Cryptography Foundations Solution Exercise 2 2 . 1 Block Ciphers in ECB and CBC Mode
نویسندگان
چکیده
a) If a block cipher is used in ECB mode, the encryption of two equal n-bit blocks (aligned at n-bit boundaries) of the plaintext will yield the same n-bit blocks in the ciphertext. This can be hazardous for security in applications: If the plaintext encodes a bitmap with a schematic image (think of Mickey Mouse ears), then most of the n-bit blocks will either be 0n or 1n, so the ciphertext will mostly consist of the corresponding blocks F (0n, k) and F (1n, k). In fact, if the resulting ciphertext is drawn as a bitmap, then the schematic structure will still be visible.1
منابع مشابه
An observation regarding Jutla's modes of operation
Recently, Jutla suggested two new modes of operation for block ciphers. These modes build on traditional CBC and ECB modes, respectively, but add to them masking of the outputs and inputs. Jutla proved that these masking operations considerably strengthen CBC and ECB modes. In particular, together with a simple checksum, the modified modes ensure not only confidentiality, but also authenticity....
متن کاملRandomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes
Randomness of output is a significant factor in measuring the security of any cryptographic algorithm. A non-random block cipher is vulnerable to any type of attack. This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the 128-bit BA to investigate its randomness. The structure of this algorithm resembles that of the 64-bit Blowfish algorithm, except...
متن کاملCorrecting Noisy Ciphers in CBC mode
Correction of noisy cipher is a challenging task. Previous work has been done on correcting noisy ciphers using AES in ECB mode. In this paper, error detection and correction is done at the receiver end, without any changes to the encryption algorithm that uses AES in CBC mode. A property of CBC is that noise affecting one encrypted block will affect the corresponding decrypted block and its ne...
متن کاملOn the insecurity of interchanged use of OFB and CBC modes of operation
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completely independent and uncorrelated. In this paper we represent both CBC and OFB as quasigroup string transformations, and then show that OFB mode is a special case of the CBC mode of operation. That ra...
متن کاملSecurity-throughput Tradeoff with Link Adaptive Encryption Scheme
With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018