Camellia Encryption & Decryption
ISO/NESSIE/CRYPTREC certified cipher - equivalent security to AES
Security Notice
Camellia provides excellent security equivalent to AES. It is recommended for applications requiring ISO/IEC standards compliance or Japanese/European certifications.
About Camellia
About Camellia
Camellia is a symmetric block cipher developed jointly by Mitsubishi Electric and NTT (Nippon Telegraph and Telephone) and published in 2000. It operates on 128-bit blocks with 128, 192, or 256-bit keys. The algorithm organizes its rounds into groups of six, each group followed by FL/FL⁻¹ functions — key-dependent bitwise operations that inject additional non-linearity between the main Feistel layers, a structural element absent from AES.
Key Features
- 128-bit block size with 128/192/256-bit key support — identical block width to AES, ensuring byte-for-byte mode compatibility in TLS and IPsec
- 18 rounds for 128-bit keys; 24 rounds for 192/256-bit keys — organized in six-round groups with FL/FL⁻¹ layers between each group
- FL/FL⁻¹ functions between round groups: unique to Camellia, they apply key-dependent AND/OR/rotate operations that greatly increase diffusion of key material
- Triple certification: ISO/IEC 18033-3 global standard, NESSIE European project, and CRYPTREC Japanese government recommendation — the only non-AES cipher with all three
- Patent-free since 2017; already integrated in OpenSSL, GnuTLS, NSS (Firefox), LibreSSL, and Bouncy Castle across major TLS and VPN deployments
- Patent-free since 2017; already integrated in OpenSSL, GnuTLS, NSS (Firefox), LibreSSL, and Bouncy Castle across major TLS and VPN deployments
Encryption Modes
Encryption Modes
Algorithm Comparison
| Algorithm | Block Size | Key Length | Security | Standard | Standard |
|---|---|---|---|---|---|
| Camellia | 128 bit | 128/192/256 | 18/24 | Excellent | ISO/NESSIE/CRYPTREC |
| AES | 128 bit | 128/192/256 | 10/12/14 | Good | NIST |
| Twofish | 128 bit | 128/192/256 | 16 | Excellent | AES Finalist |
| DES | 64 bit | 56 | 16 | Excellent | Weak |
Security Considerations
- Best published attack against Camellia-128 reaches 12 of 18 rounds (related-key differential cryptanalysis); the full-round variant has no known practical attack, leaving a six-round security margin above the current cryptanalytic frontier
- The FL/FL⁻¹ functions between 6-round groups inject key-dependent bit permutations that disrupt differential and linear trails across round boundaries — the structural mechanism that makes related-key attacks significantly harder than in pure SPN ciphers like AES
- NESSIE (2003) and CRYPTREC independent evaluations confirmed Camellia's resistance to all known attack families: differential, linear, impossible differential, higher-order differential, and truncated differential — the same evaluation criteria that validated AES
- Camellia's 128-bit block width eliminates the birthday-bound problem that plagues 64-bit ciphers (DES, 3DES, Blowfish): the collision threshold occurs at 2⁶⁴ blocks (~147 petabytes per key), placing Sweet32-style attacks entirely outside practical reach
- Camellia's 128-bit block width eliminates the birthday-bound problem that plagues 64-bit ciphers (DES, 3DES, Blowfish): the collision threshold occurs at 2⁶⁴ blocks (~147 petabytes per key), placing Sweet32-style attacks entirely outside practical reach
Use Cases
Related Tools
AES Encryption/Decryption
Securely encrypt and decrypt text using AES algorithm
Twofish Encryption/Decryption
AES finalist symmetric cipher with 128-bit blocks and 128/192/256-bit keys, designed by Bruce Schneier
Serpent Encryption/Decryption
AES finalist block cipher with 128/192/256-bit keys, 32 rounds, offering excellent security margin and proven resistance to cryptanalysis
Rijndael Encryption/Decryption
Original AES algorithm with flexible block sizes (128/192/256 bits). Supports CBC, ECB, CFB, OFB modes