HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, ARIA is a block cipher designed in 2003 by a large group of
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korean Peninsula and sharing a land border with North Korea. Its western border is formed by the Yellow Sea, while its eas ...
n researchers. In 2004, the
Korean Agency for Technology and Standards Korean Agency for Technology and Standards (KATS) is the government standards organization for South Korea. It is part of the Ministry of Knowledge Economy. It is authorized to regulate and manage the legal measures of South Korea by the current ...
selected it as a standard cryptographic technique. The algorithm uses a substitution–permutation network structure based on AES. The interface is the same as AES: 128-bit block size with
key size In cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the faste ...
of 128, 192, or 256 bits. The number of rounds is 12, 14, or 16, depending on the key size. ARIA uses two 8×8-bit
S-boxes In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext, thus ensuring Shan ...
and their inverses in alternate rounds; one of these is the
Rijndael S-box The Rijndael S-box is a substitution box (lookup table) used in the Rijndael cipher, on which the Advanced Encryption Standard (AES) cryptographic algorithm is based. Forward S-box The S-box maps an 8-bit input, , to an 8-bit output, . Both the ...
. The key schedule processes the key using a 3-round 256-bit
Feistel cipher In cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel, who did pioneering research ...
, with the binary expansion of 1/ as a source of "
nothing up my sleeve number In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties. They are used in creating cryptographic functions such as hashes and ciphers. These algorithms often need rand ...
s".


Implementations

The reference source code of ARIA cipher implemented in C, C++, and Java can be downloaded from KISA's cryptography use activation webpage.


Standardization

* KATS ** KS X 1213:2004 *
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements and a ...
** Algorithm *** : A Description of the ARIA Encryption Algorithm ** TLS/SSL *** : Addition of the ARIA Cipher Suites to Transport Layer Security (TLS) ** SRTP *** : The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP)


Security

* * *


References


External links


ARIA home

Lazarus/Delphi port of ARIA
{{Cryptography navbox , block Block ciphers