AES-192-SIV ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Introduction

The AES-192-SIV algorithm is a deterministic authenticated encryption algorithm designed to provide both confidentiality and integrity. It is a variant of the Advanced Encryption Standard (AES) with a 192-bit key size and employs Synthetic Initialization Vector (SIV) mode to prevent nonce reuse vulnerabilities. AES-192-SIV ensures that the same plaintext and associated data always produce the same ciphertext when encrypted with the same key, which enhances security against certain attacks while allowing safe deterministic encryption.

Key Components

  • Key Size: 192 bits, providing a balance between performance and security.
  • Block Cipher: AES operating in 128-bit block size mode.
  • SIV Construction: The algorithm uses a synthetic IV derived from the plaintext and associated data through a pseudorandom function, typically CMAC or PMAC, to produce a deterministic initialization vector.
  • Associated Data: AES-192-SIV supports additional authenticated data (AAD) to ensure integrity of headers or metadata.

Algorithm Steps

  1. Input: The algorithm receives a 192-bit secret key, plaintext message, and optional associated data.
  2. Synthetic IV Generation: A pseudorandom function is applied to the plaintext and associated data to produce a 128-bit synthetic IV. This IV serves both as an authentication tag and as the initialization vector for AES encryption.
  3. Encryption: The plaintext is encrypted using AES-192 in counter mode with the synthetic IV as the counter's starting point, producing ciphertext.
  4. Authentication Tag: The synthetic IV doubles as the authentication tag, allowing verification of both ciphertext integrity and associated data authenticity during decryption.
  5. Output: The final output consists of the synthetic IV concatenated with the ciphertext. This ensures deterministic encryption while preserving security properties.

Security Properties

AES-192-SIV is resistant to nonce misuse because the synthetic IV is derived deterministically from the message content. It provides strong confidentiality through AES-192 encryption and robust integrity protection via the SIV construction. The deterministic nature of the algorithm also enables safe repeated encryption of the same data without compromising security.

Use Cases

The algorithm is suitable for systems requiring authenticated encryption where nonce reuse is a concern. Typical applications include secure storage, database encryption, and communication protocols that must tolerate repeated encryption of identical messages without leaking information.