Crypto U4, Block Cipher, Counter Mode

Beschreibung

IYM002 (Unit 4 - Symmetric Crypto) Notiz am Crypto U4, Block Cipher, Counter Mode, erstellt von jjanesko am 03/04/2013.
jjanesko
Notiz von jjanesko, aktualisiert more than 1 year ago
jjanesko
Erstellt von jjanesko vor etwa 11 Jahre
269
11

Zusammenfassung der Ressource

Seite 1

Encryption Both sender and receiver have an agreed upon counter starting number. Pass the first counter number and the key to the encryption function. XOR the result of the function with the first plaintext block. The result is the first ciphertext block. Increment the counter. Pass the new counter value and the key to the encryption function. XOR the result of the function with the next plaintext block. The result is the next ciphertext block. Go to step number 5 and repeat until there are no plaintext blocks remaining.

Decryption Take the agreed upon counter number. Pass the starting counter number and the key to the encryption function. XOR the result of the function with the first ciphertext block. The result is the first plaintext block. Increment the counter. Pass the new counter value and the key to the encryption function. XOR the result of the function with the next ciphertext block. The result is the next plaintext block. Go to step number 5 and repeat until there are no plaintext blocks remaining.

Error propagation NO error propagation

Properties requires a synchronous counter parallelizable no message dependency, but achieves different outputs for like blocks by using the counter requires only a decryption algorithm

Encryption and Decryption

Error Propagation and Properties

Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto: U3 & U4 Flashcards (by Mohamed Ahmed Enab)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko