Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)

Descripción

(Unit 4 - Symmetric Crypto) IYM002 Apunte sobre Crypto U4, Block Cipher, Cipher Feedback Mode (CFB), creado por jjanesko el 03/04/2013.
jjanesko
Apunte por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace más de 11 años
645
11

Resumen del Recurso

Página 1

Encryption Start with an initialization vector (IV). Pass IV and key to the encryption function. XOR the result of the encryption function with the first plaintext block. The result is the first ciphertext block. Pass the resulting ciphertext block and the key to the encryption function. XOR the result of the encryption function with the next plaintext block. The result is the next ciphertext block. Go back to step 5, and repeat until there are no plaintext blocks remaining.

Decryption Start with the initialization vector (IV). Pass IV and key to the encryption function. XOR the result of the encryption function with the first ciphertext block. The result is the first plaintext block. Take the ciphertext block from the previous operation. Pass the ciphertext block and the key to the encryption function. XOR the result of the encryption function with the next ciphertext block. The result is the next plaintext block. Go back to step 5, and repeat until there are no ciphertext blocks remaining.

Error propagation For one error in a block, the error spans at most two blocks. In the first block, only the XOR process will be impacted, so errors only impact the bit positions of the actual error. In the next succeeding block, the encryption function process will be impacted, and the whole block has the potential to be incorrect.

General Properties message dependence limited error propagation no synchronization is required; as long as we have the ciphertext, we have the order only slightly less efficient than ECB mode only encryption algorithm needed padding is unnecessary. The XOR function works without padding.

Variant of cipher feedback mode: Reduced CFB uses 8 bit blocks good for small transfers (such as character-by-character encryption)

Encryption and Decryption

Properties and Error Propagation

Mostrar resumen completo Ocultar resumen completo

Similar

Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto: U3 & U4 Flashcards (by Mohamed Ahmed Enab)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko