commandeering the root account. In March 2016, Ashokkumar C., Ravi Prakash Giri and Bernard Menezes presented a very efficient side-channel attack on AES implementations that can recover the complete 128-bit AES key
"Advanced Encryption Standard"
[ -0.23734553158283234, 0.19772274792194366, -0.08039522171020508, -0.05073817819356918, 0.18970786035060883, -0.3764020800590515, 0.26818954944610596, -0.6634312272071838, 0.20073294639587402, -0.15730606019496918, -0.515048086643219, 0.6139974594116211, -0.25029709935188293, -0.22079017758...
5192
in just 6–7 blocks of plaintext/ciphertext which is a substantial improvement over previous works that require between 100 and a million encryptions. The proposed attack requires standard user privilege as previous attacks and key-retrieval algorithms run under a minute. Many modern CPUs have built-in hardware instructions for AES, which would protect against timing-related side-channel attacks. The Cryptographic Module Validation Program (CMVP) is operated jointly by the United States Government's National Institute of Standards and Technology (NIST) Computer Security Division and the Communications Security Establishment (CSE) of the Government of Canada. The use of cryptographic modules validated to NIST FIPS 140-2
"Advanced Encryption Standard"
[ 0.23163770139217377, 0.29531633853912354, 0.3305744230747223, 0.1885514110326767, 0.30866679549217224, -0.49298372864723206, 0.2701011598110199, -0.5536634922027588, 0.010620258748531342, -0.19710898399353027, -0.6178312301635742, 0.37099337577819824, -0.00035973446210846305, -0.3626659512...
5193
is required by the United States Government for encryption of all data that has a classification of Sensitive but Unclassified (SBU) or above. From NSTISSP #11, National Policy Governing the Acquisition of Information Assurance: "Encryption products for protecting classified information will be certified by NSA, and encryption products intended for protecting sensitive information will be certified in accordance with NIST FIPS 140-2." The Government of Canada also recommends the use of FIPS 140 validated cryptographic modules in unclassified applications of its departments. Although NIST publication 197 ("FIPS 197") is the unique document that covers the AES algorithm, vendors typically approach
"Advanced Encryption Standard"
[ 0.2811241149902344, 0.20922797918319702, 0.12091522663831711, 0.00900446530431509, 0.3990538418292999, -0.7413969039916992, 0.3157174289226532, -0.33149608969688416, 0.08866889029741287, -0.02686239778995514, -0.6693673133850098, 0.7641575932502747, -0.09385142475366592, -0.401420414447784...
5194
the CMVP under FIPS 140 and ask to have several algorithms (such as Triple DES or SHA1) validated at the same time. Therefore, it is rare to find cryptographic modules that are uniquely FIPS 197 validated and NIST itself does not generally take the time to list FIPS 197 validated modules separately on its public web site. Instead, FIPS 197 validation is typically just listed as an "FIPS approved: AES" notation (with a specific FIPS 197 certificate number) in the current list of FIPS 140 validated cryptographic modules. The Cryptographic Algorithm Validation Program (CAVP) allows for independent validation of the
"Advanced Encryption Standard"
[ 0.15678229928016663, 0.05779270827770233, 0.4339875280857086, 0.07894621044397354, 0.3360625207424164, -0.6340500712394714, 0.024799153208732605, -0.6017148494720459, -0.21828565001487732, 0.1116999089717865, -0.5600708723068237, 0.43912482261657715, -0.15138760209083557, -0.38759624958038...
5195
correct implementation of the AES algorithm at a reasonable cost. Successful validation results in being listed on the NIST validations page. This testing is a pre-requisite for the FIPS 140-2 module validation described below. However, successful CAVP validation in no way implies that the cryptographic module implementing the algorithm is secure. A cryptographic module lacking FIPS 140-2 validation or specific approval by the NSA is not deemed secure by the US Government and cannot be used to protect government data. FIPS 140-2 validation is challenging to achieve both technically and fiscally. There is a standardized battery of tests as well
"Advanced Encryption Standard"
[ 0.1608058661222458, 0.18508954346179962, 0.24147948622703552, 0.06423339247703552, 0.40017011761665344, -0.7776663303375244, 0.271821528673172, -0.4287344217300415, 0.16494853794574738, 0.07842457294464111, -0.5028127431869507, 0.6367990374565125, -0.167144313454628, -0.3903065025806427, ...
5196
as an element of source code review that must be passed over a period of a few weeks. The cost to perform these tests through an approved laboratory can be significant (e.g., well over $30,000 US) and does not include the time it takes to write, test, document and prepare a module for validation. After validation, modules must be re-submitted and re-evaluated if they are changed in any way. This can vary from simple paperwork updates if the security functionality did not change to a more substantial set of re-testing if the security functionality was impacted by the change. Test
"Advanced Encryption Standard"
[ 0.34162020683288574, 0.11850029230117798, 0.1390160769224167, 0.05339767783880234, 0.5153496265411377, -0.7021984457969666, 0.42912113666534424, -0.5634114742279053, 0.09358816593885422, -0.046911679208278656, -0.699944257736206, 0.5008389949798584, -0.01065055187791586, -0.461938053369522...
5197
vectors are a set of known ciphers for a given input and key. NIST distributes the reference of AES test vectors as AES Known Answer Test (KAT) Vectors. High speed and low RAM requirements were criteria of the AES selection process. As the chosen algorithm, AES performed well on a wide variety of hardware, from 8-bit smart cards to high-performance computers. On a Pentium Pro, AES encryption requires 18 clock cycles per byte, equivalent to a throughput of about 11 MB/s for a 200 MHz processor. On a 1.7 GHz Pentium M throughput is about 60 MB/s. On Intel Core
"Advanced Encryption Standard"
[ -0.057617686688899994, 0.1987273097038269, -0.15300846099853516, -0.043515995144844055, 0.06414160132408142, 0.13482165336608887, 0.3669355809688568, -0.5658135414123535, 0.22794504463672638, -0.2681657075881958, -0.4075348973274231, 0.6536022424697876, -0.3505304157733917, -0.406335979700...
5198
i3/i5/i7 and AMD Ryzen CPUs supporting AES-NI instruction set extensions, throughput can be multiple GB/s (even over 10 GB/s). Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For
"Advanced Encryption Standard"
[ -0.09643153101205826, 0.3671388626098633, 0.08544093370437622, -0.2011393904685974, 0.16595323383808136, -0.2794307470321655, 0.22750350832939148, -0.3628584146499634, 0.10208101570606232, -0.2681572437286377, -0.16569821536540985, 0.5480476021766663, -0.23474685847759247, -0.3274438679218...
5199
Argot An argot (; from French "argot" 'slang') is a secret language used by various groups—e.g., schoolmates, outlaws, colleagues, gay people (Polari) among many others—to prevent outsiders from understanding their conversations. The term "argot" is also used to refer to the informal specialized vocabulary from a particular field of study, occupation, or hobby, in which sense it overlaps with jargon. The discipline of medicine has been referred to as having its own argot which includes abbreviations, acronyms, and "technical colloquialisms". Author Victor Hugo was one of the first to research and compile terms from criminal argot. In his 1862 novel
Argot
[ 0.13007675111293793, 0.4621966779232025, -0.43825048208236694, -0.07385232299566269, 0.03681737557053566, 0.27601537108421326, 0.672513484954834, 0.2496350258588791, 0.3683222532272339, -0.18009746074676514, -0.684199869632721, 0.4310287535190582, -0.6073541641235352, -0.12437718361616135,...
5200
"Les Misérables," he refers to that argot as both "the language of the dark" and "the language of misery." The earliest known record of the term "argot" in this context was in a 1628 document. The word was probably derived from the contemporary name "les argotiers", given to a group of thieves at that time. Under the strictest definition, an "argot" is a proper language with its own grammar and style. But such complete secret languages are rare because the speakers usually have some public language in common, on which the argot is largely based. Such argots are mainly versions
Argot
[ -0.06586027890443802, 0.4208228886127472, -0.2827443480491638, -0.33165431022644043, 0.05482969433069229, 0.43178948760032654, 1.0995371341705322, 0.5022279024124146, -0.24035504460334778, -0.2044195830821991, -0.6049870252609253, 0.7441308498382568, -0.4638286232948303, -0.111963167786598...