Questions tagged [modes-of-operation]

ways of applying a block cipher to multi-block messages and enabling repeated use without changing the key.

The trivial mode of operation, ECB (Electronic Code Book), is insecure, as it maps repeated plaintext block always to the same ciphertext block.

Better encryption modes include:

  • CBC (Cipher-Block Chaining, which feeds the previous ciphertext block back into next plaintext),
  • PCBC (Propagating Cipher-Block Chaining, which feeds previous ciphertext and plaintext blocks back into the next plaintext),
  • CFB (Cipher Feedback, which feeds the previous ciphertext block into the cipher, then combines with the plaintext),
  • OFB (Output Feedback, which feeds the output of the cipher as the input for the next block, before combining with plaintext)
  • CTR (Counter, which encrypts a nounce+counter and combines the result with the plaintext)

There are also some modes which support authenticated encryption (AE), or authenticated encryption with associated data (AEAD):

  • OCB (offset codebook - adds a counter-like value to each plaintext block before and after encryption, and encrypts a checksum of the plaintext for authentication)
  • CCM (Counter with CBC-MAC, combines CTR mode with a CBC-bases MAC)
  • EAX (which combines CTR mode with OMAC for authentication and creation of an initialization vector from a nonce)
  • GCM (Galois/Counter mode, combines CTR with a new authentication based on a finite field), and its variant SGCM (Sophie Germain Counter mode, which uses a different field).
331 questions
7
votes
2 answers

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

In Chapter 6, Question 6.8, of his book “Cryptography and Network Security Principles and Practices”, William Stalling asks: Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? ECB and…
Mahmood
  • 71
  • 1
  • 2
4
votes
1 answer

Random Access vs. Parallelism modes of operation

I am trying to understand some concepts regarding Random Read Access and Parallelism in mode of operations. I have written below what my concepts are regarding the two. If you can please correct where i am wrong, that would be great: What is the…
3
votes
1 answer

Are all self-synchronizing cryptosystems necessarily self-synchronizing stream ciphers?

I have a noisy communications link between two points that occasionally deletes a byte. By "self-synchronizing cryptosystem", I mean that the receiver attempting to recover the original plaintext will be mostly successful, with at most a dozen or so…
David Cary
  • 5,664
  • 4
  • 21
  • 35
1
vote
0 answers

Is PCBC using XOR still susceptible to adjacent swap attacks if a permutation is used?

PCBC with XOR as the operation used to combine the plaintext and cipherext blocks is vulnerable to adjacent swap attacks. But is it still susceptible to this attack if one of the following is done: An unkeyed permutation is applied to $PT_{i}…
Melab
  • 3,655
  • 2
  • 22
  • 44
1
vote
1 answer

Is it a bad idea to swap modes/encryption primitives?

I was wondering if changing modes or primitives could affect security. For example, let's say you have encrypted data with AES-128 with CBC mode and you want to change it to AES-128 GCM, or to ASCON. What I mean by that is that you decrypt the…