Question

In: Computer Science

Which of the 5 AES modes satisfies COA (Ciphertext only attack)

Which of the 5 AES modes satisfies COA (Ciphertext only attack)

Solutions

Expert Solution

This question is from topic Cryptography.

Ciphertext - It is one of the component of cryptosystem. It is the scrambled version of the plaintext generated by the encryption algorithm with help of a specific encryption key.

Ciphertext Only Attacks (COA) - It is one the method of attacks on cryptosystems. In this , the attacker has access to a set of ciphertexts.Here he does not have access to plaintext corresponding to ciphertext.COA is technique to find  the corresponding plaintext from a given set of ciphertext. As the encryption key can be determined from this attack. Now-a-days cryptosystems are guarded against ciphertext-only attacks.

Advanced Encryption Standard(AES) is one of the most used and succesful algorithms for block encryption.

There are different modes of operation of a block cipher and are procedural rules for a generic block cipher. The five modes of AES are-

1)  Electronic Code Book mode (ECB Mode) - It is very simple mode of processing a series of listed message blocks sequencially. Here the user divides the plaintext into different blocks. User takes the first block of plaintext and encrypts it with the key to produce the first block of ciphertext. After that he takes the second block of plaintext and follows the same process with same key and so on.

A ciphertext genrated from ECB can allow an attacker to guess the plaintext by hit and trial method if the plaintext message is within predictable. This is beacuse ECB is somehow deterministic cipher.

2) Cipher Block Chaining (CBC Mode) - The one of the advantage of this mode is that it provides dependency of message  for generating ciphertext making  the system non-deterministic. The steps of mode of operation are-

-> It first load the n-bit Initialization Vector (IV) in the top register.

-> After that it takes XOR of n-bit plaintext block with data value in top register.

-> Then it encrypt the result of XOR operation with block cipher with key K.

-> After this it feed ciphertext block into top register and this operation continues till all plaintext blocks are processed.

Now for decryption, IV data is XOR with first ciphertext block decrypted. The first ciphertext block is also fed into to register replacing IV for decrypting next ciphertext block.

3) Cipher FeedBack mode (CFB Mode) - In this mode of operation each ciphertext block is fedback into the encryption process in order to encrypt the next plaintext block. The steps of mode of operation are -

-> Firstly load the initialization vector IV as the initial random n-bit input block in the top register.

-> Then encrypt data value of top register with underlying block cipher with key K.

-> Then it take only ‘s’ number of most significant bits (MSB) of output of encryption process and XOR them with ‘s’ bit plaintext message block to generate ciphertext block where 's' is a message block size in bits.

-> Then feed ciphertext block into top register by shifting already present data to the left and the operation continues till all plaintext blocks are processed.

-> Here the previous ciphertext block is encrypted with the key and takes XOR of result with  to the current plaintext block.

4) Output Feedback Mode (OFM Mode) - It feeds the successive output blocks from the underlying block cipher back to it. These feedback blocks provide string of bits to feed the encryption algorithm which act as the key-stream generator as in case of CFB mode.We take XOR of  key stream with the plaintext blocks.This mode requires an IV as the initial random n-bit input block.

5) Counter Mode(CTR Mode) - It is a counter-based version of CFB mode without the feedback.Here sender and receiver need to access to a reliable counter  which computes a new shared value each time a ciphertext block is exchanged. The steps of mode of operation are -

-> Firstly load the initial counter value in the top register for both sender and receiver.

-> Then it encrypt the contents of the counter with the key and puts the result in the bottom register.

-> Then it take the first plaintext block A1 and takes XOR with contents of the bottom register. The result of this is R1 and send R1 to the receiver and update the counter. The counter update replaces the ciphertext feedback. These steps are continued untill plaintext block is encrypted.

-> Here decryption is the reverse process.

->  We take  XOR of the ciphertext block with the output of encrypted contents of counter value. After decryption of each ciphertext block counter is updated.


Related Solutions

Explain the mathematical proof that One time pad (OTP) is perfectly secure under Ciphertext Only attack...
Explain the mathematical proof that One time pad (OTP) is perfectly secure under Ciphertext Only attack (COH).
Which method is used to culture viruses that attack only bacteria?     I. a continuous or...
Which method is used to culture viruses that attack only bacteria?     I. a continuous or immortal cell line II. a primary cell line Group of answer choices Neither I or II Only I Only II Both I and II
which is based on Feistal design AES or DES?
which is based on Feistal design AES or DES?
which of the following is an attack in which something that appears as a helpful or...
which of the following is an attack in which something that appears as a helpful or harmless program carries and delivers a paylocal? a-worm b-phish c-evil twin d-trojan horse
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will...
decrypt the ciphertext xyatqyvaxpagjdpglax encrypted by the affine cipher. also explain is there alphabets which will not change after ecnryption
how much ATP will be produced based only on the number of acetyl coA units, from...
how much ATP will be produced based only on the number of acetyl coA units, from B oxidation of stearic acid? stearic acid is an 18 carbon, saturated fatty acid (a)108ATP (b) 148ATP (c)18ATP (d)27ATP (2) which stage of the complete oxidation of glucose produces the largest ATP yield? (a)oxidation of decarboxylation (b) glycolysis (c) citric acid cycle (d)anaerobic conditions (3) reaction #7 of the citric acid involves the formation of a secondary alcohol in malate from a double bond...
Ketone bodies are synthesized from acety-CoA only when carbohydrates are not available. Why is this the...
Ketone bodies are synthesized from acety-CoA only when carbohydrates are not available. Why is this the case? Consider how gluconeogenesis, TCA, ACC, and circulating hormones play a role in directing carbon toward these molecules.
Name and explain 5 modes of hormonal/ neuroendocrine and neuronal signaling,.
Name and explain 5 modes of hormonal/ neuroendocrine and neuronal signaling,.
1. Which Interrupt Has The Highest Priority? 2. Name 5 Different Addressing Modes? 3. How Many...
1. Which Interrupt Has The Highest Priority? 2. Name 5 Different Addressing Modes? 3. How Many Interrupts Are There In 8085? 4. In 8085 Which Is Called As High Order / Low Order Register? 5. What Are Input & Output Devices?
1. List the select prototype medication for the HMG-CoA reductase inhibitors (statins). There is only one...
1. List the select prototype medication for the HMG-CoA reductase inhibitors (statins). There is only one prototype drug for this class. 2. Describe myopathy. List the nursing actions and client education regarding myopathy. 3. Heparin is the select prototype medication for parenteral anticoagulants. List 2 complications of heparin and give at least 2 nursing actions for each complication. 4. What are the therapeutic uses for the oral anticoagulant warfarin? 5. What are the therapeutic uses for Dabigatran?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT