SlideShare a Scribd company logo
In cryptography, a block cipher is a deterministic algorithm
operating on fixed-length groups of bits, called blocks, with an
unvarying transformation that is specified by a symmetric key.
 A block cipher algorithm is a basic building block for
providing data security.
 To apply a block cipher in a variety of applications, five
“modes of operations” are defined by NIST.
What is block cipher?
 NIST : National Institute of Standards and Technology
 That five modes of operations are :
1. Electronic code book
2. Cipher chaining block
3. Cipher feedback mode
4. Output feedback mode
5. Counter mode
Introduction to block cipher modes of
operation
 Block cipher only allow to encrypt entire blocks.
 What if our message is longer/shorter than the block size?
When message is longer/shorter than the block size , we use
modes of operations.
Algorithms that exploit a block cipher to provide a service
(e.g. confidentiality ).
When we use block cipher modes of
operation?
Electronic codebook
ECB is the simplest mode of operation.
The plain text is divided into N blocks.
The block size is n bits.
If the plaintext size is not multiple of the block size , the
text is padded to make the last block the same size other
blocks.
Same key is used to encrypt and decrypt each block.
Electronic codebook encryption
process
Cipher texti = encryption with key (plain texti)
Electronic codebook encryption
example
Electronic codebook Decryption
process
Plain texti = Decryption with key (cipher texti)
Electronic codebook Decryption
example
Electronic codebook
encryption/decryption Security issues
Patterns at the block level are preserved.
For example equal blocks in the plain text become equal
block in the cipher text.
If any person finds out the cipher text block 1,5 and 10 are
the same ,that person knows that plaintext blocks 1, 5 and
10 are the same.
This is a leak in security.
What is initialization vector?
An initialization vector (IV) or starting variable is a
block of bits that is used by several modes to randomize
the encryption and hence to produce distinct cipher texts
even if the same plain text is encrypted multiple times,
without the need for a slower re-keying process.
 An initialization vector has different security
requirements than a key, so the IV usually does not need
to be secret
 However, in most cases, it is important that an
initialization vector is never reused under the same key.
What is initialization vector?
(continue…)
For CBC and CFB, reusing an IV leaks some information
about the first block of plaintext, and about any common prefix
shared by the two messages.
For OFB and CTR, reusing an IV completely destroys security.
This can be seen because both modes effectively create a bit
stream that is XORed with the plaintext, and this bit stream is
dependent on the password and IV only. Reusing a bit stream
destroys security.
In CBC mode, the IV must, in addition, be unpredictable at
encryption time; in particular, the (previously) common practice
of re-using the last cipher text block of a message as the IV for
the next message is insecure.
Cipher block chaining mode
IBM invented the Cipher Block Chaining (CBC)
mode of operation in 1976.
In CBC mode, each block of plaintext is XORed
with the previous cipher text block before being
encrypted.
This way, each cipher text block depends on all
plaintext blocks processed up to that point. To make
each message unique, an initialization vector must
be used in the first block.
Cipher block chaining mode
encryption
IV = initialization vector
Cipher texti = encryption with key (plain text XOR cipher text i-
1)
Cipher block chaining mode
Decryption
IV = initialization vector
plain texti = Decryption with key (cipher text XOR cipher text i-1)
The patterns at the block level are not preserved.
In CBC mode, equal plain text block belonging to the same
message are enciphered into different cipher text block.
However ,if two message are equal ,their encipherment is
the same if they use the same IV.
As a matter of fact ,if the first M blocks in two different
message are equal , they are enciphered into equal blocks
unless different IVs are used.
For this reason , some people recommended the use of time-
stamp as an IV.
Any person can add some cipher text blocks to the end of
the cipher text stream.
Cipher block chaining mode
Security issues
Cipher feedback mode
ECB and CBC modes encrypt and decrypt blocks of the
message.
Block size n is predetermine by the underlying cipher ; for
example , for DES n = 64
for AES n =128
In some situations, we need use DES or AES as secure
cipher , but the plain text or cipher text block size are to be
smaller.
For example , to encrypt and decrypt 8-bit characters , you
would not want to use one of the traditional cipher like
Caesar cipher.
The solution is to use DES or AES in cipher feedback mode
Cipher feedback mode
encryption
IV = initialization vector
Cipher texti = Encryption with key (Cipher text i-1 ) XOR plain
text
Cipher feedback mode
Decryption
IV = initialization vector
Plain texti = Encryption with key (Cipher text i-1 ) XOR cipher
text
Cipher feedback mode
Security issues
Just like CBC , patterns at the block level are not preserved.
More than one message can be encrypted with the same key ,
but the value of the IV should be changed for each message.
This means that sender needs to use a different IV each time
sender sends a message.
Attacker can add some cipher text block to the end of the
cipher text stream.
Cipher output feedback mode
Output feedback mode is very similar to CFB mode , with
one difference: each bit in the cipher text is independent of
the previous bit or bits.
This avoids error propagation.
If an error occur in transmission , it does not affect the bits
that follow.
Note that , like cipher feedback mode , both the sender and
the receiver use the encryption algorithm.
Cipher output feedback mode
encryption
IV = initialization vector
cipher texti =
plain texti XOR Encryption
(k , [cipher text i-1 XOR plain text i-1] )
Cipher output feedback mode
Decryption
IV = initialization vector
Plain texti =
cipher texti XOR Encryption
(k , [cipher text i-1 XOR plain text i-1] )
Cipher output feedback mode
Security issues
Just like CBC , patterns at the block level are not preserved.
Any change in the cipher text affects the plain text encrypted
at the receiver side.
Counter
In the counter mode , there is no feedback.
The pseudo randomness in the key streams achieved using a
counter.
An n bit counter is initialized to a predetermined value(IV)
and incremented based on a predefined rule(mod 2n)
To provide a better randomness , the increment value can
depend on the block numbers to be incremented.
The plain text and cipher block text block have same block
size as the underlying cipher.
Both encryption and decryption can be performed fully in
parallel on multiple blocks .
Provides true random access to cipher text blocks
Counter
Encryption process
Nonce = IV
Cipher texti = Plain texti XOR Encryption with key(counter)
Counter
Decryption process
Nonce = IV
Plain texti = Cipher texti XOR Encryption with key(counter)
Block cipher modes of operation

More Related Content

What's hot

AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
farazvirk554
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
 

What's hot (20)

AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Web Security
Web SecurityWeb Security
Web Security
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
DES
DESDES
DES
 

Similar to Block cipher modes of operation

Block cipher modes of operations
Block cipher modes of operationsBlock cipher modes of operations
Block cipher modes of operations
AkashRanjandas1
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
Mazin Alwaaly
 
Encryption
EncryptionEncryption
Encryption
keith dias
 
unit 2.ppt
unit 2.pptunit 2.ppt
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin Jani
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
Information Security
Information SecurityInformation Security
Information Securityraxosz
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)ceng
 
CR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.pptCR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.ppt
ssuseraaf866
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
Deepak John
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
GIT
 
ch06.ppt
ch06.pptch06.ppt
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
ShimoFcis
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
KaushikRamabhotla
 
Crpto ppt
Crpto pptCrpto ppt
Crpto ppt
Asmita Pal
 

Similar to Block cipher modes of operation (20)

Block cipher modes of operations
Block cipher modes of operationsBlock cipher modes of operations
Block cipher modes of operations
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
Encryption
EncryptionEncryption
Encryption
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Information Security
Information SecurityInformation Security
Information Security
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
 
CR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.pptCR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.ppt
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Crpto ppt
Crpto pptCrpto ppt
Crpto ppt
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

Block cipher modes of operation

  • 1.
  • 2. In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key.  A block cipher algorithm is a basic building block for providing data security.  To apply a block cipher in a variety of applications, five “modes of operations” are defined by NIST. What is block cipher?
  • 3.  NIST : National Institute of Standards and Technology  That five modes of operations are : 1. Electronic code book 2. Cipher chaining block 3. Cipher feedback mode 4. Output feedback mode 5. Counter mode Introduction to block cipher modes of operation
  • 4.  Block cipher only allow to encrypt entire blocks.  What if our message is longer/shorter than the block size? When message is longer/shorter than the block size , we use modes of operations. Algorithms that exploit a block cipher to provide a service (e.g. confidentiality ). When we use block cipher modes of operation?
  • 5. Electronic codebook ECB is the simplest mode of operation. The plain text is divided into N blocks. The block size is n bits. If the plaintext size is not multiple of the block size , the text is padded to make the last block the same size other blocks. Same key is used to encrypt and decrypt each block.
  • 6. Electronic codebook encryption process Cipher texti = encryption with key (plain texti)
  • 8. Electronic codebook Decryption process Plain texti = Decryption with key (cipher texti)
  • 10. Electronic codebook encryption/decryption Security issues Patterns at the block level are preserved. For example equal blocks in the plain text become equal block in the cipher text. If any person finds out the cipher text block 1,5 and 10 are the same ,that person knows that plaintext blocks 1, 5 and 10 are the same. This is a leak in security.
  • 11. What is initialization vector? An initialization vector (IV) or starting variable is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct cipher texts even if the same plain text is encrypted multiple times, without the need for a slower re-keying process.  An initialization vector has different security requirements than a key, so the IV usually does not need to be secret  However, in most cases, it is important that an initialization vector is never reused under the same key.
  • 12. What is initialization vector? (continue…) For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages. For OFB and CTR, reusing an IV completely destroys security. This can be seen because both modes effectively create a bit stream that is XORed with the plaintext, and this bit stream is dependent on the password and IV only. Reusing a bit stream destroys security. In CBC mode, the IV must, in addition, be unpredictable at encryption time; in particular, the (previously) common practice of re-using the last cipher text block of a message as the IV for the next message is insecure.
  • 13. Cipher block chaining mode IBM invented the Cipher Block Chaining (CBC) mode of operation in 1976. In CBC mode, each block of plaintext is XORed with the previous cipher text block before being encrypted. This way, each cipher text block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.
  • 14. Cipher block chaining mode encryption IV = initialization vector Cipher texti = encryption with key (plain text XOR cipher text i- 1)
  • 15. Cipher block chaining mode Decryption IV = initialization vector plain texti = Decryption with key (cipher text XOR cipher text i-1)
  • 16. The patterns at the block level are not preserved. In CBC mode, equal plain text block belonging to the same message are enciphered into different cipher text block. However ,if two message are equal ,their encipherment is the same if they use the same IV. As a matter of fact ,if the first M blocks in two different message are equal , they are enciphered into equal blocks unless different IVs are used. For this reason , some people recommended the use of time- stamp as an IV. Any person can add some cipher text blocks to the end of the cipher text stream. Cipher block chaining mode Security issues
  • 17. Cipher feedback mode ECB and CBC modes encrypt and decrypt blocks of the message. Block size n is predetermine by the underlying cipher ; for example , for DES n = 64 for AES n =128 In some situations, we need use DES or AES as secure cipher , but the plain text or cipher text block size are to be smaller. For example , to encrypt and decrypt 8-bit characters , you would not want to use one of the traditional cipher like Caesar cipher. The solution is to use DES or AES in cipher feedback mode
  • 18. Cipher feedback mode encryption IV = initialization vector Cipher texti = Encryption with key (Cipher text i-1 ) XOR plain text
  • 19. Cipher feedback mode Decryption IV = initialization vector Plain texti = Encryption with key (Cipher text i-1 ) XOR cipher text
  • 20. Cipher feedback mode Security issues Just like CBC , patterns at the block level are not preserved. More than one message can be encrypted with the same key , but the value of the IV should be changed for each message. This means that sender needs to use a different IV each time sender sends a message. Attacker can add some cipher text block to the end of the cipher text stream.
  • 21. Cipher output feedback mode Output feedback mode is very similar to CFB mode , with one difference: each bit in the cipher text is independent of the previous bit or bits. This avoids error propagation. If an error occur in transmission , it does not affect the bits that follow. Note that , like cipher feedback mode , both the sender and the receiver use the encryption algorithm.
  • 22. Cipher output feedback mode encryption IV = initialization vector cipher texti = plain texti XOR Encryption (k , [cipher text i-1 XOR plain text i-1] )
  • 23. Cipher output feedback mode Decryption IV = initialization vector Plain texti = cipher texti XOR Encryption (k , [cipher text i-1 XOR plain text i-1] )
  • 24. Cipher output feedback mode Security issues Just like CBC , patterns at the block level are not preserved. Any change in the cipher text affects the plain text encrypted at the receiver side.
  • 25. Counter In the counter mode , there is no feedback. The pseudo randomness in the key streams achieved using a counter. An n bit counter is initialized to a predetermined value(IV) and incremented based on a predefined rule(mod 2n) To provide a better randomness , the increment value can depend on the block numbers to be incremented. The plain text and cipher block text block have same block size as the underlying cipher. Both encryption and decryption can be performed fully in parallel on multiple blocks . Provides true random access to cipher text blocks
  • 26. Counter Encryption process Nonce = IV Cipher texti = Plain texti XOR Encryption with key(counter)
  • 27. Counter Decryption process Nonce = IV Plain texti = Cipher texti XOR Encryption with key(counter)