AES-128-GCM-SIV ENCRYPTION TOOL
Other Crypto Algorithms
AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAPIntroduction
The AES-128-GCM-SIV algorithm is a deterministic authenticated encryption scheme designed to provide both confidentiality and integrity of data. It combines the Advanced Encryption Standard with a 128-bit key length and the Galois/Counter Mode with Synthetic Initialization Vector (GCM-SIV) to achieve nonce-misuse resistance. This approach ensures secure encryption even when nonces are reused, addressing a common vulnerability in traditional GCM implementations.
Key Components
- Key: AES-128 requires a 128-bit secret key used for both encryption and authentication.
- Nonce: A unique value for each encryption operation, though AES-GCM-SIV is resilient to accidental nonce reuse.
- Plaintext: The data input that needs to be encrypted.
- Associated Data (AD): Optional data that is authenticated but not encrypted.
- Ciphertext: The encrypted output.
- Authentication Tag: A 128-bit tag used to verify data integrity and authenticity.
Encryption Process
- Compute a synthetic IV from the key, nonce, and associated data using a polynomial hash function.
- Use the synthetic IV as the starting counter for AES-CTR mode encryption of the plaintext.
- Generate the authentication tag by combining the synthetic IV with the encrypted output.
Decryption Process
- Recompute the synthetic IV using the received key, nonce, and associated data.
- Decrypt the ciphertext using AES-CTR with the synthetic IV as the counter.
- Verify the authentication tag matches the recomputed tag to ensure integrity and authenticity.
Security Properties
- Provides confidentiality by using AES encryption in counter mode.
- Ensures integrity and authenticity via a synthetic IV-based tag.
- Resistant to nonce reuse attacks due to deterministic IV computation.
- Supports additional authenticated data without encrypting it.
Applications
AES-128-GCM-SIV is commonly applied in secure communications, encrypted storage, and network protocols where nonce reuse may occur or high performance is required without sacrificing security guarantees.