Dutta, Anisha2022-03-242022-03-242021-0790p.http://hdl.handle.net/10263/7316Dissertation under the Supervision of Prof. Ir. Bart Preneel and Prof. Bimal Kumar RoyModern-day Symmetric-key Cryptology is enriched with numerous contributions including symmetric-key primitives to modes of operation. The approach to design and develop provably secure designs have accelerated the growth of this subject. A lot of encryption, authentication and authenticated encryption modes are available publicly that are provably secure and gives good results in terms of e ciency. But there is not much resource that studies all the modes and conclude about their performance at the same time. This work is intended to study and compare all these modes of operation, both in terms of security (con dentiality and integrity) and e ciency (implementation area and throughput). We took care of di erent security notions and design rationales of compared schemes and generalised them as much as possibleenSymmetric Cryptology,Provable SecurityModes of OperationsEncryption,Authentication,Authenticated Encryption,Web-Implementation.A Catalogue for Provably Secure Symmetric Modes and PrimitivesOther