Skip to main content

Processing Analysis of Confidential Modes of Operation

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11342))

Abstract

This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on “Advance Encryption Standard” recommended by the National Institute of Standards and Technology. The block cipher operation modes that are under consideration for analysis are Electronic Code Book mode, Cipher Block Chaining mode, Cipher Feedback mode, Output Feedback mode, Counter mode, and XEX-based tweaked-codebook mode. The processing analysis of each block cipher operation modes are based on encryption time and decryption time with variable sizes of the data file when implemented in MATLAB. The result of each experiment of the operation mode is summarized in the graphical representation to help to make an instructional decision about operation mode processing when choosing for different applications with secret key ciphers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rogaway, P.: Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)

    Google Scholar 

  2. Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Methods and Techniques. National Institute of Standards and Technology (2001)

    Google Scholar 

  3. Dworkin, M.J.: Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. National Institute of Standards and Technology (2010)

    Google Scholar 

  4. Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9, 289–306 (2015)

    Google Scholar 

  5. Agrawal, M., Mishra, P.: A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 4, 877 (2012)

    Google Scholar 

  6. Bujari, D., Aribas, E.: Comparative analysis of block cipher modes of operation. In: International Advanced Researches & Engineering Congress-2017, pp. 1–4 (2017)

    Google Scholar 

  7. Blazhevski, D., Bozhinovski, A., Stojchevska, B., Pachovski, V.: Modes of operation of the AES algorithm. In: The 10th Conference for Informatics and Information Technology, pp. 212–216 (2013)

    Google Scholar 

  8. Almuhammadi, S., Al-Hejri, I.: A comparative analysis of AES common modes of operation. In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. IEEE (2017)

    Google Scholar 

  9. El-Semary, A.M., Abdel-Azim, M.M.: Counter chain: a new block cipher mode of operation. J. Inf. Process. Syst. 11, 266–279 (2015)

    Google Scholar 

  10. Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16–31. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30539-2_2

    Chapter  Google Scholar 

  11. Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45708-9_3

    Chapter  Google Scholar 

  12. Liskov, M., Rivest, R.L., Wagner, D.J.: Tweakable block ciphers. J. Cryptol. 24, 588–613 (2011)

    Article  MathSciNet  Google Scholar 

  13. Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Comput. Sci. Netw. Secur. 10, 216–222 (2010)

    Google Scholar 

  14. Singhal, N., Raina, J.: Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol. 2, 177–181 (2011)

    Google Scholar 

  15. Thakur, J., Kumar, N.: DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1, 6–12 (2011)

    Google Scholar 

  16. Li, Q., Zhong, C., Zhao, K., Mei, X., Chu, X.: Implementation and analysis of AES encryption on GPU. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication and 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 843–848. IEEE (2012)

    Google Scholar 

  17. Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 840–844. IEEE (2013)

    Google Scholar 

  18. Desai, A., Ankalgi, K., Yamanur, H., Navalgund, S.S.: Parallelization of AES algorithm for disk encryption using CBC and ICBC modes. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2013)

    Google Scholar 

  19. Saraf, K.R., Jagtap, V.P., Mishra, A.K.: Text and image encryption decryption using advanced encryption standard. Int. J. Emerg. Trends Technol. Comput. Sci. 3, 118–126 (2014)

    Google Scholar 

Download references

Acknowledgements

I would like to express my special appreciation and sincere gratitude to my supervisor Professor Lei Wang for his guidance, patience and support. I would like to thank you for encouraging my research and advice on both research as well as on my career have been invaluable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasir Nawaz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nawaz, Y., Wang, L., Ammour, K. (2018). Processing Analysis of Confidential Modes of Operation. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics