0% found this document useful (0 votes)
95 views3 pages

Block Cipher Modes of Operation: Electronic Code Book (ECB)

This document summarizes several modes of operation for block ciphers: Electronic Code Book (ECB) encrypts each block separately using the same key but is prone to cryptanalysis. Cipher Block Chaining (CBC) XORs an initialization vector with the plaintext and encrypts blocks in a chained manner for security. Cipher Feedback Mode (CFB) uses cipher output as feedback while Output Feedback Mode (OFB) uses encrypted output as feedback instead of the actual cipher. Counter Mode (CTR) increments a counter value for each encryption to allow parallel processing but requires synchronization.

Uploaded by

Mister007jh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views3 pages

Block Cipher Modes of Operation: Electronic Code Book (ECB)

This document summarizes several modes of operation for block ciphers: Electronic Code Book (ECB) encrypts each block separately using the same key but is prone to cryptanalysis. Cipher Block Chaining (CBC) XORs an initialization vector with the plaintext and encrypts blocks in a chained manner for security. Cipher Feedback Mode (CFB) uses cipher output as feedback while Output Feedback Mode (OFB) uses encrypted output as feedback instead of the actual cipher. Counter Mode (CTR) increments a counter value for each encryption to allow parallel processing but requires synchronization.

Uploaded by

Mister007jh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Block Cipher Modes of Operation

Electronic Code Book (ECB)


Working principle:
Message is broken into independent blocks where each block of plaintext is encrypted
separately using same key.

Advantages:
Parallel encryption of blocks of bits is possible, thus it is a faster way of encryption.
Drawbacks:
Prone to cryptanalysis since there is a direct relationship between plaintext and ciphertext .
Message repetitions may show in ciphertext.
Application where the particular mode can be used:
Secure transmission of single values.
Any application data usually have partial information which can be guessed.

Cipher Block Chaining (CBC)


Working principle:
an initialization vector (IV) is exclusive-or with the plaintext prior to encryption. For the first
round of encryption, this is a random, public value. For subsequent rounds, it is the ciphertext
of the previous round.

Advantages:
Advantage of CBC over ECB is that changing IV results in different ciphertext for identical
message.

Drawbacks:
Parallel encryption is not possible since every encryption requires previous cipher.

Application where the particular mode can be used:


Bulk data encryption
Symmetric encryption and data origin authentication.
Cipher Feedback Mode (CFB)
Working principle:

In this mode, the cipher is given as feedback to the next block of encryption with some new
specifications: first an initial vector IV is used for first encryption and output bits are divided as set
of n bits, the left-hand side s bits are selected and are applied an XOR operation with plaintext bits.
The result given as input to a shift register and the process continues.

Advantages:
Since, there is some data loss due to use of shift register, thus it is difficult for applying
cryptanalysis.
CFB feed back gives the cipher text which we can get save inside any memory. That you access
both cipher and decipher text.

Drawbacks:
CPU is not free during the whole process of the cipher text.
It is time containing process.

Application where the particular mode can be used:


Stream data encryption
Authentication

Output Feedback Mode (OFB)


Working principle:
Here, it needs an IV which is unique for each use. The output feedback mode follows nearly
same process as the Cipher Feedback mode except that it sends the encrypted output as
feedback instead of the actual cipher which is XOR output. In this output feedback mode, all
bits of the block are sent instead of sending selected s bits.
Advantages:
The main advantage of the OFB method is that bit errors in transmission do not propagate in
the encryption. For example, if as a bit error occurs in C1 as ciphertext, only the recovered
value of P1 as plaintext is affected, subsequent plaintext units are not corrupted.

Drawbacks:
The disadvantage of OFB is that it is more vulnerable to a message stream modification attack
than is CFB.

Application where the particular mode can be used:


Stream encryption on noisy channels

Counter Mode (CTR)


Working principle:
Every time a counter (same as text size) initiated value is encrypted and given as input to
XOR with plaintext which results as a ciphertext block. Here, every time the counter is
incremented than the earlier counter.

Advantages:
The CTR mode is independent of feedback use as it can be implemented in parallel.
Drawbacks:
The serious disadvantage of CTR mode is that it requires a synchronous counter at sender and
receiver. Loss of synchronization leads to incorrect recovery of plaintext.

Application where the particular mode can be used:


High-speed network encryptions
General purpose block-oriented transmission

You might also like