AES-192-WRAP ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

The AES-192 Key Wrap algorithm is a symmetric encryption method designed specifically for secure key management. It uses the Advanced Encryption Standard (AES) with a 192-bit key to provide confidentiality and integrity protection for cryptographic keys. The algorithm ensures that the wrapped key can only be recovered by entities possessing the correct wrapping key, preventing unauthorized access.

Purpose and Applications

This algorithm is primarily employed in scenarios requiring secure transmission or storage of cryptographic keys, including key exchange protocols, hardware security modules (HSMs), and secure storage solutions. By combining confidentiality and integrity, AES-192 Key Wrap reduces the risk of key leakage and tampering during transport or storage.

Input and Output

The algorithm takes two main inputs: the plaintext key data to be wrapped and a 192-bit AES key used for wrapping. The output is a wrapped key that includes both the encrypted key material and an integrity check value derived from the wrapping process. The integrity check ensures that any modifications to the wrapped key can be detected during unwrapping.

Algorithm Steps

  1. Divide the plaintext key into n 64-bit blocks, labeling them P1 through Pn.
  2. Initialize an integrity check register with a fixed 64-bit constant value.
  3. For a predefined number of iterations, perform a sequence of AES encryptions and XOR operations across the blocks and the integrity register to propagate both encryption and integrity information.
  4. Concatenate the final integrity register with the transformed blocks to form the wrapped key output.
  5. During unwrapping, reverse the encryption steps and verify the integrity check value to ensure authenticity and correctness of the unwrapped key.

Security Considerations

AES-192 Key Wrap is resistant to key recovery attacks under standard cryptographic assumptions. It provides strong protection against both passive and active adversaries by combining AES encryption with a built-in integrity mechanism. The 192-bit key length offers a higher security margin compared to AES-128 while maintaining efficiency suitable for most secure key management applications.

Standards and Compliance

The algorithm is standardized in RFC 3394, specifying the precise transformation rules, constants, and iteration counts required to ensure interoperability between different implementations. Compliance with the standard guarantees consistent behavior and reliable key protection across platforms and environments.