Net Sec c2p4
Net Sec c2p4
Essentials
chapter 2 part 4
Fifth Edition
by William
Stallings
Algorithm design
• Hardware efficiency
• Encryption/decryption can be done in parallel on multiple blocks of plaintext or ciphertext
• Throughput is only limited by the amount of parallelism that is achieved
• Software efficiency
• Because of the opportunities for parallel execution, processors that support parallel features can be
effectively utilized
• Preprocessing
• The execution of the underlying encryption algorithm does not depend on input
of the plaintext or ciphertext --- when the plaintext or ciphertext input is
presented, the only computation is a series of XORs, greatly enhancing
throughput
• Random access
• The ith block of plaintext or ciphertext can be processed in random-access fashion
• Provable security
• It can be shown that CTR is at least as secure as the other modes discussed in this
section
• Simplicity
• Requires only the implementation of the encryption algorithm and not the
decryption algorithm
summary