The Advanced Encryption Standard (AES) is a symmetric block cipher that can operate with three different key lengths - 128 bits, 192 bits, and 256 bits, known as AES-128, AES-192, and AES-256. The AES algorithm performs encryption and decryption on blocks of 128 bits using rounds of processing that include substitution, permutation, and mixing functions. AES also supports various block cipher modes of operation like Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) for different applications.
8. Electronic Codebook (ECB)
Each block of plaintext bits is encoded independently using the same key.
Application: Secure transmission of single values (e.g., an encryption key)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
9. Electronic Codebook (ECB)
Each block of plaintext bits is encoded independently using the same key.
Application: Secure transmission of single values (e.g., an encryption key)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
10. Cipher Block Chaining (CBC)
The input to the encryption algorithm is the XOR of the next block of plaintext and the preceding block of ciphertext.
Application: General-purpose block-oriented transmission, Authentication
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
11. Cipher Feedback (CFB)
Input is processed s bits at a time. Preceding ciphertext is used as input to the encryption algorithm to produce
pseudorandom output, which is XORed with plaintext to produce next unit of ciphertext.
Application: General-purpose stream-oriented transmission, Authentication
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
12. Output Feedback (OFB)
Similar to CFB, except that the input to the encryption algorithm is the preceding encryption output, and full blocks are
used.
Application: Stream-oriented transmission over noisy channel (e.g., satellite communication)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
14. Counter (CTR)
Each block of plaintext is XORed with an encrypted counter. The counter is incremented for each subsequent block.
Application: General-purpose block-oriented transmission, Useful for high-speed requirements
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14
16. References
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.
Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 16