{"title":"A comparative analysis of AES common modes of operation","authors":"Sultan Almuhammadi, I. Al-Hejri","doi":"10.1109/CCECE.2017.7946655","DOIUrl":null,"url":null,"abstract":"With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National Institute of Standards and Technology (NIST). The comparison is done in terms of encryption time, decryption time, and throughput with variable data packet sizes. The results of the comparison are summarized and our observations are highlighted to help making informative decision when choosing the mode of operations for different applications with symmetric-key ciphers.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2017.7946655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24
Abstract
With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National Institute of Standards and Technology (NIST). The comparison is done in terms of encryption time, decryption time, and throughput with variable data packet sizes. The results of the comparison are summarized and our observations are highlighted to help making informative decision when choosing the mode of operations for different applications with symmetric-key ciphers.