This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
en:racfor_wiki:block_cipher_modes [2021/01/15 18:31] jli |
en:racfor_wiki:block_cipher_modes [2024/12/05 12:24] (current) |
||
---|---|---|---|
Line 9: | Line 9: | ||
===== Introduction ===== | ===== Introduction ===== | ||
- | Block cipher is one of the most widely-used | + | Block cipher is one of the most widely-used |
The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality. | The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality. | ||
Line 15: | Line 15: | ||
===== Electronic Codebook (ECB) ===== | ===== Electronic Codebook (ECB) ===== | ||
- | The electronic codebook (ECB) is the simplest encryption mode, which is named after conventional physical codebooks. For the given key, ECB features the same assignment of a fixed ciphertext block to each plaintext. Each block is been manipulated separately. | + | The electronic codebook (ECB) is the simplest encryption mode, which is named after conventional physical codebooks. For the given key, ECB features the same assignment of a fixed ciphertext block to each plaintext. Each block is manipulated separately. |
{{ : | {{ : | ||
Line 21: | Line 21: | ||
In ECB encryption and ECB decryption, multiple forward cipher functions and inverse cipher functions can be computed in parallel under a given key. | In ECB encryption and ECB decryption, multiple forward cipher functions and inverse cipher functions can be computed in parallel under a given key. | ||
- | The ECB mode has an disadvantages—a lack of diffusion, under a given key, any given plaintext block always gets encrypted to the same cyphertext | + | The ECB mode has an disadvantage—a lack of diffusion, under a given key, any given plaintext block always gets encrypted to the same ciphertext |
===== Cipher Block Chaining (CBC) ===== | ===== Cipher Block Chaining (CBC) ===== | ||
- | The cipher block chaining (CBC) mode of operation | + | The cipher block chaining (CBC) mode of operation |
{{ : | {{ : | ||
- | The main drawback of the CBC mode is sequential. In CBC encryption, the input block to each forward cipher operation (except the first) depends on the result of the previous forward cipher operation, so process cannot be parallelized. And only a one-bit change in a plaintext or initialization vector affects all following ciphertext blocks. | + | The main drawback of the CBC mode is sequential. In CBC encryption, the input block to each forward cipher operation (except the first) depends on the result of the previous forward cipher operation, so the process cannot be parallelized. And only a one-bit change in a plaintext or initialization vector affects all following ciphertext blocks. |
===== Cipher Feedback (CFB) ===== | ===== Cipher Feedback (CFB) ===== | ||
Line 58: | Line 58: | ||
===== Source ===== | ===== Source ===== | ||
- | [1] [Block cipher mode of operation](https:// | + | [1] https:// |
- | [2] [Morris J. Dworkin. 2001. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. Technical Report. National Institute of Standards & Technology, Gaithersburg, | + | [2] https:// |
- | + | ||
- | [3] [William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, " | + | |
+ | [3] https:// |