Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations

When using a symmetric encryption algorithm, specifically the AES, the Block Cipher Mode of Operation to be used must be specified. Usually choosing the mode of operation is influenced by two main factors: 1. Security; and the 2. Performance of the mode. Most of the related literature explores the security of the modes. In contrast, this research paper explores, compares and evaluates the performance of the five modes of operation recommended by the National Institute of Standards and Technology (NIST). A code using Crypto++ cryptographic library has been developed to benchmark the performance of these modes. Based on the conducted experiments and obtained results, the Counter mode of operation has been found generally superior to the other four modes of operation in terms of performance especially when increasing the input size.

[1]  BLOCK CIPHER MODES OF OPERATION , 2015 .

[2]  Ayushi A Symmetric Key Cryptographic Algorithm , 2010 .

[3]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[4]  W. Campbell,et al.  THE UNIVERSITY OF TEXAS AT DALLAS , 2004 .

[5]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Chi-Wu Huang,et al.  The Platform Built Based on the Mode operations of AES and the Image Applications , 2011 .

[8]  Saudi Arabia,et al.  A Novel Security Model Combining Cryptography and Steganography , 2004 .

[9]  John Viega,et al.  The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.

[10]  Veno Jovan Pachovski,et al.  MODES OF OPERATION OF THE AES ALGORITHM , 2014 .

[11]  Helger Lipmaa,et al.  Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .

[12]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[13]  Jehn-Ruey Jiang,et al.  Pricing Resources in LTE Networks through Multiobjective Optimization , 2014, TheScientificWorldJournal.

[14]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[15]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[16]  Helger Lipmaa,et al.  IDEA: A Cipher For Multimedia Architectures? , 1998, Selected Areas in Cryptography.

[17]  Sonia Goyat GENETIC KEY GENERATION FOR PUBLIC KEY CRYPTOGRAPHY , 2012 .

[18]  Chris J. Mitchell,et al.  International standards for stream ciphers : A progress report , 2004 .

[19]  Budi Arief,et al.  Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.

[20]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[21]  Stefan Tillich,et al.  Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes , 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[22]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[23]  Vashitva Kumar Srivastava,et al.  A Symmetric Key Cryptographic Algorithm , 2012 .

[24]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .