Cryptography Foundations Solution Exercise 2 2 . 1 Block Ciphers in ECB and CBC Mode

نویسندگان

  • Ueli Maurer
  • Christian Badertscher
  • Fabio Banfi
چکیده

a) If a block cipher is used in ECB mode, the encryption of two equal n-bit blocks (aligned at n-bit boundaries) of the plaintext will yield the same n-bit blocks in the ciphertext. This can be hazardous for security in applications: If the plaintext encodes a bitmap with a schematic image (think of Mickey Mouse ears), then most of the n-bit blocks will either be 0n or 1n, so the ciphertext will mostly consist of the corresponding blocks F (0n, k) and F (1n, k). In fact, if the resulting ciphertext is drawn as a bitmap, then the schematic structure will still be visible.1

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An observation regarding Jutla's modes of operation

Recently, Jutla suggested two new modes of operation for block ciphers. These modes build on traditional CBC and ECB modes, respectively, but add to them masking of the outputs and inputs. Jutla proved that these masking operations considerably strengthen CBC and ECB modes. In particular, together with a simple checksum, the modified modes ensure not only confidentiality, but also authenticity....

متن کامل

Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes

Randomness of output is a significant factor in measuring the security of any cryptographic algorithm. A non-random block cipher is vulnerable to any type of attack. This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the 128-bit BA to investigate its randomness. The structure of this algorithm resembles that of the 64-bit Blowfish algorithm, except...

متن کامل

Correcting Noisy Ciphers in CBC mode

Correction of noisy cipher is a challenging task. Previous work has been done on correcting noisy ciphers using AES in ECB mode. In this paper, error detection and correction is done at the receiver end, without any changes to the encryption algorithm that uses AES in CBC mode. A property of CBC is that noise affecting one encrypted block will affect the corresponding decrypted block and its ne...

متن کامل

On the insecurity of interchanged use of OFB and CBC modes of operation

The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completely independent and uncorrelated. In this paper we represent both CBC and OFB as quasigroup string transformations, and then show that OFB mode is a special case of the CBC mode of operation. That ra...

متن کامل

Security-throughput Tradeoff with Link Adaptive Encryption Scheme

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018