ARIA (cipher)
Block cipher
title: "ARIA (cipher)" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["block-ciphers", "standards-of-south-korea"] description: "Block cipher" topic_path: "technology/cryptography" source: "https://en.wikipedia.org/wiki/ARIA_(cipher)" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Block cipher ::
::data[format=table title="Infobox block cipher"]
| Field | Value |
|---|---|
| name | ARIA |
| publish date | 2003 |
| derived from | AES |
| certification | South Korean standard |
| key size | 128, 192, or 256 bits |
| block size | 128 bits |
| structure | Substitution–permutation network |
| rounds | 12, 14, or 16 |
| cryptanalysis | Meet-in-the-middle attack on 8 rounds with data complexity 256 |
| :: |
| name = ARIA | designers = | publish date = 2003 | derived from = AES | derived to = | related to = | certification = South Korean standard | key size = 128, 192, or 256 bits | block size = 128 bits | structure = Substitution–permutation network | rounds = 12, 14, or 16 | cryptanalysis = Meet-in-the-middle attack on 8 rounds with data complexity 256 In cryptography, ARIA is a block cipher designed in 2003 by a large group of South Korean researchers. In 2004, the Korean Agency for Technology and Standards selected it as a standard cryptographic technique.
The algorithm uses a substitution–permutation network structure based on AES. The interface is the same as AES: 128-bit block size with key size of 128, 192, or 256 bits. The number of rounds is 12, 14, or 16, depending on the key size. ARIA uses two 8×8-bit S-boxes and their inverses in alternate rounds; one of these is the Rijndael S-box.
The key schedule processes the key using a 3-round 256-bit Feistel cipher, with the binary expansion of 1/ as a source of "nothing up my sleeve numbers".
Implementations
The reference source code of ARIA cipher implemented in C, C++, and Java can be downloaded from KISA's cryptography use activation webpage.
Standardization
Security
- {{cite report | author = A. Biryukov | author2 = C. De Cannière | author3 = J. Lano | author4 = B. Preneel | author4-link = Bart Preneel | author5 = S. B. Örs | author-link = Alex Biryukov | title = Security and Performance Analysis of ARIA | version = Version 1.2—Final Report | publisher = Katholieke Universiteit Leuven | date = January 7, 2004 | url = https://www.esat.kuleuven.be/cosic/publications/article-500.pdf | format = PDF | access-date = 2024-05-28}}
- {{cite journal | author1=Wenling Wu | author2=Wentao Zhang | author3=Dengguo Feng | title = Impossible Differential Cryptanalysis of ARIA and Camellia | year = 2006 | url = http://eprint.iacr.org/2006/350 | journal = Cryptology ePrint Archive | access-date = January 19, 2007}}
- {{cite journal | author1=Xuehai Tang | author2=Bing Sun | author3=Ruilin Li | author4=Chao Li | title = A Meet-in-the-Middle Attack on ARIA | date = March 30, 2010 | url = http://eprint.iacr.org/2010/168 | journal = Cryptology ePrint Archive | access-date = April 24, 2010}}
References
References
- "KISA: Block Cipher: ARIA".
- (2003). "Information Security and Cryptology - ICISC 2003". Springer International Publishing.
- "KISA: Cryptographic algorithm source code: ARIA".
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::