Differences
This shows you the differences between two versions of the page.
Both sides previous revision
Previous revision
Next revision
|
Previous revision
|
en:racfor_wiki:template [2021/01/15 15:11] jli [Introduction] |
en:racfor_wiki:template [2024/12/05 12:24] (current) |
====== Block Cipher Modes ====== | ====== Title ====== |
| |
===== Abstract ===== | ===== Abstract ===== |
| |
Block cipher is one of the most widely-used tool in cryptography, and its mode of operation features the use of a symmetric-key block-cipher algorithm in providing information security such as confidentiality or authenticity. Five modes of operation with AES algorithm will be discussed in this paper: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). These modes can provide cryptographic protection for sensitive, but classified, computer data. | How do you write an abstract? Identify your purpose. You're writing about a correlation between lack of lunches in schools and poor grades. … Explain the problem at hand. Abstracts state the “problem” behind your work. … Explain your methods. … (Source) Save your work regularly!!! Describe your results (informative abstract only). … Abstract should be no longer that 400 words. Please note that the table of contents in the upper part of the page is generated automatically based on the used headings. |
| |
Keywords: Computer security; cryptography; block cipher; mode of operation | Keywords: abstract; bastract; astract; retract; tractor |
| |
===== Introduction ===== | ===== Introduction ===== |
| |
Block cipher is one of the most widely-used tool in cryptography, but itself is only used of one fixed-length group of bits called a block [1]. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block [2]. | |
| |
The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality. | |
===== Chapter 1 ===== | ===== Chapter 1 ===== |
| |