Objectives: DES or AES, Can Be Used To Encipher Long Messages
Objectives: DES or AES, Can Be Used To Encipher Long Messages
8.1
8-1 USE OF MODERN BLOCK CIPHERS
8.2
8-1 Continued
8.3
8.1.1 Electronic Codebook (ECB) Mode
8.4
8.1.1 Continued
Example 8.1
It can be proved that each plaintext block at Alice’s site is exactly
recovered at Bob’s site. Because encryption and decryption are
inverses of each other,
Example 8.2
This mode is called electronic codebook because one can
precompile 2K codebooks (one for each key) in which each
codebook has 2n entries in two columns. Each entry can list the
plaintext and the corresponding ciphertext blocks. However, if K
and n are large, the codebook would be far too large to precompile
and maintain.
8.5
8.1.1 Continued
Example 8.3
Assume that Eve works in a company a few hours per month (her
monthly payment is very low). She knows that the company uses
several blocks of information for each employee in which the
seventh block is the amount of money to be deposited in the
employee’s account. Eve can intercept the ciphertext sent to the
bank at the end of the month, replace the block with the
information about her payment with a copy of the block with the
information about the payment of a full-time colleague. Each
month Eve can receive more money than she deserves.
8.6
8.1.1 Continued
Error Propagation
A single bit error in transmission can create errors in
several in the corresponding block. However, the error
does not have any effect on the other blocks.
8.7
8.1.1 Continued
Ciphertext Stealing
A technique called ciphertext stealing (CTS) can make it
possible to use ECB mode without padding. In this
technique the last two plaintext blocks, PN−1 and PN , are
encrypted differently and out of order, as shown below,
assuming that PN−1 has n bits and PN has m bits, where m
≤n.
8.8
8.1.2 Cipher Block Chaining (CBC) Mode
8.9
8.1.2 Continued
Figure 8.3 Cipher block chaining (CBC) mode
8.10
8.1.2 Continued
Example 8.4
It can be proved that each plaintext block at Alice’s site is
recovered exactly at Bob’s site. Because encryption and decryption
are inverses of each other,
8.11
8.1.2 Continued
Error Propagation
In CBC mode, a single bit error in ciphertext block Cj
during transmission may create error in most bits in
plaintext block Pj during decryption.
8.12
8.1.2 Continued
Ciphertext Stealing
The ciphertext stealing technique described for ECB
mode can also be applied to CBC mode, as shown below.
8.13
8.1.3 Cipher Feedback (CFB) Mode
In some situations, we need to use DES or AES as secure
ciphers, but the plaintext or ciphertext block sizes are to
be smaller.
Figure 8.4 Encryption in cipher feedback (CFB) mode
8.14
8.1.3 Continued
Note
In CFB mode, encipherment and decipherment use
the encryption function of the underlying block
cipher.
8.15
8.1.3 Continued
8.16
8.1.3 Continued
8.17
18.1.4 Output Feedback (OFB) Mode
8.18
8.1.4 Continued
OFB as a Stream Cipher
8.19
8.1.4 Continued
8.20
8.1.5 Counter (CTR) Mode
8.21
8.1.5 Continued
8.22
8.1.5 Continued
8.23
8.1.5 Continued
8.24