Modes Of Operation Flashcards

1
Q

ECB Electronic Codebook

A

Each block of plaintext bits is encoded independently using the same key

Secure transmission of single values, suitable for short messages.

Long messages may not be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher Block Chaining CBC

A

The input to the encryption algorithm is the XOR of the next block of plaintext and the preceding block of cipher text.
More secure than ECB.
provides confidentiality and authentication

Application: general purpose block orientated transmission, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cipher feedback CFB

A

Input is processed s bits at a time preceding cipher text is used as input to the encryption algorithm to produce pseudorandom output which is XORED with plaintext to produce next unit of cipher text.

Same to CBC CFB cannot be parallelised.
Advantage that identical plaintext blocks lead to different cipher text blocks.

Application: general purpose stream orientated transmission
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Output feedback OFB

A

Similar to CFB except the input to the encryption algorithm is the preceding encryption output and full blocks are used

Has the advantage that identical plaintext blocks lead to different cipher text blocks same as CBC AND CFB

Application: stream orientated transmission over noisy channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Counter CTR

A

Each block of plaintext is XORed with an encrypted counter. Counter is incremented for each subsequent block

Same to ECB encryption and decryption using counter mode and be parallelised.

Application: general purpose block orientated transmission
Useful for high speed requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Synchronous stream cipher

A

A key stream is generated independently of the plaintext and cipher text messages and then combined with the plaintext to encrypt or the cipher text to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asynchronous stream cipher

A

A keystream is a function of the key and a fixed number of previous ciphertexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECB algorithms

A

Encryption = Ci = Ek(Pi)

Decryption = Pi =Dk(Ci)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CBC algorithms

A

Encryption= Ci = Ek(Pi(+)Ci-1)

Decryption Pi=Dk(Ci)(+)Ci-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OFB Algorithm

A

Encryption = Ci = Pi(+)Oi

Decryption Pi=Ci(+)Oi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CFB Algorithm

A

Encryption = Ci=Pi(+)Oi

Decryption Pi=Ci(+)Oi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Modes that use only encryption

A

Counter CTR- encrypts counter value to generate a keystream and decryption uses the same keystream

Galois/ counter mode GCM- encrypts the counter values and uses encryption results to generate authentication tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Passive attack

A

An attacker eavesdropps on the communication channel or system without altering or affecting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active attack

A

Attacker actively modifies the data or communication in transit may alter inject or replay messages.

MITM
REPLAY
DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly