Question

In: Computer Science

What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically,...

What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically, if a hacker has the information about i-th cyphertext block Ci and it can find the plaintext Pi without having any other cyphertext blocks.

Solutions

Expert Solution

Dear Student,

Answer :

The 2 Modes Are :

1. Cipher Block Chaining Mode ( CBC ) =

  • In CBC mode, the current plaintext block is added to the previous ciphertext block, and then the result is encrypted with the key.
  • Decryption is the reverse process, which involves decrypting the current ciphertext and then adding the previous ciphertext block to the result.
  • Advantage of CBC over ECB is that changing IV results in different ciphertext for identical message.
  • On the drawback side, the error in transmission will get propagated to few further block during decryption due to chaining effect.
  • CBC mode forms the basis for a well-known data origin authentication mechanism.
  • Thus, it has an advantage for those applications that require both symmetric encryption and data origin authentication.

2. Cipher Feedback Mode ( CFB ) =

  • CFB mode differs significantly from ECB mode, the ciphertext corresponding to a given plaintext block depends not just on that plaintext block and the key, but also on the previous ciphertext block.
  • In other words, the ciphertext block is dependent of message.
  • CFB has a very strange feature. In this mode, user decrypts the ciphertext using only the encryption process of the block cipher.
  • The decryption algorithm of the underlying block cipher is never used.
  • CFB mode is converting a block cipher into a type of stream cipher.
  • The encryption algorithm is used as a key-stream generator to produce key-stream that is placed in the bottom register. This key stream is then XORed with the plaintext as in case of stream cipher.
  • After converting a block cipher into a stream cipher, CFB mode provides some of the advantageous properties of a stream cipher while retaining the advantageous properties of a block cipher.

Hope This Helps.

All The Best


Related Solutions

Modern CPU architectures allow for two modes of operation. Explain what the goal of having these...
Modern CPU architectures allow for two modes of operation. Explain what the goal of having these two modes is/are, and explain how two-mode operation is used to achieve this goal(s).
1) How large are the blocks that get fed through the AES Encryption algorithm? 2) What...
1) How large are the blocks that get fed through the AES Encryption algorithm? 2) What are the three possible key sizes for AES? How many rounds are there for each key size? How large is the keyspace? 3) List five distinct differences between the AES and DES algorithms. 4) List the 16 elements of GF(16) as polynomials. What is 3x^2+6x+1 equal to in GF(16), when the coefficients are reduced appropriately? 5) Use the table on slide 17 of the...
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
Why is access to the comprehensive, quality healthcare services important? What does this access specifically impact, in terms of people’s health outcomes?
Why is access to the comprehensive, quality healthcare services important? What does this access specifically impact, in terms of people’s health outcomes? What role does an effective health promotion program play in access to health care?
In the caeser cipher encryption and decryption program below, what do the two lines if(ch >...
In the caeser cipher encryption and decryption program below, what do the two lines if(ch > 'z'){ ch = ch - 'z' + 'a' - 1; } if(ch < 'a'){ ch = ch + 'z' - 'a' + 1; } mean??? I understand that it has something to do with ASCII characters and makes sure that if the encryption/decryption character is more than "z", then it would loop back to "a" instead of outputting a charcter like "{" . I...
Design a random-access digital memory that can write or read single bits in two addressable SRFFs...
Design a random-access digital memory that can write or read single bits in two addressable SRFFs having 3-bit addresses 5 and 7. The memory has the following inputs and outputs. Address input lines A2, A1, A0, Data input line DIN, and Data output line DOUT, Read/Write input line RW (RW = 0 stores DIN into addressed memory. RW = 1 puts addressed memory data on DOUT)
How fatty acids move in two dimensial fluid of cell? What allow and what limit their...
How fatty acids move in two dimensial fluid of cell? What allow and what limit their movement?
What is true about Random Access Files? Check all that apply. 1. The program can read...
What is true about Random Access Files? Check all that apply. 1. The program can read file data anywhere the read location is positioned. 2. Data must be sorted to to use random access functions. 3. Data can be read in any order specified in the program. 4. seekp and seekg can be used to access files by a given position.
In the U.S. health care system, what are the two basic challenges to access which will...
In the U.S. health care system, what are the two basic challenges to access which will not be resolved by a mere expansion of health insurance to the uninsured?
In the U.S. health care system, what are the two basic challenges to access which will...
In the U.S. health care system, what are the two basic challenges to access which will not be resolved by a mere expansion of health insurance to the uninsured? Cite references to support your response.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT