ARIA-128-CFB1 ENCRYPTION TOOL
Other Crypto Algorithms
AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAPThe ARIA-128-CFB1 algorithm is a symmetric key block cipher mode of operation that applies the ARIA encryption standard in a one-bit cipher feedback configuration. ARIA itself is a Korean-developed block cipher designed to provide secure and efficient encryption with a 128-bit block size. In the CFB1 mode, the algorithm processes plaintext data in units of single bits, allowing encryption and decryption to occur in a stream-like manner while maintaining block cipher security properties.
Key Characteristics
- Block Size: 128 bits
- Key Length: 128 bits for this variant
- Mode: Cipher Feedback (CFB1) with one-bit feedback
- Operation: Stream-oriented encryption and decryption
Encryption Process
Encryption begins by initializing a 128-bit initialization vector (IV) which serves as the starting state for the cipher feedback loop. The plaintext is divided into single-bit segments. For each bit, the current state is encrypted using the ARIA-128 block cipher, producing a 128-bit output block. The most significant bit of this output is then XORed with the current plaintext bit to produce the corresponding ciphertext bit. Following this, the state is updated by shifting in the ciphertext bit, ensuring that the next bit of plaintext will be combined with the updated state for encryption. This iterative process continues until all plaintext bits have been processed.
Decryption Process
Decryption mirrors the encryption procedure. The initial state is set using the same IV. For each incoming ciphertext bit, the ARIA-128 block cipher encrypts the current state, and the most significant bit of the resulting block is XORed with the ciphertext bit to recover the plaintext bit. After recovering the plaintext bit, the state is updated by incorporating the ciphertext bit. This ensures the feedback mechanism remains synchronized with encryption, enabling correct plaintext recovery for all bits.
Security Considerations
The one-bit feedback configuration allows fine-grained encryption of data streams, providing immediate propagation of bit changes across the feedback loop. The security of ARIA-128-CFB1 depends on the strength of the underlying ARIA-128 block cipher and the unpredictability of the initialization vector. The CFB1 mode provides confidentiality while maintaining a small memory footprint and allowing for encryption of data without padding requirements. Proper management of keys and IVs is critical to prevent replay attacks or compromise of bitwise encryption security.