This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 49 lines
!!! Overview[1]
[{$pagename}] is an [Algorithm] that uses a [Block Cipher] to provide an information service such as [confidentiality] or [message] [Integrity].
A [Block Cipher] by itself is only suitable for the secure [cryptographic] transformation ([encryption] or [decryption]) of one fixed-length group of [bits] called a [block].
[{$pagename}] allow a method [encrypt] a [plaintext] P to a [ciphertext] C, where the [plaintext] and [ciphertext] are of an arbitrary length.
Most [{$pagename}]s require a unique [binary] sequence, often called an [Initialization Vector] ([IV]), for each [encryption] operation. The [IV] has to be non-repeating and, for some modes, random as well. The [Initialization Vector] is used to ensure distinct [Ciphertexts] are produced even when the same [plaintext] is encrypted multiple times independently with the same [key]. [{$pagename}]s may be capable of operating on more than one [block] size, but during transformation the [block] size is always fixed. [{$pagename}] operate on whole blocks and require that the last part of the data be [Padded] to a full [block] if it is smaller than the current [block] size.
[{$pagename}] normally requires the [Plaintext] P be an exact multiple of the [block] size which requires some [Padding bits]. Any padding scheme is acceptable, as long as it is reversible.
A [{$pagename}] describes how to repeatedly apply a [Block Cipher]'s single-block operation to securely transform amounts of data larger than a [block].
!! Common [{$pagename}]
* [Cipher Block Chaining] ([CBC])
* [Electronic Code Book] ([ECB])
* [Counter mode] ([CTR])
* [Propagating Cipher Block Chaining] ([PCBC])
* [Cipher FeedBack] ([CFB])
* [Output FeedBack] ([OFB])
* [XTS]
!! [{$pagename}] Usage
[{$pagename}] that provided a [confidentiality] mode with an [Authentication] mode could be difficult and error prone. \\
Most [{$pagename}]s provide [confidentiality], but NOT [Integrity] which can be detected with a separate [Message Authentication Code] such as CBC-MAC, or a [Digital Signature]. \\
[{$pagename}] which combined [confidentiality] and [integrity] into a single [Cryptographic Primitive] are referred to as [Authenticated Encryption], [AE]. \\[Examples] of [Authenticated Encryption] modes are:
* [Counter mode] with [CBC-MAC] ([CCM])
* [Galois-Counter Mode] ([GCM])
* Carter–Wegman + [Counter mode] ([CWC])
* Encrypt-then-Authenticate-then-translate [EAX]
* [Integrity Aware Parallelizable Mode] ([IAPM])
* [Offset Codebook Mode] ([OCB])
!! [Data Leakage]
All [{$pagename}] leak some [data]. Even though the [Data Leakage] may not be of value without additional [Attack Effort] after it is obtained.
!! [NIST.SP.800-38]
[NIST.SP.800-38] defines: Recommendation for [{$pagename}] of Operation: Methods and Techniques
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Block cipher mode of operation|Wikipedia:Block_cipher_mode_of_operation|target='_blank'] - based on information obtained 2013-04-10