Total views : 557

Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations

Affiliations

  • Department of Mathematics, College of Science (Dammam), University of Dammam, Eastern Province, Saudi Arabia
  • Departement of Computer Science, Faculty of Mathematical Sciences, University of Khartoum, Khartoum, Sudan

Abstract


When using a symmetric encryption algorithm, specifically the AES, the Block Cipher Mode of Operation to be used must be specified. Usually choosing the mode of operation is influenced by two main factors: 1. Security; and the 2. Performance of the mode. Most of the related literature explores the security of the modes. In contrast, this research paper explores, compares and evaluates the performance of the five modes of operation recommended by the National Institute of Standards and Technology (NIST). A code using Crypto++ cryptographic library has been developed to benchmark the performance of these modes. Based on the conducted experiments and obtained results, the Counter mode of operation has been found generally superior to the other four modes of operation in terms of performance especially when increasing the input size.

Keywords

Confidentiality, Cryptography, Efficiency, Evaluation, Symmetric Encryption.

Full Text:

 |  (PDF views: 462)

References


  • Stallings WS. Cryptography and network security: Principles and practices.
  • Carnegie Mellon University. CERT Statistics (Historical); 2013. Available from: http://www.cert.org/stats
  • Arief B, Adzmi MA, Gross T. Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers. IEEE Security and Privacy. 2015 Jan; 1(1):71–6.
  • Al-Barhmtoshy H, Osman E, Ezzaand M. A novel security model combining cryptography and steganography. King Abdul-Aziz University; 2004. 80203.
  • Ayushi A. Symmetric key cryptographic algorithm. International Journal of Computer Applications. 2010; 1(15).
  • Goyat S. Genetic key generation for public key cryptography. IJSCE. 2012 Jul; 2(3):231–307.
  • FIPS P. 197, Advanced Encryption Standard (AES). National Institute of Standards and Technology. US Department of Commerce; 2001 Nov. Available from: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • Daemen J, Rijmen V. AES submission document on Rijndael, Version 2; 1999 Sep. Available from: http://csrc. nist. gov/CryptoToolkit/aes/rijndael/Rijndael.pdf
  • Dworkin M. Recommendation for block cipher modes of operation, methods and techniques. National Inst of Standards and Technology Gaithersburg Md Computer Security Div; 2001 Dec.
  • Kantarcioglu M. Modes of operation [Lecture notes]. CS 6337: Introduction to Cryptography. The University of Texas at Dallas; 2008 Jan 22.
  • Time OW. ITU-T recommendation G. 114. ITU-T May; 2000 May.
  • Lai YL, Jiang JR. Pricing resources in LTE networks through multiobjective optimization. The Scientific World Journal. 2014 Jan 2; 2014.
  • Dobre Blazhevski, et al. Modes of operation of the AES algorithm. Mishkovski I, Ristov S, editors. The 10th International Conference on Informatics and Information Technology CIIT 2013; Bitola, Macedonia: Molika; 2013 Apr 18-21. p. 212.
  • Xue Y. Block cipher modes of operation [Lecture notes]. CS 285: Network Security. Vanderbilt University; 2013 Oct 1.
  • Van Tilborg HC, Jajodia S, editors. Encyclopedia of cryptography and security. Springer Science and Business Media; 2014 Jul 8.
  • Mitchell CJ, Dent AW. International standards for stream ciphers: A progress report. SASC-The State of the Art of Stream Ciphers. Brugge, Belgium: Novotel Brugge Centrum; 2004 Oct 14-15.
  • Schneier B. Applied cryptography: Protocols, algorithms, and source code in C. John Wiley and Sons; 2007.
  • Lipmaa H, Wagner D, Rogaway P. Comments to NIST concerning AES modes of operation: CTR-mode encryption.
  • Lipmaa H. IDEA: A cipher for multimedia architectures? Selected areas in cryptography. Springer Berlin Heidelberg; 1998 Aug 17. p. 248–63.
  • Rogaway P. Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan; 2011 Feb 10.
  • Huang CW, Ying-Hao TU, Liu SH, Yeh HC. The platform built based on the mode operations of AES and the image applications. IJMECS. 2011 Jul 3; 3(4):1.
  • Bauer GR, Potisk P, Tillich S. Comparing block cipher modes of operation on MICAz sensor nodes. 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing; 2009 Feb 18. p. 371–8.
  • Lee J, Kapitanova K, Son SH. The price of security in wireless sensor networks. Computer Networks. 2010 Dec 3; 54(17):2967–78.
  • McGrew DA, Viega J. The security and performance of the Galois/Counter Mode (GCM) of operation. Progress in Cryptology-INDOCRYPT 2004. Springer Berlin Heidelberg; 2004 Dec 20. p. 343–55.
  • Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC). 2003 Aug 1; 6(3):365–03.
  • Microsoft. AES managed class. Available from: http://msdn.microsoft.com/enus/library/system.security.cryptography.aesmanaged.mode(v=vs.110).aspx
  • Crypto++. Advanced Encryption Standard; 2013 Dec 9. Available from: http://www.cryptopp.com/wiki/Advanced_Encryption_Standard

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.