ARIA-192-ECB ENCRYPTION TOOL
Other Crypto Algorithms
AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAPThe ARIA-192-ECB algorithm is a symmetric-key block cipher designed to provide secure encryption for digital data. ARIA operates on fixed-size blocks of 128 bits and supports three key lengths: 128, 192, and 256 bits. In the 192-bit configuration, the cipher uses a key expansion process that generates multiple round keys from the initial secret key. This key schedule ensures that each round applies a distinct transformation, enhancing the diffusion and security of the encryption process.
Structure
ARIA employs a substitution-permutation network (SPN) structure. Each round consists of a combination of substitution layers, permutation layers, and key mixing steps. The substitution layer applies non-linear S-box transformations to the data, providing confusion, while the permutation layer rearranges bits or bytes to achieve diffusion. The key mixing step involves XORing the round key with the intermediate data block.
Rounds
For the 192-bit key variant, ARIA executes 12 rounds of transformation. Each round is composed of four distinct operations: substitution, diffusion through a linear transformation, a round key addition, and a final substitution. The final round omits the last diffusion layer to maintain the structural requirements of the cipher. All transformations are designed to be invertible, allowing decryption to precisely reverse the encryption process.
Key Expansion
The key schedule generates round keys through iterative use of a combination of the original key, predefined constants, and a set of substitution and diffusion operations. The process produces an array of 13 round keys, each 128 bits in length, used sequentially during encryption and decryption. This ensures that each round modifies the data uniquely while maintaining cryptographic security.
Mode of Operation
In ECB (Electronic Codebook) mode, ARIA-192 encrypts each 128-bit block independently using the same key schedule. ECB mode is straightforward and parallelizable but does not provide semantic security for repeated blocks, as identical plaintext blocks produce identical ciphertext blocks. Proper implementation requires attention to block alignment and potential padding schemes for incomplete final blocks.
Performance and Security
ARIA-192-ECB provides efficient encryption and decryption on software and hardware platforms due to its SPN structure and parallelizable block operations. The algorithm resists linear and differential cryptanalysis when implemented correctly, and its 192-bit key length offers a high level of security against brute-force attacks. Security relies on correct key management, implementation integrity, and proper handling of ECB-specific vulnerabilities.