CAMELLIA-192-CFB8 ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

The Camellia-192-CFB8 algorithm is a symmetric block cipher operating with a 192-bit key length and using the Cipher Feedback 8-bit (CFB8) mode of operation. Camellia itself was developed to provide high security and performance suitable for both hardware and software environments. The algorithm is designed to handle data streams by converting a block cipher into a self-synchronizing stream cipher through the CFB8 mode. In this mode, the plaintext is processed in 8-bit segments, allowing immediate encryption or decryption without waiting for a full block.

Key Features

  • Block Size: 128 bits
  • Key Size: 192 bits
  • Mode of Operation: CFB8 (8-bit Cipher Feedback)
  • Type: Symmetric, iterative block cipher

Key Schedule

Camellia-192 generates subkeys through a deterministic key schedule process. The 192-bit key is divided into two 96-bit halves and expanded into multiple round keys using a combination of fixed S-box substitutions, P-function transformations, and linear diffusion operations. The process ensures that each round uses a unique subkey derived from the original key, maintaining strong diffusion and resistance against known cryptanalytic attacks.

Encryption Process

Encryption in CFB8 mode begins with an initialization vector (IV) of 128 bits. The IV is encrypted using the standard Camellia block cipher, and the most significant 8 bits of the encrypted IV are XORed with the first byte of plaintext to produce the ciphertext byte. This ciphertext byte is then fed back into the shift register replacing the corresponding byte in the IV. The process repeats for each subsequent plaintext byte, maintaining synchronization between encryption and decryption streams.

Decryption Process

Decryption mirrors the encryption procedure. Each ciphertext byte is XORed with the output of the block cipher applied to the current shift register state, recovering the original plaintext byte. The ciphertext byte is then shifted into the register, replacing the oldest byte. This feedback mechanism ensures that errors propagate minimally, affecting only the current and subsequent 8-bit segments, which provides controlled error diffusion.

Security Considerations

Camellia-192-CFB8 inherits the cryptographic strength of Camellia with a 192-bit key, offering resistance against linear and differential cryptanalysis. The CFB8 mode allows processing of small data units without padding, while maintaining confidentiality. Proper IV management is essential to prevent repetition, as using identical IVs with the same key can compromise security. The algorithm is suitable for secure data transmission over network protocols requiring streaming encryption.