Advertisement

Processing Analysis of Confidential Modes of Operation

  • Yasir Nawaz
  • Lei Wang
  • Kamel Ammour
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)

Abstract

This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on “Advance Encryption Standard” recommended by the National Institute of Standards and Technology. The block cipher operation modes that are under consideration for analysis are Electronic Code Book mode, Cipher Block Chaining mode, Cipher Feedback mode, Output Feedback mode, Counter mode, and XEX-based tweaked-codebook mode. The processing analysis of each block cipher operation modes are based on encryption time and decryption time with variable sizes of the data file when implemented in MATLAB. The result of each experiment of the operation mode is summarized in the graphical representation to help to make an instructional decision about operation mode processing when choosing for different applications with secret key ciphers.

Keywords

Cryptography Block cipher Advance Encryption Standard Modes of operation Encryption algorithms 

Notes

Acknowledgements

I would like to express my special appreciation and sincere gratitude to my supervisor Professor Lei Wang for his guidance, patience and support. I would like to thank you for encouraging my research and advice on both research as well as on my career have been invaluable.

References

  1. 1.
    Rogaway, P.: Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)Google Scholar
  2. 2.
    Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Methods and Techniques. National Institute of Standards and Technology (2001)Google Scholar
  3. 3.
    Dworkin, M.J.: Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. National Institute of Standards and Technology (2010)Google Scholar
  4. 4.
    Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9, 289–306 (2015)Google Scholar
  5. 5.
    Agrawal, M., Mishra, P.: A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 4, 877 (2012)Google Scholar
  6. 6.
    Bujari, D., Aribas, E.: Comparative analysis of block cipher modes of operation. In: International Advanced Researches & Engineering Congress-2017, pp. 1–4 (2017)Google Scholar
  7. 7.
    Blazhevski, D., Bozhinovski, A., Stojchevska, B., Pachovski, V.: Modes of operation of the AES algorithm. In: The 10th Conference for Informatics and Information Technology, pp. 212–216 (2013)Google Scholar
  8. 8.
    Almuhammadi, S., Al-Hejri, I.: A comparative analysis of AES common modes of operation. In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. IEEE (2017)Google Scholar
  9. 9.
    El-Semary, A.M., Abdel-Azim, M.M.: Counter chain: a new block cipher mode of operation. J. Inf. Process. Syst. 11, 266–279 (2015)Google Scholar
  10. 10.
    Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16–31. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-30539-2_2CrossRefGoogle Scholar
  11. 11.
    Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45708-9_3CrossRefGoogle Scholar
  12. 12.
    Liskov, M., Rivest, R.L., Wagner, D.J.: Tweakable block ciphers. J. Cryptol. 24, 588–613 (2011)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Comput. Sci. Netw. Secur. 10, 216–222 (2010)Google Scholar
  14. 14.
    Singhal, N., Raina, J.: Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol. 2, 177–181 (2011)Google Scholar
  15. 15.
    Thakur, J., Kumar, N.: DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1, 6–12 (2011)Google Scholar
  16. 16.
    Li, Q., Zhong, C., Zhao, K., Mei, X., Chu, X.: Implementation and analysis of AES encryption on GPU. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication and 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 843–848. IEEE (2012)Google Scholar
  17. 17.
    Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 840–844. IEEE (2013)Google Scholar
  18. 18.
    Desai, A., Ankalgi, K., Yamanur, H., Navalgund, S.S.: Parallelization of AES algorithm for disk encryption using CBC and ICBC modes. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2013)Google Scholar
  19. 19.
    Saraf, K.R., Jagtap, V.P., Mishra, A.K.: Text and image encryption decryption using advanced encryption standard. Int. J. Emerg. Trends Technol. Comput. Sci. 3, 118–126 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations