ARIA is a general-purpose block cipher algorithm developed by Korean cryptographers in 2003.ARIA is an iterated block cipher with 128-, 192- and 256-bit keys and encrypts 12-bit blocks in 12, 14 and 16 rounds depending on key size. ARIA is secure and suitable for most software and hardware implementations on 32-bit and 8-bit processors. The ARIA algorithm uses a substitution-permutation network structure based on AES. ARIA uses two 8×8-bit S-boxes and their inverses in alternate rounds; one of these is the Rijndael S-box. The key schedule processes the key using a 3-round 256-bit Feistel cipher, with the binary expansion of 1/π as a source of “nothing up my sleeve numbers”. All the rules of this algorithm are given in RFC 5794.

An ARIA encryption/decryption apparatus for encrypting and decrypting input data by repeating a plurality of rounds. The ARIA encryption/decryption apparatus comprises of:

- A first register storing input data according to a first control signal.
- A second register storing an input round key for every round.
- An exclusive OR operation unit performing its operation on the values stored in first and second registers.
- A substitution unit substituting a result of the exclusive OR of an ARIA diffusion algorithm if a current round is not a final round
- A control unit outputting the first control signals so that the output of the diffusion unit is used as the intermediate calculation value if the current round is not the final round.

### Steps Involved in ARIA Algorithm

- Key Scheduling Part: Here a master key is selected and left and right keys are given bit ranges.
- Data Randomizing Part: Data Randomizing Part of ARIA algorithm consists of encryption and decryption process. The encryption and decryption processes use functions FO, FE, A, SL1 and SL2.

## Advantages of ARIA Encryption Algorithm

- ARIA Algorithm offers a considerable security margin.
- The use of ARIA Algorithm within Secure Real Time Transport Protocol provides confidentiality for RTP traffic and also controls RTP traffic.

### Relevant Technical Articles:

**3-Way Algorithm for Encryption & Decryption – Cryptography & Data Security :-**Cryptography consists of Block Ciphers. One of such block cipher algorithm is the 3-Way Algorithm....**ABC Algorithm for Encryption & Decryption – Cryptography & Data Security :-**ABC algorithm, also called Artificial Bee Colony Algorithm was proposed by Karaboga in 2005. Artificial...**Cryptography Algorithms for Data Encryption/Decryption and Information Scrambling/Descrambling :-**Cryptography is the practice and study of hiding secret information by encryption. Encryption is the...**Cryptography Projects for Data Encryption Security :-**Cryptography is the security practice of Data Encryption for hiding secret information. Encryption is the...**Data Encryption Standard – DES Encryption Algorithm :-**Data Encryption Standard (DES) or DES Encryption Algorithm is a technique by which a message...**Advanced Encryption Standard – AES Encryption Algorithm :-**The Advanced Encryption Standard (AES) is an encryption algorithm for securing information in commercial transactions...**Cryptography: Encryption & Decryption Algorithms Applications & Advantages :-**Cryptography (or cryptology) is the practice and study of hiding secret information by encryption. Encryption...**Encryption Algorithms for Cryptographic Network Security in Data Communications & Storage :-**Encryption is for information security in digital data communication and storage networks. Encryption programs use...**Message Authentication Codes (MAC) – Cryptography & Data Security :-**Message Authentication Code (MAC) is one of the Cryptographic Hash Function and is a short...**RFID Cryptography Encryption Algorithm CryptoCompanion :-**CryptoCompanion provides plug-and-play host-side cryptographic security for embedded systems. This plug-and-play convenience means that designers...