Dieses Dokuwiki verwendet ein von Anymorphic Webdesign erstelltes Thema.

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:racfor_wiki:block_cipher_modes [2021/01/15 18:30]
jli [Abstract]
en:racfor_wiki:block_cipher_modes [2024/12/05 12:24] (current)
Line 9: Line 9:
 ===== Introduction ===== ===== Introduction =====
  
-Block cipher is one of the most widely-used tool in cryptography, but itself is only used of one fixed-length group of bits called a block [1]. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block [2]. +Block cipher is one of the most widely-used tools in cryptography, but itself is only used of one fixed-length group of bits called a block [1]. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block [2]. 
  
 The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality. The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality.
Line 15: Line 15:
 ===== Electronic Codebook (ECB) ===== ===== Electronic Codebook (ECB) =====
  
-The electronic codebook (ECB) is the simplest encryption mode, which is named after conventional physical codebooks. For the given key, ECB features the same assignment of a fixed ciphertext block to each plaintext. Each block is been manipulated separately.+The electronic codebook (ECB) is the simplest encryption mode, which is named after conventional physical codebooks. For the given key, ECB features the same assignment of a fixed ciphertext block to each plaintext. Each block is manipulated separately.
  
 {{ :en:racfor_wiki:ecb_model.png?400 |}} {{ :en:racfor_wiki:ecb_model.png?400 |}}
Line 21: Line 21:
 In ECB encryption and ECB decryption, multiple forward cipher functions and inverse cipher functions can be computed in parallel under a given key. In ECB encryption and ECB decryption, multiple forward cipher functions and inverse cipher functions can be computed in parallel under a given key.
  
-The ECB mode has an disadvantages—a lack of diffusion, under a given key, any given plaintext block always gets encrypted to the same cyphertext if they are identical.+The ECB mode has an disadvantage—a lack of diffusion, under a given key, any given plaintext block always gets encrypted to the same ciphertext if they are identical.
 ===== Cipher Block Chaining (CBC) ===== ===== Cipher Block Chaining (CBC) =====
  
-The cipher block chaining (CBC) mode of operation is introduced in 1976 [3]. The CBC mode features the combining of the plaintext blocks with the previous ciphertext blocks. The combination method is XOR. To make each message unique, an initialization vector are introduced in the first block. This initialization vector need not be secret, but must be unpredictable.+The cipher block chaining (CBC) mode of operation was introduced in 1976 [3]. The CBC mode features the combining of the plaintext blocks with the previous ciphertext blocks. The combination method is XOR. To make each message unique, an initialization vector are introduced in the first block. This initialization vector need not be secret, but must be unpredictable.
  
 {{ :en:racfor_wiki:cbc_model.png?400 |}} {{ :en:racfor_wiki:cbc_model.png?400 |}}
  
-The main drawback of the CBC mode is sequential. In CBC encryption, the input block to each forward cipher operation (except the first) depends on the result of the previous forward cipher operation, so process cannot be parallelized. And only a one-bit change in a plaintext or initialization vector affects all following ciphertext blocks.  +The main drawback of the CBC mode is sequential. In CBC encryption, the input block to each forward cipher operation (except the first) depends on the result of the previous forward cipher operation, so the process cannot be parallelized. And only a one-bit change in a plaintext or initialization vector affects all following ciphertext blocks.  
 ===== Cipher Feedback (CFB) ===== ===== Cipher Feedback (CFB) =====
  
Line 55: Line 55:
  
 Most symmetric-key algorithms used today are block ciphers which means that they encrypt one block at a time. The size of each block is fixed and determined by the algorithm: for example AES uses 16-byte blocks. Block ciphers are always used with a mode what specifies how to securely encrypt messages that are longer than the block size. For example, AES is a cipher, while ECB, CBC and CTR are all modes. Using an inappropriate mode, or a wrong mode can completely compromise the security provided by the basic password. Most symmetric-key algorithms used today are block ciphers which means that they encrypt one block at a time. The size of each block is fixed and determined by the algorithm: for example AES uses 16-byte blocks. Block ciphers are always used with a mode what specifies how to securely encrypt messages that are longer than the block size. For example, AES is a cipher, while ECB, CBC and CTR are all modes. Using an inappropriate mode, or a wrong mode can completely compromise the security provided by the basic password.
 +
 +===== Source =====
 +
 +[1] https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
 +
 +[2] https://csrc.nist.gov/publications/detail/sp/800-38a/final
 +
 +[3] https://patents.google.com/patent/US4074066A/en
en/racfor_wiki/block_cipher_modes.1610735450.txt.gz · Last modified: 2024/12/05 12:23 (external edit)
Dieses Dokuwiki verwendet ein von Anymorphic Webdesign erstelltes Thema.
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0