Lecture 8
Lecture 8
Lecture 8
Lecture# 7
Lecture Slides Prepared by:
Dr. Syed Irfan Ullah
Department of Computing
Abasyn University Peshawar
Block Cipher Operation
Pn-1
Pn-1 Pn
Pn Pn-1
Pn-1 Pn
Pn
En-1
En-1 En-1
En-1
Head
Headnn TT Head
Headnn TT
Pn
Pn TT Pn
Pn TT
En-1
En-1 Head
Headnn En-1
En-1 Head
Headnn
Advantages and Limitations of
CBC
a ciphertext block depends on all blocks
before it
any change to a block affects all following
ciphertext blocks... avalanche effect
need Initialization Vector (IV)
which must be known to sender & receiver
if sent in clear, attacker can change bits of first block,
by changing corresponding bits of IV
hence IV must either be a fixed value (as in EFTPOS)
or derived in way hard to manipulate
or sent encrypted in ECB mode before rest of message
or message integrity must be checked otherwise
Stream Modes of Operation
blockmodes encrypt entire block
may need to operate on smaller units
real time data
convert block cipher into stream cipher
cipher feedback (CFB) mode
output feedback (OFB) mode
counter (CTR) mode
useblock cipher as some form of pseudo-
random number generator... Vernam cipher
Cipher FeedBack (CFB)
message is treated as a stream of bits
added to the output of the block cipher
result is feed back for next stage (hence name)
standard allows any number of bits (1,8, 64 or
128 etc) to be feed back
denoted CFB-1, CFB-8, CFB-64, CFB-128, etc.
most efficient to use all bits in block (64 or 128)
Ci = Pi XOR EK(Ci-1)
C-1 = IV
uses: stream data encryption, authentication
s-bit
Cipher
FeedBack
(CFB-s)
Advantages and Limitations of
CFB
most common stream mode
appropriate when data arrives in bits/bytes
limitation is need to stall while do block
encryption after every s-bits
note that the block cipher is used in
encryption mode at both ends (XOR)
errors propagate for several blocks after
the error ... how many?
Output FeedBack (OFB)
message is treated as a stream of bits
output of cipher is added to message
output is then feed back (hence name)
Oi = EK(Oi-1)
Ci = Pi XOR Oi
O-1 = IV
feedback is independent of message
can be computed in advance
uses: stream encryption on noisy channels
Why noisy channels?
Output
FeedBack
(OFB)
Advantages and Limitations of
OFB
needs an IV which is unique for each use
if ever reuse attacker can recover outputs...
OTP
can pre-compute
bit errors do not propagate
more vulnerable to message stream modification...
change arbitrary bits by changing ciphertext
sender & receiver must remain in sync
only use with full block feedback
subsequent research has shown that only full block
feedback (ie CFB-64 or CFB-128) should ever be used
Counter (CTR)
a “new” mode, though proposed early on
similar to OFB but encrypts counter value
rather than any feedback value
Oi = EK(i)
Ci = Pi XOR Oi
must have a different key & counter value
for every plaintext block (never reused)
again, OTP issue
uses: high-speed network encryptions
Counter
(CTR)
Advantages and Limitations of
CTR
efficiency
can do parallel encryptions in h/w or s/w
can preprocess in advance of need
good for bursty high speed links
random access to encrypted data blocks
provable security (good as other modes)
never have cycle less than 2b
but must ensure never reuse key/counter
values, otherwise could break (cf OFB)
Feedback
Character-
istics
Summary
Multiple
Encryption & Triple-DES
Modes of Operation
ECB, CBC, CFB, OFB, CTR, XTS-AES