Abstract:
Modern-day Symmetric-key Cryptology is enriched with numerous contributions including
symmetric-key primitives to modes of operation. The approach to design and develop provably
secure designs have accelerated the growth of this subject. A lot of encryption, authentication
and authenticated encryption modes are available publicly that are provably secure and gives
good results in terms of e ciency. But there is not much resource that studies all the modes
and conclude about their performance at the same time. This work is intended to study and
compare all these modes of operation, both in terms of security (con dentiality and integrity)
and e ciency (implementation area and throughput). We took care of di erent security
notions and design rationales of compared schemes and generalised them as much as possible