ARIA-192-CCM ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Introduction

The Aria-192-CCM algorithm is a symmetric key block cipher operating in Counter with CBC-MAC (CCM) mode. It is specifically designed for authenticated encryption, providing both confidentiality and integrity of data. The algorithm combines the Aria block cipher, a 128-bit block cipher, with the CCM mode to ensure secure encryption and message authentication simultaneously.

Key Features

  • Block Size: 128 bits
  • Key Size: 192 bits
  • Mode of Operation: CCM (Counter with CBC-MAC)
  • Security Properties: Provides both encryption and integrity verification
  • Applications: Suitable for secure communications in constrained environments

Algorithm Structure

The Aria cipher itself is structured as a substitution-permutation network (SPN). It employs a series of rounds consisting of substitution (S-box) layers, diffusion layers using linear transformations, and round key additions. The 192-bit key is expanded into round keys according to the Aria key schedule, ensuring resistance to differential and linear cryptanalysis.

CCM Mode Operation

CCM mode integrates two functions: Counter (CTR) mode for encryption and Cipher Block Chaining Message Authentication Code (CBC-MAC) for authentication. During encryption, plaintext blocks are processed through CTR mode to produce ciphertext. Simultaneously, CBC-MAC generates an authentication tag over the plaintext and additional associated data. This tag is appended to the ciphertext, enabling verification of integrity and authenticity during decryption.

Encryption Process

  1. Generate nonce and initialize counter.
  2. Apply CBC-MAC to the plaintext and additional authenticated data (AAD) to compute the authentication tag.
  3. Encrypt the plaintext using CTR mode with the Aria-192 key.
  4. Append the authentication tag to the ciphertext.

Decryption Process

  1. Extract the authentication tag from the received message.
  2. Decrypt the ciphertext using CTR mode with the same Aria-192 key.
  3. Recompute CBC-MAC on the decrypted plaintext and AAD.
  4. Compare computed tag with the received tag to verify integrity.

Security Considerations

The Aria-192-CCM algorithm is resistant to common cryptanalytic attacks when keys and nonces are used correctly. Proper nonce management is critical to prevent replay attacks or encryption collisions. The algorithm ensures that any alteration of ciphertext or associated data is detected through tag verification, providing strong guarantees of both confidentiality and data integrity.