racfor_wiki:block_cipher_modes – Računalna forenzika / Computer forensics (2024)

Sadržaj

Abstract

Block cipher is one of the most widely-used tool in cryptography, and its mode of operation features the use of a symmetric-key block-cipher algorithm in providing information security such as confidentiality or authenticity. Five modes of operation with AES algorithm will be discussed in this paper: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). These modes can provide cryptographic protection for sensitive, but classified, computer data.

Keywords: Computer security; cryptography; block cipher; AES; mode of operation

Introduction

Block cipher is one of the most widely-used tools in cryptography, but itself is only used of one fixed-length group of bits called a block [1]. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block [2].

The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality.

Electronic Codebook (ECB)

The electronic codebook (ECB) is the simplest encryption mode, which is named after conventional physical codebooks. For the given key, ECB features the same assignment of a fixed ciphertext block to each plaintext. Each block is manipulated separately.

In ECB encryption and ECB decryption, multiple forward cipher functions and inverse cipher functions can be computed in parallel under a given key.

The ECB mode has an disadvantage—a lack of diffusion, under a given key, any given plaintext block always gets encrypted to the same ciphertext if they are identical.

Cipher Block Chaining (CBC)

The cipher block chaining (CBC) mode of operation was introduced in 1976 [3]. The CBC mode features the combining of the plaintext blocks with the previous ciphertext blocks. The combination method is XOR. To make each message unique, an initialization vector are introduced in the first block. This initialization vector need not be secret, but must be unpredictable.

The main drawback of the CBC mode is sequential. In CBC encryption, the input block to each forward cipher operation (except the first) depends on the result of the previous forward cipher operation, so the process cannot be parallelized. And only a one-bit change in a plaintext or initialization vector affects all following ciphertext blocks.

Cipher Feedback (CFB)

The cipher feedback (CFB) features the feedback of successive ciphertext segments into the input blocks of the forward cipher to generate output blocks. The CFB mode require not only initialization vector but also an integer parameter, denotes s, such that 1 ≤ s ≤ b, which b is the block size, s is a bit-width.

In CFB encryption, the first input block is the initialization vector, and the forward cipher operation is applied to it to produce the first output block. The first ciphertext segment is produced by the first plaintext segment with the s most important bits of the first output segment. At the meantime, the remaining b-s bits of the first output block are discarded. The b-s least significant bits of the initialization vector are then concatenated with the s bits of the ciphertext.

In CFB encryption, like CBC encryption, changes in the plaintext forever in the ciphertext, and the encryption cannot be parallelized.

Output Feedback (OFB)

The output feedback (OFB) mode makes a block cipher to a synchronous stream cipher, which means the iteration of the forward cipher on an initialization vector to generate a sequence of output blocks.

In OFB encryption, each operation depends on all previous ones, and so cannot be performed in parallel. The initialization vector is transformed by the forward cipher function to produce the first output block. The first output block is xored with the first plaintext block to produce the first ciphertext block. The forward cipher function is then invoked on the first output block to produce the second output block. The second output block is xored with the second plaintext block to produce the second ciphertext block, and the forward cipher function is invoked on the second output block to produce the third output block. Thus, each forward cipher function depends on the results of the previous forward cipher function.

Counter (CTR)

The Counter (CTR) mode features the application of the forward cypher to a set of input blocks, called counters, to produce a sequence of output blocks that are xored with the plaintext to produce the ciphertext. The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is the simplest and most popular.

In CTR operation, the forward cipher functions can be performed in parallel. CTR mode is well suited to operate on a multi-processor machine where blocks can be encrypted in parallel.

Conclusion

Most symmetric-key algorithms used today are block ciphers which means that they encrypt one block at a time. The size of each block is fixed and determined by the algorithm: for example AES uses 16-byte blocks. Block ciphers are always used with a mode what specifies how to securely encrypt messages that are longer than the block size. For example, AES is a cipher, while ECB, CBC and CTR are all modes. Using an inappropriate mode, or a wrong mode can completely compromise the security provided by the basic password.

Source

racfor_wiki/block_cipher_modes.txt

· Zadnja izmjena: 2023/06/19 18:17 (vanjsko uređivanje)

racfor_wiki:block_cipher_modes – Računalna forenzika / Computer forensics (2024)
Top Articles
Color Code Picker: Site24x7 Tools
Three Negotiation Strategies—and When to Use Them - MindEdge
The Tribes and Castes of the Central Provinces of India, Volume 3
Dte Outage Map Woodhaven
Uti Hvacr
Ghosted Imdb Parents Guide
Celebrity Extra
How to know if a financial advisor is good?
Barstool Sports Gif
Housing Intranet Unt
Top Hat Trailer Wiring Diagram
Everything You Need to Know About Holly by Stephen King
Summoner Class Calamity Guide
Immortal Ink Waxahachie
Cambridge Assessor Database
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
Alfie Liebel
Between Friends Comic Strip Today
Cincinnati Adult Search
[PDF] NAVY RESERVE PERSONNEL MANUAL - Free Download PDF
Holiday Gift Bearer In Egypt
How Long After Dayquil Can I Take Benadryl
Del Amo Fashion Center Map
Low Tide In Twilight Ch 52
Craigslist Apartments In Philly
Dmv In Anoka
Star Wars Armada Wikia
Safeway Aciu
Stockton (California) – Travel guide at Wikivoyage
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Osrs Important Letter
Salemhex ticket show3
Mia Malkova Bio, Net Worth, Age & More - Magzica
Fairwinds Shred Fest 2023
Www Violationinfo Com Login New Orleans
Jefferson Parish Dump Wall Blvd
Ticketmaster Lion King Chicago
Engr 2300 Osu
How to Quickly Detect GI Stasis in Rabbits (and what to do about it) | The Bunny Lady
Catchvideo Chrome Extension
What is 'Breaking Bad' star Aaron Paul's Net Worth?
The Pretty Kitty Tanglewood
Page 5747 – Christianity Today
Greg Steube Height
Diamond Spikes Worth Aj
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
Compete My Workforce
March 2023 Wincalendar
8663831604
Escape From Tarkov Supply Plans Therapist Quest Guide
Códigos SWIFT/BIC para bancos de USA
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5654

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.