Processing Analysis of Confidential Modes of Operation

This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on “Advance Encryption Standard” recommended by the National Institute of Standards and Technology. The block cipher operation modes that are under consideration for analysis are Electronic Code Book mode, Cipher Block Chaining mode, Cipher Feedback mode, Output Feedback mode, Counter mode, and XEX-based tweaked-codebook mode. The processing analysis of each block cipher operation modes are based on encryption time and decryption time with variable sizes of the data file when implemented in MATLAB. The result of each experiment of the operation mode is summarized in the graphical representation to help to make an instructional decision about operation mode processing when choosing for different applications with secret key ciphers.

[1]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[2]  Siddalingesh S. Navalgund,et al.  Parallelization of AES algorithm for disk encryption using CBC and ICBC modes , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[3]  Rahul Hans,et al.  A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .

[4]  Mohamed Mostafa Abdel-Azim,et al.  Counter Chain: A New Block Cipher Mode of Operation , 2015, J. Inf. Process. Syst..

[5]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[6]  David A. Wagner,et al.  Tweakable Block Ciphers , 2002, Journal of Cryptology.

[7]  Phillip Rogaway,et al.  Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC , 2004, ASIACRYPT.

[8]  Sultan Almuhammadi,et al.  A comparative analysis of AES common modes of operation , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[9]  Xinxin Mei,et al.  Implementation and Analysis of AES Encryption on GPU , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[10]  A. Suruliandi,et al.  Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).

[11]  Erke Aribas,et al.  Comparative Analysis of Block Cipher Modes of Operation , 2017 .

[12]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[13]  Morris J. Dworkin SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .