AES-128-GCM-SIV ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Introduction

The AES-128-GCM-SIV algorithm is a deterministic authenticated encryption scheme designed to provide both confidentiality and integrity of data. It combines the Advanced Encryption Standard with a 128-bit key length and the Galois/Counter Mode with Synthetic Initialization Vector (GCM-SIV) to achieve nonce-misuse resistance. This approach ensures secure encryption even when nonces are reused, addressing a common vulnerability in traditional GCM implementations.

Key Components

  • Key: AES-128 requires a 128-bit secret key used for both encryption and authentication.
  • Nonce: A unique value for each encryption operation, though AES-GCM-SIV is resilient to accidental nonce reuse.
  • Plaintext: The data input that needs to be encrypted.
  • Associated Data (AD): Optional data that is authenticated but not encrypted.
  • Ciphertext: The encrypted output.
  • Authentication Tag: A 128-bit tag used to verify data integrity and authenticity.

Encryption Process

  1. Compute a synthetic IV from the key, nonce, and associated data using a polynomial hash function.
  2. Use the synthetic IV as the starting counter for AES-CTR mode encryption of the plaintext.
  3. Generate the authentication tag by combining the synthetic IV with the encrypted output.

Decryption Process

  1. Recompute the synthetic IV using the received key, nonce, and associated data.
  2. Decrypt the ciphertext using AES-CTR with the synthetic IV as the counter.
  3. Verify the authentication tag matches the recomputed tag to ensure integrity and authenticity.

Security Properties

  • Provides confidentiality by using AES encryption in counter mode.
  • Ensures integrity and authenticity via a synthetic IV-based tag.
  • Resistant to nonce reuse attacks due to deterministic IV computation.
  • Supports additional authenticated data without encrypting it.

Applications

AES-128-GCM-SIV is commonly applied in secure communications, encrypted storage, and network protocols where nonce reuse may occur or high performance is required without sacrificing security guarantees.