AES-192-CCM ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Introduction

The AES-192-CCM algorithm is a symmetric key encryption method that combines the Advanced Encryption Standard (AES) using a 192-bit key with the Counter with CBC-MAC (CCM) mode of operation. It is designed to provide both confidentiality and authenticity in a single cryptographic process. AES-192 specifies a block size of 128 bits and a key size of 192 bits, offering a balance between performance and security.

Key Features

  • Symmetric encryption using a 192-bit key.
  • Authenticated encryption ensuring both data confidentiality and integrity.
  • Combination of counter mode (CTR) for encryption and CBC-MAC for authentication.
  • Block size of 128 bits consistent with AES standards.
  • Deterministic generation of authentication tags based on the message and additional data.

Encryption Process

The encryption process begins by splitting the plaintext message into 128-bit blocks. A counter is initialized, and each block is XORed with the output of the AES-192 encryption of the counter value. Simultaneously, a CBC-MAC computation is performed over the plaintext blocks and any additional authenticated data. The resulting MAC is then appended to the ciphertext as an authentication tag, providing integrity verification during decryption.

Decryption Process

Decryption reverses the encryption procedure. The ciphertext is processed with the AES-192 algorithm in counter mode to retrieve the original plaintext. In parallel, the CBC-MAC is recalculated over the decrypted plaintext and additional authenticated data. The recomputed MAC is compared with the received authentication tag. If the tags match, the data is considered authentic and intact; otherwise, it is rejected.

Security Considerations

  • Key management is critical, as the same key must be securely shared between sender and receiver.
  • Reusing nonce values compromises security and can lead to both data leakage and authentication failures.
  • The length of the authentication tag should be chosen according to the required security level.
  • CCM is suitable for applications requiring both encryption and authentication with minimal overhead.

Applications

AES-192-CCM is commonly used in network protocols, embedded systems, and secure communication channels where data integrity and confidentiality are essential. Its deterministic behavior ensures reproducible encryption and reliable authentication across platforms.