ARIA-192-CFB ENCRYPTION TOOL
Other Crypto Algorithms
AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAPThe ARIA-192-CFB algorithm is a symmetric-key block cipher operating in cipher feedback (CFB) mode. ARIA is a Korean standard encryption algorithm designed to provide high security and efficient performance for both software and hardware implementations. The "192" in ARIA-192-CFB refers to the key size of 192 bits, while CFB mode allows encryption and decryption of data streams of arbitrary length, turning the block cipher into a self-synchronizing stream cipher.
Key Schedule
The algorithm starts with a 192-bit key which undergoes a key expansion process to generate round keys for multiple transformation rounds. ARIA uses substitution-permutation network (SPN) structures, combining S-box substitutions and linear diffusion layers. The key schedule ensures that every round key is unique and derived from the original key through a sequence of non-linear transformations, rotations, and XOR operations. This process maximizes resistance against linear and differential cryptanalysis.
Encryption Process
CFB mode operates by dividing the plaintext into segments equal to the block size, typically 128 bits. Each segment is XORed with the output of the previous encryption step, starting with an initialization vector (IV). The block cipher in ARIA-192 applies multiple rounds of substitution and permutation on the input to produce the ciphertext block. Each round incorporates the round key generated from the key schedule, ensuring that changes in the plaintext or key propagate throughout the ciphertext, enhancing diffusion and confusion properties.
Decryption Process
Decryption in CFB mode reverses the process without requiring inversion of the underlying block cipher. The ciphertext is fed through the same encryption routine to regenerate the keystream, which is then XORed with the ciphertext segments to retrieve the original plaintext. This property allows the use of the same algorithm implementation for both encryption and decryption, simplifying hardware and software deployment.
Security Considerations
ARIA-192-CFB provides strong resistance to known cryptanalytic attacks due to its 192-bit key size and well-designed SPN rounds. The use of CFB mode introduces error propagation limited to a single segment, providing controlled fault tolerance. Proper management of the initialization vector (IV) is critical, as reuse of IVs with the same key can compromise security. The algorithm’s structure ensures high entropy and diffusion, making it suitable for secure communications, file encryption, and data integrity applications.
Performance Characteristics
ARIA-192-CFB offers efficient performance in both software and hardware environments. The algorithm is optimized for 32-bit and 64-bit architectures, achieving high throughput while maintaining low latency. CFB mode allows partial block processing, which is advantageous for streaming data applications and real-time encryption scenarios. The combination of ARIA's SPN structure with CFB mode ensures a balance between security, speed, and operational flexibility.