SlideShare a Scribd company logo
1
Modes of Operation
Murat Kantarcioglu
Block Ciphers
• Block length is fixed (n-bit)
• How to encrypt large messages?
– Partition into n-bit blocks
– Choose mode of operation
• Electronic Codebook (ECB),
• Cipher-Block Chaining (CBC),
• Cipher Feedback (CFB),
• Output Feedback (OFB),
• Counter (CTR)
• Padding schemes
2
Evaluation criteria
• Identical messages
– under which conditions ciphertext of two identical
messages are the same
• Chaining dependencies
– how adjacent plaintext blocks affect encryption of a
plaintext block
• Error propagation
– resistance to channel noise
• Efficiency
– preprocessing
– parallelization: random access
Notation
• Message x consists of plaintext blocks of size n
– x = x1 || x2 || … || xt
• Ciphertext of plaintext block xi denoted as ci
• Chaining requires an initialization vector that first
plaintext block x1 will depend on. Initialization
vector denoted as IV.
– IV should be selected randomly for each message (x)
3
Electronic Codebook (ECB)
• Each block encrypted independently
• Identical plaintexts encrypted similarly
• No chaining, no error propagation
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Electronic Codebook (ECB)
• Does not hide data patterns, unsuitable for long
messages
– Wiki example: pixel map using ECB
• Susceptible to replay attacks
– Example: a wired transfer transaction can be replayed by re-
sending the original message)
4
Cipher-Block Chaining (CBC)
• Allows random access to ciphertext
• Decryption is parallelizable
– Plaintext block xj requires ciphertext blocks cj and cj-1
Block Cipher
Encryption
Ciphertext
Plaintext
Initialization Vector (IV)
Block Cipher
Encryption
Ciphertext
Plaintext
KeyKey
Cipher-Block Chaining (CBC)
• Identical messages: changing IV or the first
plaintext block results in different ciphertext
• Chaining: Ciphertext block cj depends on xj and
all preceding plaintext blocks (dependency
contained in cj-1)
• Error propagation: Single bit error on cj may flip
the corresponding bit on xj+1, but changes xj
significantly.
• IV need not be secret, but its integrity should be
protected
5
Cipher Feedback (CFB)
• Allows random access to ciphertext
• Decryption is parallelizable
– Plaintext block xj requires ciphertext blocks cj and cj-1
Ciphertext
Plaintext
Initialization Vector (IV)
Block Cipher
EncryptionKey
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Cipher Feedback (CFB)
• Identical messages: as in CBC
• Chaining: Similar to CBC
• Error propagation: Single bit error on cj may flip
the corresponding bit on xj, but changes xj+1
significantly.
• IV need not be secret (XORed with x1)
6
Output Feedback (OFB)
• Preprocessing possible (keep enc/decrypting
previous output block)
• No random access, not parallelizable
Ciphertext
Plaintext
Initialization Vector (IV)
Block Cipher
EncryptionKey
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Output Feedback (OFB)
• Identical messages: same as CBC
• No chaining dependencies
• Error propagation: Single bit error on cj may only
affect the corresponding bit of xj
• IV need not be secret, but should be changed if
a previously used key is to be used again
7
Counter (CTR)
• Preprocessing possible (inc/decrement and
enc/decrypt counter)
• Allows random access
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Nonce
c43acb23…
Counter
00000000
Nonce
c43acb23…
Counter
00000001
Ciphertext
Plaintext
Block Cipher
EncryptionKey
Nonce
c43acb23…
Counter
00000002
Counter (CTR)
• Both encryption & decryption are parallelizable
– Encrypted counter is sufficient to enc/decrypt
• Identical messages: changing nonce results in
different ciphertext
• No chaining dependencies
• No error propagation
• Nonce should be random, and should be
changed if a previously used key is to be used
again
8
Summary
• Choice of encryption mode affects
– Encryption/decryption speed
– Security against active adversaries (bit flips)
– Security against passive adversaries (ECB)
– Error propagation

More Related Content

What's hot

Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
Des lecture
Des lectureDes lecture
Des lecture
ANIKET UTTAM
 
Information and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphersInformation and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphers
Vaibhav Khanna
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
degarden
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network security
sathu30
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
Shafaan Khaliq Bhatti
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
Ch03
Ch03Ch03
CNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital SignaturesCNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital Signatures
Sam Bowne
 
Ch02
Ch02Ch02
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
Shubham Jain
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ramya marichamy
 
ZeroMQ
ZeroMQZeroMQ

What's hot (20)

Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Des lecture
Des lectureDes lecture
Des lecture
 
Information and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphersInformation and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphers
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Cryptography & network security
Cryptography & network securityCryptography & network security
Cryptography & network security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Ch03
Ch03Ch03
Ch03
 
CNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital SignaturesCNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital Signatures
 
Ch02
Ch02Ch02
Ch02
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
ZeroMQ
ZeroMQZeroMQ
ZeroMQ
 

Viewers also liked

Software process improvement ten traps to avoid
Software process improvement   ten traps to avoidSoftware process improvement   ten traps to avoid
Software process improvement ten traps to avoid
babak danyal
 
Satcom 5
Satcom 5Satcom 5
Satcom 5
babak danyal
 
Micro Assignment 2
Micro Assignment 2Micro Assignment 2
Micro Assignment 2
babak danyal
 
Mobile comm. 2
Mobile comm. 2Mobile comm. 2
Mobile comm. 2
babak danyal
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
babak danyal
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
Asad Ali
 
Satcom 4
Satcom 4Satcom 4
Satcom 4
babak danyal
 
Mobile comm. 1
Mobile comm. 1Mobile comm. 1
Mobile comm. 1
babak danyal
 
22 microcontroller programs
22 microcontroller programs22 microcontroller programs
22 microcontroller programs
babak danyal
 
Course outlines
Course outlinesCourse outlines
Course outlines
Asad Ali
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
babak danyal
 
Micro Assignment 1
Micro Assignment 1Micro Assignment 1
Micro Assignment 1
babak danyal
 
The Role of Ulema and Mashaikh in the Pakistan Movement
The Role of Ulema and Mashaikh in the Pakistan MovementThe Role of Ulema and Mashaikh in the Pakistan Movement
The Role of Ulema and Mashaikh in the Pakistan Movement
babak danyal
 
Master synchronous serial port (mssp)
Master synchronous serial port (mssp)Master synchronous serial port (mssp)
Master synchronous serial port (mssp)
babak danyal
 
Microcontroller Programming Assignment
Microcontroller Programming AssignmentMicrocontroller Programming Assignment
Microcontroller Programming Assignment
babak danyal
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
Asad Ali
 
Accessing the deep web (2007)
Accessing the deep web (2007)Accessing the deep web (2007)
Accessing the deep web (2007)
babak danyal
 
Interrupt1
Interrupt1Interrupt1
Interrupt1
babak danyal
 
Micro controller
Micro controllerMicro controller
Micro controller
babak danyal
 
Key
KeyKey

Viewers also liked (20)

Software process improvement ten traps to avoid
Software process improvement   ten traps to avoidSoftware process improvement   ten traps to avoid
Software process improvement ten traps to avoid
 
Satcom 5
Satcom 5Satcom 5
Satcom 5
 
Micro Assignment 2
Micro Assignment 2Micro Assignment 2
Micro Assignment 2
 
Mobile comm. 2
Mobile comm. 2Mobile comm. 2
Mobile comm. 2
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
 
Satcom 4
Satcom 4Satcom 4
Satcom 4
 
Mobile comm. 1
Mobile comm. 1Mobile comm. 1
Mobile comm. 1
 
22 microcontroller programs
22 microcontroller programs22 microcontroller programs
22 microcontroller programs
 
Course outlines
Course outlinesCourse outlines
Course outlines
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
 
Micro Assignment 1
Micro Assignment 1Micro Assignment 1
Micro Assignment 1
 
The Role of Ulema and Mashaikh in the Pakistan Movement
The Role of Ulema and Mashaikh in the Pakistan MovementThe Role of Ulema and Mashaikh in the Pakistan Movement
The Role of Ulema and Mashaikh in the Pakistan Movement
 
Master synchronous serial port (mssp)
Master synchronous serial port (mssp)Master synchronous serial port (mssp)
Master synchronous serial port (mssp)
 
Microcontroller Programming Assignment
Microcontroller Programming AssignmentMicrocontroller Programming Assignment
Microcontroller Programming Assignment
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Accessing the deep web (2007)
Accessing the deep web (2007)Accessing the deep web (2007)
Accessing the deep web (2007)
 
Interrupt1
Interrupt1Interrupt1
Interrupt1
 
Micro controller
Micro controllerMicro controller
Micro controller
 
Key
KeyKey
Key
 

Similar to Ciphers modes

Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
13528 l8
13528 l813528 l8
13528 l8
ridhika_gulati
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
Sam Bowne
 
Information Security
Information SecurityInformation Security
Information Security
raxosz
 
ch06.ppt
ch06.pptch06.ppt
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
4.ppt
4.ppt4.ppt
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptx
DEEPAK948083
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
Nam Yong Kim
 
SymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdfSymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdf
MohammedMorhafJaely
 
Encryption
EncryptionEncryption
Encryption
keith dias
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
ThangamaniR3
 
CR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.pptCR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.ppt
ssuseraaf866
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).ppt
MrsPrabhaBV
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
vss gowtham
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
unit 2.ppt
unit 2.pptunit 2.ppt
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
ceng
 

Similar to Ciphers modes (20)

Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
13528 l8
13528 l813528 l8
13528 l8
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
 
Information Security
Information SecurityInformation Security
Information Security
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
4.ppt
4.ppt4.ppt
4.ppt
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
block ciphermodes of operation.pptx
block ciphermodes of operation.pptxblock ciphermodes of operation.pptx
block ciphermodes of operation.pptx
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
 
SymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdfSymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdf
 
Encryption
EncryptionEncryption
Encryption
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
 
CR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.pptCR 06 - Block Cipher Operation.ppt
CR 06 - Block Cipher Operation.ppt
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).ppt
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
 

More from Asad Ali

Echo housing system
Echo housing systemEcho housing system
Echo housing system
Asad Ali
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
Asad Ali
 
Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)
Asad Ali
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2
Asad Ali
 
Nation state system
Nation state systemNation state system
Nation state system
Asad Ali
 
Ir meaning, nature and importance
Ir  meaning, nature and importanceIr  meaning, nature and importance
Ir meaning, nature and importance
Asad Ali
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processing
Asad Ali
 
Bit plane slicing
Bit plane slicingBit plane slicing
Bit plane slicing
Asad Ali
 
Auto-Lab
Auto-LabAuto-Lab
Auto-Lab
Asad Ali
 

More from Asad Ali (11)

Echo housing system
Echo housing systemEcho housing system
Echo housing system
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
block ciphers
block ciphersblock ciphers
block ciphers
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2
 
Nation state system
Nation state systemNation state system
Nation state system
 
Ir meaning, nature and importance
Ir  meaning, nature and importanceIr  meaning, nature and importance
Ir meaning, nature and importance
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processing
 
Bit plane slicing
Bit plane slicingBit plane slicing
Bit plane slicing
 
Auto-Lab
Auto-LabAuto-Lab
Auto-Lab
 

Recently uploaded

Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (19)

Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

Ciphers modes

  • 1. 1 Modes of Operation Murat Kantarcioglu Block Ciphers • Block length is fixed (n-bit) • How to encrypt large messages? – Partition into n-bit blocks – Choose mode of operation • Electronic Codebook (ECB), • Cipher-Block Chaining (CBC), • Cipher Feedback (CFB), • Output Feedback (OFB), • Counter (CTR) • Padding schemes
  • 2. 2 Evaluation criteria • Identical messages – under which conditions ciphertext of two identical messages are the same • Chaining dependencies – how adjacent plaintext blocks affect encryption of a plaintext block • Error propagation – resistance to channel noise • Efficiency – preprocessing – parallelization: random access Notation • Message x consists of plaintext blocks of size n – x = x1 || x2 || … || xt • Ciphertext of plaintext block xi denoted as ci • Chaining requires an initialization vector that first plaintext block x1 will depend on. Initialization vector denoted as IV. – IV should be selected randomly for each message (x)
  • 3. 3 Electronic Codebook (ECB) • Each block encrypted independently • Identical plaintexts encrypted similarly • No chaining, no error propagation Ciphertext Plaintext Block Cipher EncryptionKey Ciphertext Plaintext Block Cipher EncryptionKey Electronic Codebook (ECB) • Does not hide data patterns, unsuitable for long messages – Wiki example: pixel map using ECB • Susceptible to replay attacks – Example: a wired transfer transaction can be replayed by re- sending the original message)
  • 4. 4 Cipher-Block Chaining (CBC) • Allows random access to ciphertext • Decryption is parallelizable – Plaintext block xj requires ciphertext blocks cj and cj-1 Block Cipher Encryption Ciphertext Plaintext Initialization Vector (IV) Block Cipher Encryption Ciphertext Plaintext KeyKey Cipher-Block Chaining (CBC) • Identical messages: changing IV or the first plaintext block results in different ciphertext • Chaining: Ciphertext block cj depends on xj and all preceding plaintext blocks (dependency contained in cj-1) • Error propagation: Single bit error on cj may flip the corresponding bit on xj+1, but changes xj significantly. • IV need not be secret, but its integrity should be protected
  • 5. 5 Cipher Feedback (CFB) • Allows random access to ciphertext • Decryption is parallelizable – Plaintext block xj requires ciphertext blocks cj and cj-1 Ciphertext Plaintext Initialization Vector (IV) Block Cipher EncryptionKey Ciphertext Plaintext Block Cipher EncryptionKey Cipher Feedback (CFB) • Identical messages: as in CBC • Chaining: Similar to CBC • Error propagation: Single bit error on cj may flip the corresponding bit on xj, but changes xj+1 significantly. • IV need not be secret (XORed with x1)
  • 6. 6 Output Feedback (OFB) • Preprocessing possible (keep enc/decrypting previous output block) • No random access, not parallelizable Ciphertext Plaintext Initialization Vector (IV) Block Cipher EncryptionKey Ciphertext Plaintext Block Cipher EncryptionKey Output Feedback (OFB) • Identical messages: same as CBC • No chaining dependencies • Error propagation: Single bit error on cj may only affect the corresponding bit of xj • IV need not be secret, but should be changed if a previously used key is to be used again
  • 7. 7 Counter (CTR) • Preprocessing possible (inc/decrement and enc/decrypt counter) • Allows random access Ciphertext Plaintext Block Cipher EncryptionKey Ciphertext Plaintext Block Cipher EncryptionKey Nonce c43acb23… Counter 00000000 Nonce c43acb23… Counter 00000001 Ciphertext Plaintext Block Cipher EncryptionKey Nonce c43acb23… Counter 00000002 Counter (CTR) • Both encryption & decryption are parallelizable – Encrypted counter is sufficient to enc/decrypt • Identical messages: changing nonce results in different ciphertext • No chaining dependencies • No error propagation • Nonce should be random, and should be changed if a previously used key is to be used again
  • 8. 8 Summary • Choice of encryption mode affects – Encryption/decryption speed – Security against active adversaries (bit flips) – Security against passive adversaries (ECB) – Error propagation