Abstract
This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on “Advance Encryption Standard” recommended by the National Institute of Standards and Technology. The block cipher operation modes that are under consideration for analysis are Electronic Code Book mode, Cipher Block Chaining mode, Cipher Feedback mode, Output Feedback mode, Counter mode, and XEX-based tweaked-codebook mode. The processing analysis of each block cipher operation modes are based on encryption time and decryption time with variable sizes of the data file when implemented in MATLAB. The result of each experiment of the operation mode is summarized in the graphical representation to help to make an instructional decision about operation mode processing when choosing for different applications with secret key ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rogaway, P.: Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)
Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Methods and Techniques. National Institute of Standards and Technology (2001)
Dworkin, M.J.: Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. National Institute of Standards and Technology (2010)
Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9, 289–306 (2015)
Agrawal, M., Mishra, P.: A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 4, 877 (2012)
Bujari, D., Aribas, E.: Comparative analysis of block cipher modes of operation. In: International Advanced Researches & Engineering Congress-2017, pp. 1–4 (2017)
Blazhevski, D., Bozhinovski, A., Stojchevska, B., Pachovski, V.: Modes of operation of the AES algorithm. In: The 10th Conference for Informatics and Information Technology, pp. 212–216 (2013)
Almuhammadi, S., Al-Hejri, I.: A comparative analysis of AES common modes of operation. In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. IEEE (2017)
El-Semary, A.M., Abdel-Azim, M.M.: Counter chain: a new block cipher mode of operation. J. Inf. Process. Syst. 11, 266–279 (2015)
Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16–31. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30539-2_2
Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45708-9_3
Liskov, M., Rivest, R.L., Wagner, D.J.: Tweakable block ciphers. J. Cryptol. 24, 588–613 (2011)
Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Comput. Sci. Netw. Secur. 10, 216–222 (2010)
Singhal, N., Raina, J.: Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol. 2, 177–181 (2011)
Thakur, J., Kumar, N.: DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1, 6–12 (2011)
Li, Q., Zhong, C., Zhao, K., Mei, X., Chu, X.: Implementation and analysis of AES encryption on GPU. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication and 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 843–848. IEEE (2012)
Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 840–844. IEEE (2013)
Desai, A., Ankalgi, K., Yamanur, H., Navalgund, S.S.: Parallelization of AES algorithm for disk encryption using CBC and ICBC modes. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2013)
Saraf, K.R., Jagtap, V.P., Mishra, A.K.: Text and image encryption decryption using advanced encryption standard. Int. J. Emerg. Trends Technol. Comput. Sci. 3, 118–126 (2014)
Acknowledgements
I would like to express my special appreciation and sincere gratitude to my supervisor Professor Lei Wang for his guidance, patience and support. I would like to thank you for encouraging my research and advice on both research as well as on my career have been invaluable.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Nawaz, Y., Wang, L., Ammour, K. (2018). Processing Analysis of Confidential Modes of Operation. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-05345-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05344-4
Online ISBN: 978-3-030-05345-1
eBook Packages: Computer ScienceComputer Science (R0)