ARIA-128-GCM ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

The ARIA-128-GCM algorithm is a symmetric key cryptographic technique designed to provide both confidentiality and integrity of data. It combines the ARIA block cipher with the Galois/Counter Mode (GCM) of operation, enabling efficient authenticated encryption suitable for secure communication protocols and data protection applications.

Core Components

ARIA-128: ARIA is a substitution-permutation network (SPN) cipher supporting key sizes of 128, 192, and 256 bits. In the 128-bit configuration, it operates on 128-bit blocks with 12 rounds of transformations. Each round consists of key addition, substitution using S-boxes, diffusion through linear transformations, and round key mixing. The round keys are derived from the original 128-bit key using a deterministic key schedule that ensures high resistance against linear and differential cryptanalysis.

Galois/Counter Mode (GCM): GCM is a mode of operation for block ciphers that provides authenticated encryption. It transforms the underlying block cipher into a stream cipher using a counter-based mechanism and combines this with a Galois field multiplication for authentication. The GCM mode generates an authentication tag that ensures data integrity and prevents tampering. It supports parallel processing, enhancing performance on modern hardware.

Encryption Process

The encryption process begins with key expansion, producing round keys for ARIA-128. The plaintext is divided into 128-bit blocks. Each block undergoes the ARIA-128 transformations, resulting in ciphertext blocks. Simultaneously, GCM computes a hash-based authentication tag using Galois field operations on the ciphertext and any associated additional authenticated data (AAD). The counter value is incremented for each block to maintain uniqueness, ensuring semantic security.

Decryption and Authentication

During decryption, the ciphertext blocks are processed through ARIA-128 in reverse order using the expanded round keys. The GCM mode recomputes the authentication tag and compares it to the received tag. If the tags match, the data is considered authentic and untampered; otherwise, decryption fails. This integrated approach prevents unauthorized modification and ensures both confidentiality and integrity in a single operation.

Performance and Security Features

ARIA-128-GCM is designed for high-speed implementations, leveraging parallelism in GCM and efficient ARIA transformations. Its security relies on the robustness of ARIA against cryptanalytic attacks and the provable security properties of GCM, including resistance to forgery attacks under nonce uniqueness. The 128-bit key size provides a balance between computational efficiency and a strong security margin suitable for a wide range of applications including network security protocols, encrypted storage, and secure communications.