Knowledge

Block cipher mode of operation

Source 📝

596: 27: 1525: 7005: 3171: 3157: 1649: 1635: 1137: 1125: 3014: 3000: 2238: 2224: 1511: 1235: 1221: 1077: 1063: 3108:
be controversial; critics argued that "deliberately exposing a cryptosystem to a known systematic input represents an unnecessary risk". However, today CTR mode is widely accepted, and any problems are considered a weakness of the underlying block cipher, which is expected to be secure regardless of systemic bias in its input. Along with CBC, CTR mode is one of two block cipher modes recommended by Niels Ferguson and Bruce Schneier.
1113: 2208: 3360:
It might be observed, for example, that a one-block error in the transmitted ciphertext would result in a one-block error in the reconstructed plaintext for ECB mode encryption, while in CBC mode such an error would affect two blocks. Some felt that such resilience was desirable in the face of random
3131:
in many cases, since the attacker may be able to manipulate the entire IV–counter pair to cause a collision. Once an attacker controls the IV–counter pair and plaintext, XOR of the ciphertext with the known plaintext would yield a value that, when XORed with the ciphertext of the other block sharing
330:
In CBC mode, the IV must be unpredictable (random or pseudorandom) at encryption time; in particular, the (previously) common practice of re-using the last ciphertext block of a message as the IV for the next message is insecure (for example, this method was used by SSL 2.0). If an attacker knows the
3421:
Many modes use an initialization vector (IV) which, depending on the mode, may have requirements such as being only used once (a nonce) or being unpredictable ahead of its publication, etc. Reusing an IV with the same key in CTR, GCM or OFB mode results in XORing the same keystream with two or more
3027:
Each output feedback block cipher operation depends on all previous ones, and so cannot be performed in parallel. However, because the plaintext or ciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel
563:
GCM is defined for block ciphers with a block size of 128 bits. Galois message authentication code (GMAC) is an authentication-only variant of the GCM which can form an incremental message authentication code. Both GCM and GMAC can accept initialization vectors of arbitrary length. GCM can take full
334:
For some keys, an all-zero initialization vector may generate some block cipher modes (CFB-8, OFB-8) to get the internal state stuck at all-zero. For CFB-8, an all-zero IV and an all-zero plaintext, causes 1/256 of keys to generate no encryption, plaintext is returned as ciphertext. For OFB-8, using
3107:
block by encrypting successive values of a "counter". The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is the simplest and most popular. The usage of a simple deterministic input function used to
2631:
CFB may also self synchronize in some special cases other than those specified. For example, a one bit change in CFB-128 with an underlying 128 bit block cipher, will re-synchronize after two blocks. (However, CFB-128 etc. will not handle bit loss gracefully; a one-bit loss will cause the decryptor
2260:
The CFB mode also requires an integer parameter, denoted s, such that 1 ≤ s ≤ b. In the specification of the CFB mode below, each plaintext segment (Pj) and ciphertext segment (Cj) consists of s bits. The value of s is sometimes incorporated into the name of the mode, e.g., the 1-bit CFB mode, the
1565:
take advantage of this property by prepending a single random block to the plaintext. Encryption is done as normal, except the IV does not need to be communicated to the decryption routine. Whatever IV decryption uses, only the random block is "corrupted". It can be safely discarded and the rest of
1545:
Decrypting with the incorrect IV causes the first block of plaintext to be corrupt but subsequent plaintext blocks will be correct. This is because each block is XORed with the ciphertext of the previous block, not the plaintext, so one does not need to decrypt the previous block before using it as
559:
Galois/counter mode (GCM) combines the well-known counter mode of encryption with the new Galois mode of authentication. The key feature is the ease of parallel computation of the Galois field multiplication used for authentication. This feature permits higher throughput than encryption algorithms.
3376:
Many more modes of operation for block ciphers have been suggested. Some have been accepted, fully described (even standardized), and are in use. Others have been found insecure, and should never be used. Still others don't categorize as confidentiality, authenticity, or authenticated encryption –
452:
block, producing a final ciphertext block that is the same size as the final partial plaintext block. This characteristic of stream ciphers makes them suitable for applications that require the encrypted ciphertext data to be the same size as the original plaintext data, and for applications that
3126:
If the IV/nonce is random, then they can be combined with the counter using any invertible operation (concatenation, addition, or XOR) to produce the actual unique counter block for encryption. In case of a non-random nonce (such as a packet counter), the nonce and counter should be concatenated
3035:
Using OFB mode with a partial block as feedback like CFB mode reduces the average cycle length by a factor of 2 or more. A mathematical model proposed by Davies and Parkin and substantiated by experimental results showed that only with full feedback an average cycle length near to the obtainable
2627:
CFB-1 is considered self synchronizing and resilient to loss of ciphertext; "When the 1-bit CFB mode is used, then the synchronization is automatically restored b+1 positions after the inserted or deleted bit. For other values of s in the CFB mode, and for the other confidentiality modes in this
1620:
mode was designed to cause small changes in the ciphertext to propagate indefinitely when decrypting, as well as when encrypting. In PCBC mode, each block of plaintext is XORed with both the previous plaintext block and the previous ciphertext block before being encrypted. Like with CBC mode, an
3122:
CTR mode has similar characteristics to OFB, but also allows a random-access property during decryption. CTR mode is well suited to operate on a multi-processor machine, where blocks can be encrypted in parallel. Furthermore, it does not suffer from the short-cycle problem that can affect OFB.
218:
The cryptographic community observed that compositing (combining) a confidentiality mode with an authenticity mode could be difficult and error prone. They therefore began to supply modes which combined confidentiality and data integrity into a single cryptographic primitive (an encryption
3229:
chained in MAC-Then-Encrypt order, any bit error should completely abort decryption and must not generate any specific bit errors to decryptor. I.e. if decryption succeeded, there should not be any bit error. As such error propagation is less important subject in modern cipher modes than in
1550:
be parallelized. Note that a one-bit change to the ciphertext causes complete corruption of the corresponding block of plaintext, and inverts the corresponding bit in the following block of plaintext, but the rest of the blocks remain intact. This peculiarity is exploited in different
1537:
CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as
723:, with a few very small changes (e.g. how AES-CTR is initialized), but which yields practical benefits to its security "This addition allows for encrypting up to 2 messages with the same key, compared to the significant limitation of only 2 messages that were allowed with GCM-SIV." 296:
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct ciphertexts even if the same plaintext is encrypted multiple times, without the need for a slower re-keying process.
2009: 681:
SIV can support external nonce-based authenticated encryption, in which case one of the authenticated data fields is utilized for this purpose. RFC5297 specifies that for interoperability purposes the last authenticated data field should be used external nonce.
712:
AES-GCM-SIV synthesizes the internal IV. It derives a hash of the additional authenticated data and plaintext using the POLYVAL Galois hash function. The hash is then encrypted an AES-key, and used as authentication tag and AES-CTR initialization vector.
579:, usually AES. The result of this encryption is then XORed with the plaintext to produce the ciphertext. Like all counter modes, this is essentially a stream cipher, and so it is essential that a different IV is used for each stream that is encrypted. 300:
An initialization vector has different security requirements than a key, so the IV usually does not need to be secret. For most block cipher modes it is important that an initialization vector is never reused under the same key, i.e. it must be a
708:
is a mode of operation for the Advanced Encryption Standard which provides similar performance to Galois/counter mode as well as misuse resistance in the event of the reuse of a cryptographic nonce. The construction is defined in RFC 8452.
326:
For OFB and CTR, reusing an IV causes key bitstream re-use, which breaks security. This can be seen because both modes effectively create a bitstream that is XORed with the plaintext, and this bitstream is dependent on the key and IV only.
2622: 2516: 1928: 1795: 738:
Different cipher modes mask patterns by cascading outputs from the cipher block or other globally deterministic variables into the subsequent cipher block. The inputs of the listed modes are summarized in the following table:
3031:
It is possible to obtain an OFB mode keystream by using CBC mode with a constant string of zeroes as input. This can be useful, because it allows the usage of fast hardware implementations of CBC mode for OFB mode encryption.
331:
IV (or the previous block of ciphertext) before the next plaintext is specified, they can check their guess about plaintext of some block that was encrypted with the same key before (this is known as the TLS CBC IV attack).
3127:(e.g., storing the nonce in the upper 64 bits and the counter in the lower 64 bits of a 128-bit counter block). Simply adding or XORing the nonce and counter into a single value would break the security under a 2410: 3426:
algorithm and the SIV (RFC 5297) AEAD mode do not require an IV as an input, and return the same ciphertext and authentication tag every time for a given plaintext and key. Other IV misuse-resistant modes such as
3438:. They are generally used in modes of operation similar to the block modes described here. As with all protocols, to be cryptographically secure, care must be taken to design these modes of operation correctly. 347:(PRF) construction called S2V on the input (additional data and plaintext), preventing any external data from directly controlling the IV. External nonces / IV may be fed into S2V as an additional data field. 2710:
with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many
2643:
CFB, OFB and CTR share two advantages over CBC mode: the block cipher is only ever used in the encrypting direction, and the message does not need to be padded to a multiple of the cipher block size (though
338:
Some modes (such as AES-SIV and AES-GCM-SIV) are built to be more nonce-misuse resistant, i.e. resilient to scenarios in which the randomness generation is faulty or under the control of the attacker.
731:
Many modes of operation have been defined. Some of these are described below. The purpose of cipher modes is to mask patterns which exist in encrypted data, as illustrated in the description of the
2628:
recommendation, the synchronization must be restored externally." (NIST SP800-38A). I.e. 1-bit loss in a 128-bit-wide block cipher like AES will render 129 invalid bits before emitting valid bits.
3217:, CBC can be decrypted in the attack by guessing encryption secrets based on error responses. The Padding Oracle attack variant "CBC-R" (CBC Reverse) lets the attacker construct any valid message. 2203:{\displaystyle {\begin{aligned}C_{i}&={\begin{cases}{\text{IV}},&i=0\\E_{K}(C_{i-1})\oplus P_{i},&{\text{otherwise}}\end{cases}}\\P_{i}&=E_{K}(C_{i-1})\oplus C_{i},\end{aligned}}} 2014: 1944:
On a message encrypted in PCBC mode, if two adjacent ciphertext blocks are exchanged, this does not affect the decryption of subsequent blocks. For this reason, PCBC is not used in Kerberos v5.
1450: 1326: 397:
to bring its length up to a multiple of the block size, but care must be taken that the original length of the plaintext can be recovered; this is trivial, for example, if the plaintext is a
3431:
benefit from an IV input, for example in the maximum amount of data that can be safely encrypted with one key, while not failing catastrophically if the same IV is used multiple times.
3364:
However, when proper integrity protection is used, such an error will result (with high probability) in the entire message being rejected. If resistance to random error is desirable,
2832: 2775: 1203:
with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an
1034:). The message is divided into blocks, and each block is encrypted separately. ECB is not recommended for use in cryptographic protocols: the disadvantage of this method is a lack of 96:
Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded
2892: 2981: 2304: 1104:
has supposedly been encrypted, the overall image may still be discerned, as the pattern of identically colored pixels in the original remains visible in the encrypted version.
3143:(IV) in the other diagrams. However, if the offset/location information is corrupt, it will be impossible to partially recover such data due to the dependence on byte offset. 2942: 1999:(CFB) mode, in its simplest form uses the entire output of the block cipher. In this variation, it is very similar to CBC, turning a block cipher into a self-synchronizing 433:
suggest two possibilities, both simple: append a byte with value 128 (hex 80), followed by as many zero bytes as needed to fill the last block, or pad the last block with
4199:
William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining", US Patent 4074066, 1976.
1621:
initialization vector is used in the first block. Unlike CBC, decrypting PCBC with the incorrect IV (initialization vector) causes all blocks of plaintext to be corrupt.
1490: 1366: 1546:
the IV for the decryption of the current one. This means that a plaintext block can be recovered from two adjacent blocks of ciphertext. As a consequence, decryption
89:
to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a
69:(IV), for each encryption operation. The IV must be non-repeating, and for some modes must also be random. The initialization vector is used to ensure that distinct 3656: 2640:
Like CBC mode, changes in the plaintext propagate forever in the ciphertext, and encryption cannot be parallelized. Also like CBC, decryption can be parallelized.
167:
provide confidentiality, but they do not protect against accidental modification or malicious tampering. Modification or tampering can be detected with a separate
4460: 6985: 6815: 3452: 2522: 2416: 350:
AES-GCM-SIVs synthesize an internal IV by running POLYVAL Galois mode of authentication on input (additional data and plaintext), followed by an AES operation.
4555:. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. 4 January 2017. 145: 4094: 1801: 1668: 472:
A number of modes of operation have been designed to combine secrecy and authentication in a single cryptographic primitive. Examples of such modes are ,
417:
to fill out the block; if the message ends on a block boundary, a whole padding block will be added. Most sophisticated are CBC-specific schemes such as
444:
CFB, OFB and CTR modes do not require any special measures to handle messages whose lengths are not multiples of the block size, since the modes work by
271: 62:. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block. 3191:"Error propagation" properties describe how a decryption behaves during bit errors, i.e. how error in one bit cascades to different decrypted bits. 645:
algorithm designed to provide both authentication and confidentiality. CCM mode is only defined for block ciphers with a block length of 128 bits.
335:
all zero initialization vector will generate no encryption for 1/256 of keys. OFB-8 encryption returns the plaintext unencrypted for affected keys.
85:, but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the final data fragment be 323:
For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages.
1096:
A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext can be seen when ECB mode is used to encrypt a
693:, naming schemes for SIV AEAD-variants may lead to some confusion; for example AEAD_AES_SIV_CMAC_256 refers to AES-SIV with two AES-128 keys and 313:. Some block ciphers have particular problems with certain initialization vectors, such as all zero IV generating no encryption (for some keys). 2310: 258:
Modes of operation are defined by a number of national and internationally recognized standards bodies. Notable standards organizations include
54:. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of 4556: 3927: 3584: 263: 259: 129: 4354: 4291: 6653: 5583: 3422:
plaintexts, a clear misuse of a stream, with a catastrophic loss of security. Deterministic authenticated encryption modes such as the NIST
3361:
errors (e.g., line noise), while others argued that error correcting increased the scope for attackers to maliciously tamper with a message.
1199:
Ehrsam, Meyer, Smith and Tuchman invented the cipher block chaining (CBC) mode of operation in 1976. In CBC mode, each block of plaintext is
656:
SIV synthesizes an internal IV using the pseudorandom function S2V. S2V is a keyed hash is based on CMAC, and the input to the function is:
6573: 5522: 4603: 4243: 3721: 507:(authenticated encryption with associated data) schemes. For example, EAX mode is a double-pass AEAD scheme while OCB mode is single-pass. 5961: 3411: 3407: 3395: 5990: 448:
the plaintext with the output of the block cipher. The last partial block of plaintext is XORed with the first few bytes of the last
5828: 3394:
Disk encryption often uses special purpose modes specifically designed for the application. Tweakable narrow-block encryption modes (
267: 7033: 3525: 624:
that can be used to verify the integrity of the data. The encrypted text then contains the IV, ciphertext, and authentication tag.
575:
Like in CTR, blocks are numbered sequentially, and then this block number is combined with an IV and encrypted with a block cipher
179:. The cryptographic community recognized the need for dedicated integrity assurances and NIST responded with HMAC, CMAC, and GMAC. 5349: 4705: 316:
It is recommended to review relevant IV requirements for the particular block cipher mode in relevant specification, for example
3378: 6589: 5339: 4833: 3871: 3747: 3691: 3559: 275: 5502: 5476: 5344: 5240: 504: 4500: 3644: 6350: 5317: 3856:. Fast Software Encryption 2001. Lecture Notes in Computer Science. Vol. 2355. Berlin: Springer. pp. 92–108. 1377: 1253: 6517: 4453: 3776: 7038: 6646: 5890: 5576: 4184: 4157: 4130: 3623: 3210: 382: 378: 120:
The earliest modes of operation, ECB, CBC, OFB, and CFB (see below for all), date back to 1981 and were specified in
4399:
Davies, D. W.; Parkin, G. I. P. (1983). "The average cycle size of the key stream in output feedback encipherment".
3206:
Specific bit errors in stream cipher modes (OFB, CTR, etc.) are trivial. They affect only the specific bit intended.
3036:
maximum can be achieved. For this reason, support for truncated feedback was removed from the specification of OFB.
5486: 4596: 4530: 1542:. Note that a one-bit change in a plaintext or initialization vector (IV) affects all following ciphertext blocks. 5954: 5365: 4209: 4018: 3958: 279: 3670:
Conrad, Eric; Misenar, Seth; Feldman, Joshua (2017-01-01), Conrad, Eric; Misenar, Seth; Feldman, Joshua (eds.),
6864: 6795: 6558: 6043: 5995: 5885: 4433: 4408: 4306: 4274: 4083: 3918: 503:
In addition, some modes also allow for the authentication of unencrypted associated data, and these are called
317: 236: 228: 208: 196: 149: 137: 2781: 2724: 6345: 3991:"Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES)" 3792:"Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)" 6639: 6563: 5569: 4633: 3711: 3574: 3515: 3497: 3446: 3226: 154:
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
133: 6980: 6935: 6738: 6332: 5974: 5970: 5429: 4589: 3487: 3458: 3442: 2838: 168: 3671: 2948: 2271: 6859: 5947: 5859: 5718: 5446: 5356: 5334: 4647: 3920:
Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
422: 3848: 6975: 6228: 5451: 5307: 5260: 4735: 370: 82: 6033: 4552: 3576: 2898: 2039: 6965: 6955: 6810: 6568: 6404: 6103: 6098: 5854: 5517: 5399: 5274: 4643: 4333: 4312: 3492: 3222: 642: 497: 467: 406: 398: 220: 109: 6960: 6950: 6743: 6703: 6696: 6681: 6676: 6491: 6311: 5456: 5245: 4616: 3399: 3128: 1035: 617: 4235: 3713: 3615: 3608: 6748: 6691: 6599: 5985: 5548: 5424: 5419: 5371: 3645:"ISO/IEC 10116:2006 – Information technology – Security techniques – Modes of operation for an 3435: 3415: 2003:. CFB decryption in this variation is almost identical to CBC encryption performed in reverse: 1456: 1332: 386: 360: 344: 184: 86: 4385: 2718:
Because of the symmetry of the XOR operation, encryption and decryption are exactly the same:
156:. Other confidentiality modes exist which have not been approved by NIST. For example, CTS is 7008: 6854: 6800: 6614: 6264: 6218: 6108: 6066: 6051: 5926: 5900: 5753: 5538: 5361: 5220: 4798: 4373: 3365: 3214: 3140: 2712: 1552: 1204: 674:
SIV encrypts the S2V output and the plaintext using AES-CTR, keyed with the encryption key (K
291: 66: 3198:
Random bit errors occur independently in any bit position with an expected probability of ½.
6970: 6894: 6284: 6188: 6138: 6113: 5921: 5441: 5324: 5250: 4933: 4913: 4032: 3972: 565: 121: 97: 59: 43: 3213:
may intelligently combine many different specific bit errors to break the cipher mode. In
8: 6723: 6609: 6486: 6435: 6374: 6274: 6193: 6153: 6133: 5849: 5404: 5381: 4700: 3470: 3136: 2645: 2617:{\displaystyle P_{i}=\operatorname {MSB} _{s}{\big (}E_{K}(I_{i-1}){\big )}\oplus C_{i},} 2511:{\displaystyle C_{i}=\operatorname {MSB} _{s}{\big (}E_{K}(I_{i-1}){\big )}\oplus P_{i},} 1934: 1539: 516: 493: 425:, which do not cause any extra ciphertext, at the expense of some additional complexity. 418: 302: 232: 204: 157: 4334:"SP 800-38A, Recommendation for Block Cipher Modes of Operation: Methods and Techniques" 3517: 6839: 6823: 6765: 6543: 6527: 6476: 6061: 5916: 5389: 5297: 5009: 4938: 4908: 4853: 3683: 1149:
ECB mode can also make protocols without integrity protection even more susceptible to
627: 621: 78: 3888: 3605: 3194:
Bit errors may occur intentionally in attacks or randomly due to transmission errors.
405:
which contains no null bytes except at the end. Slightly more complex is the original
213:
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
6899: 6889: 6755: 6420: 5109: 4808: 4768: 4763: 4730: 4690: 4638: 4429: 4404: 4302: 4270: 4180: 4153: 4126: 3867: 3687: 3619: 3555: 977: 653:
Synthetic initialization vector (SIV) is a nonce-misuse resistant block cipher mode.
176: 1923:{\displaystyle P_{i}=D_{K}(C_{i})\oplus P_{i-1}\oplus C_{i-1},P_{0}\oplus C_{0}=IV.} 1790:{\displaystyle C_{i}=E_{K}(P_{i}\oplus P_{i-1}\oplus C_{i-1}),P_{0}\oplus C_{0}=IV,} 201:
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
6834: 6686: 6507: 6461: 6223: 5698: 5481: 5376: 5255: 5114: 4994: 4963: 4657: 4424:
Jueneman, Robert R. (1983). "Analysis of certain aspects of output feedback mode".
4344: 4022: 3962: 3931: 3897: 3857: 3844: 3679: 3201:
Specific bit errors occur in the same bit position(s) as the original bit error(s).
3112: 564:
advantage of parallel processing and implementing GCM can make efficient use of an
100:
as an entirely separate cryptographic goal. Some modern modes of operation combine
3743: 595: 6522: 6471: 6466: 6254: 5969: 5818: 5813: 5788: 5662: 5328: 5312: 5301: 5235: 5194: 5159: 5089: 5069: 4943: 4823: 4818: 4773: 4174: 4147: 4120: 3850:
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
3482: 101: 47: 5616: 4035: 4012: 3975: 3952: 3712:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
3575:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
3516:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
1100:
which contains large areas of uniform color. While the color of each individual
6909: 6829: 6785: 6728: 6713: 6512: 6240: 5880: 5733: 5688: 5466: 5414: 5225: 5210: 5149: 5144: 5029: 4778: 4492: 3896:. Eurocrypt 2001. Lecture Notes in Computer Science. Vol. 2045. Springer. 3791: 3116: 1247:
If the first block has index 1, the mathematical formula for CBC encryption is
569: 453:
transmit data in streaming form where it is inconvenient to add padding bytes.
430: 426: 402: 390: 105: 51: 20: 3817: 343:
Synthetic initialization vectors (SIV) synthesize an internal IV by running a
26: 7027: 6990: 6945: 6904: 6884: 6775: 6733: 6708: 6604: 6481: 5833: 5793: 5773: 5763: 5728: 5592: 5461: 5409: 5288: 5270: 5059: 5034: 5024: 4848: 4838: 4685: 3902: 3357:(Source: SP800-38A Table D.2: Summary of Effect of Bit Errors on Decryption) 3100: 2699: 2000: 1150: 461: 305:. Many block cipher modes have stronger requirements, such as the IV must be 90: 6183: 4349: 3936: 3862: 3770: 6940: 6780: 6770: 6760: 6718: 6662: 5394: 5215: 5179: 5044: 4923: 4878: 4710: 4662: 4612: 3096: 1097: 445: 366: 310: 39: 4454:"Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption" 2405:{\displaystyle I_{i}={\big (}(I_{i-1}\ll s)+C_{i}{\big )}{\bmod {2}}^{b},} 660:
Additional authenticated data (zero, one or many AAD fields are supported)
6919: 6594: 6440: 6369: 6365: 5768: 5626: 5004: 4999: 4883: 3466: 3428: 705: 248: 4522: 6879: 6849: 6844: 6805: 5895: 5436: 5154: 5094: 4978: 4973: 4918: 4788: 4651: 1043: 609: 70: 4213: 4119:
Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (2018).
3990: 3552:
Cryptography Engineering: Design Principles and Practical Applications
6869: 6269: 6148: 5808: 5738: 5672: 5169: 5164: 5054: 4968: 4863: 4843: 4027: 3967: 3772:
Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures
3104: 2703: 2265:
These modes will truncate the output of the underlying block cipher.
1524: 1039: 449: 394: 74: 6056: 4269:(2nd ed.). Upper Saddle River, NJ: Prentice Hall. p. 319. 1136: 1124: 1038:, wherein it fails to hide data patterns when it encrypts identical 628:
Counter with cipher block chaining message authentication code (CCM)
385:) require that the final block be padded before encryption. Several 377:), but messages come in a variety of lengths. So some modes (namely 132:(NIST) revised its list of approved modes of operation by including 6914: 6874: 6548: 6445: 6430: 6425: 6415: 6379: 6299: 6213: 6093: 5621: 5507: 5471: 5265: 4928: 4803: 4783: 4695: 4236:"Kryptographie FAQ: Frage 84: What are the Counter and PCBC Modes?" 4057: 3606:
Alfred J. Menezes; Paul C. van Oorschot; Scott A. Vanstone (1996).
3423: 3403: 3170: 3156: 1031: 633: 489: 485: 481: 477: 252: 244: 240: 224: 164: 19:"Mode of operation" redirects here. For "method of operation", see 1648: 1634: 6384: 6340: 6118: 5667: 5641: 5174: 5124: 5084: 5074: 5019: 5014: 4858: 4667: 3549: 3462: 3371: 3013: 2999: 2237: 2223: 1510: 1234: 1220: 1076: 1062: 172: 4176:
Applied Cryptography: Protocols, Algorithms and Source Code in C
500:
modes are classified as single-pass modes or double-pass modes.
6790: 6553: 6294: 6289: 6259: 6249: 6208: 6203: 6198: 6178: 6173: 6143: 6128: 6088: 5758: 5723: 5693: 5657: 5512: 5134: 5129: 5064: 5049: 5039: 4984: 4958: 4953: 4948: 4828: 4813: 3822: 1556: 306: 5783: 5778: 4292:"The Use of Encryption in Kerberos for Network Authentication" 3441:
There are several schemes which use a block cipher to build a
639:
Counter with cipher block chaining message authentication code
6279: 6168: 6123: 6071: 6028: 6023: 6017: 5803: 5230: 5189: 5139: 5119: 5104: 4893: 4873: 4793: 4758: 2384: 2261:
8-bit CFB mode, the 64-bit CFB mode, or the 128-bit CFB mode.
1938: 1101: 81:. Block ciphers may be capable of operating on more than one 65:
Most modes require a unique binary sequence, often called an
4056:
Gueron, Shay; Langley, Adam; Lindell, Yehuda (14 Dec 2018).
4014:
AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
2648:
can also be used for CBC mode to make padding unnecessary).
160:
mode and available in many popular cryptographic libraries.
6394: 6389: 6360: 6355: 6319: 5823: 5798: 5748: 5743: 5611: 5606: 5079: 4988: 4903: 4898: 4888: 4868: 4740: 4725: 4477:
Ferguson, Niels; Schneier, Bruce; Kohno, Tadayoshi (2010).
4118: 3384: 3209:
Specific bit errors in more complex modes such (e.g. CBC):
2123: 1569: 1153:, since each block gets decrypted in exactly the same way. 192: 180: 3414:) are designed to securely encrypt sectors of a disk (see 2715:
to function normally even when applied before encryption.
719:
is an improvement over the very similarly named algorithm
462:
Authenticated encryption with additional data (AEAD) modes
6163: 6158: 6011: 5631: 5184: 5099: 4720: 4715: 4210:"The Transport Layer Security (TLS) Protocol Version 1.1" 3951:
Whiting, D.; Housley, R.; Ferguson, N. (September 2003).
3368:
should be applied to the ciphertext before transmission.
2707: 1200: 568:
or a hardware pipeline. The CBC mode of operation incurs
414: 410: 55: 30:
Six common block cipher modes of operation for encrypting
4452:
Lipmaa, Helger; Wagner, David; Rogaway, Phillip (2000).
4327: 4325: 3554:. Indianapolis: Wiley Publishing, Inc. pp. 63, 64. 3387:
maintains a list of proposed modes for block ciphers at
648: 77:
is encrypted multiple times independently with the same
4149:
Cryptography's Role in Securing the Information Society
3453:
Cryptographically secure pseudorandom number generators
608:
The ciphertext blocks are considered coefficients of a
6816:
Cryptographically secure pseudorandom number generator
4264: 3950: 3509: 2253: 1112: 685:
Owing to the use of two keys, the authentication key K
4476: 4322: 2951: 2901: 2841: 2784: 2727: 2525: 2419: 2313: 2274: 2012: 1804: 1671: 1662:
Encryption and decryption algorithms are as follows:
1459: 1380: 1371:
while the mathematical formula for CBC decryption is
1335: 1256: 4611: 4573: 4553:"Modes Development – Block Cipher Techniques – CSRC" 4084:"Recommendation for Block Cipher Modes of Operation" 4055: 3669: 3132:
the same IV–counter pair, would decrypt that block.
219:
algorithm). These combined modes are referred to as
163:
The block cipher modes ECB, CBC, OFB, CFB, CTR, and
4451: 3890:
Encryption Modes with Almost Free Message Integrity
2698:(OFB) mode makes a block cipher into a synchronous 3607: 3568: 2975: 2936: 2886: 2826: 2769: 2616: 2510: 2404: 2298: 2202: 1922: 1789: 1484: 1444: 1360: 1320: 142:Recommendation for Block Cipher Modes of Operation 4447: 4445: 3705: 3455:(CSPRNGs) can also be built using block ciphers. 1445:{\displaystyle P_{i}=D_{K}(C_{i})\oplus C_{i-1},} 1321:{\displaystyle C_{i}=E_{K}(P_{i}\oplus C_{i-1}),} 612:which is then evaluated at a key-dependent point 189:The Keyed-Hash Message Authentication Code (HMAC) 7025: 4426:Advances in Cryptology, Proceedings of CRYPTO 82 4401:Advances in Cryptology, Proceedings of CRYPTO 82 1142:Modes other than ECB result in pseudo-randomness 1130:Using ECB allows patterns to be easily discerned 4265:Kaufman, C.; Perlman, R.; Speciner, M. (2002). 3926:(Technical report). NIST Special Publications. 3028:once the plaintext or ciphertext is available. 4442: 3910: 3847:; Donescu, Pompiliu (2002). Matsui, M. (ed.). 3550:Ferguson, N.; Schneier, B.; Kohno, T. (2010). 3372:Other modes and other cryptographic primitives 2635: 1941:, most notably, but otherwise is not common. 1530:CBC decryption example with a toy 2-bit cipher 1516:CBC encryption example with a toy 2-bit cipher 1156: 1030:(ECB) mode (named after conventional physical 476:, integrity-aware parallelizable mode (IAPM), 130:National Institute of Standards and Technology 115: 6647: 5955: 5577: 4597: 3843: 3818:"Netlogon CFB8 considered harmful. OFB8 also" 2593: 2554: 2487: 2448: 2377: 2329: 2258:NIST SP800-38A defines CFB with a bit-width. 726: 620:. The result is then encrypted, producing an 474:integrity-aware cipher block chaining (IACBC) 285: 4403:. New York: Plenum Press. pp. 263–282. 4398: 3672:"Chapter 3 - Domain 3: Security engineering" 1026:The simplest of the encryption modes is the 983: 572:that hamper its efficiency and performance. 223:, AE or "authenc". Examples of AE modes are 4428:. New York: Plenum Press. pp. 99–127. 3944: 3639: 3637: 3635: 3461:(MACs) are often built from block ciphers. 976:) is any deterministic function, often the 6654: 6640: 5962: 5948: 5584: 5570: 4604: 4590: 3768: 3545: 3543: 3449:for descriptions of several such methods. 1566:the decryption is the original plaintext. 4348: 4152:. National Academies Press. p. 132. 4146:Dam, Kenneth W.; Lin, Herbert S. (1996). 4058:"AES-GCM-SIV: Specification and Analysis" 4026: 3966: 3935: 3901: 3861: 136:as a block cipher and adding CTR mode in 4423: 4172: 3815: 3744:"Stream Cipher Reuse: A Graphic Example" 3632: 3434:Block ciphers can also be used in other 3245:Effect of bit errors in the IV or nonce 3230:traditional confidentiality-only modes. 2827:{\displaystyle P_{j}=C_{j}\oplus O_{j},} 2770:{\displaystyle C_{j}=P_{j}\oplus O_{j},} 2651: 1947: 1627:Propagating cipher block chaining (PCBC) 1570:Propagating cipher block chaining (PCBC) 144:. Finally, in January, 2010, NIST added 25: 4332:(NIST), Author: Morris Dworkin (2001). 3988: 3916: 3540: 3305:, …, until synchronization is restored 510: 389:schemes exist. The simplest is to add 7026: 4331: 4179:. John Wiley & Sons. p. 208. 4145: 4010: 3298:, …, until synchronization is restored 2632:to lose alignment with the encryptor) 108:in an efficient way, and are known as 6635: 5943: 5565: 4585: 4559:from the original on 4 September 2017 3886: 3528:from the original on November 6, 2012 3139:in this diagram is equivalent to the 3083:Note: CTR mode (CM) is also known as 649:Synthetic initialization vector (SIV) 409:method, which is to add a single one 4503:from the original on 24 October 2017 4289: 3789: 3750:from the original on 25 January 2015 3676:Eleventh Hour CISSP® (Third Edition) 3186: 4360:from the original on 28 August 2017 3406:) and wide-block encryption modes ( 2887:{\displaystyle O_{j}=E_{K}(I_{j}),} 2254:CFB-1, CFB-8, CFB-64, CFB-128, etc. 889:Plaintext XOR F(Y, Key); Ciphertext 13: 5591: 4533:from the original on 23 March 2018 4100:from the original on 29 March 2017 3779:from the original on June 30, 2012 3724:from the original on April 2, 2013 3684:10.1016/b978-0-12-811248-9.00003-6 3599: 3587:from the original on April 2, 2013 3377:for example key feedback mode and 2976:{\displaystyle I_{0}={\text{IV}}.} 2299:{\displaystyle I_{0}={\text{IV}}.} 641:(counter with CBC-MAC; CCM) is an 14: 7050: 4246:from the original on 16 July 2012 3211:adaptive chosen-ciphertext attack 1952: 1614:propagating cipher block chaining 1582:Propagating cipher block chaining 1207:must be used in the first block. 732: 7004: 7003: 6661: 4466:from the original on 2015-02-26. 4122:Handbook of Applied Cryptography 3887:Jutla, Charanjit S. (May 2001). 3746:. Cryptosmith LLC. 31 May 2008. 3659:from the original on 2012-03-17. 3610:Handbook of Applied Cryptography 3348:for bit error in counter block T 3258: 3169: 3155: 3039: 3012: 2998: 2243:Cipher feedback (CFB) decryption 2236: 2229:Cipher feedback (CFB) encryption 2222: 1647: 1633: 1523: 1509: 1233: 1219: 1135: 1123: 1111: 1075: 1061: 594: 73:are produced even when the same 7034:Block cipher modes of operation 4545: 4515: 4485: 4470: 4417: 4392: 4283: 4258: 4228: 4202: 4193: 4166: 4139: 4112: 4076: 4049: 4004: 3982: 3880: 3837: 3809: 3783: 3095:Like OFB, counter mode turns a 1618:plaintext cipher-block chaining 1563:Explicit initialization vectors 456: 6865:Information-theoretic security 6559:NIST hash function competition 3762: 3736: 3663: 2937:{\displaystyle I_{j}=O_{j-1},} 2878: 2865: 2588: 2569: 2482: 2463: 2359: 2334: 2177: 2158: 2094: 2075: 1841: 1828: 1746: 1695: 1417: 1404: 1312: 1280: 700: 36:block cipher mode of operation 1: 3989:Harkins, Dan (October 2008). 3503: 207:was formalized in 2007 under 6564:Password Hashing Competition 5975:message authentication codes 5971:Cryptographic hash functions 5876:block ciphers in stream mode 4212:. p. 20. Archived from 3917:Dworkin, Morris (May 2004). 3816:Blaufish (14 October 2020). 3678:, Syngress, pp. 47–93, 3498:One-way compression function 3459:Message authentication codes 3447:one-way compression function 3227:message authentication codes 38:is an algorithm that uses a 7: 6981:Message authentication code 6936:Cryptographic hash function 6739:Cryptographic hash function 6518:Merkle–Damgård construction 3769:B. Moeller (May 20, 2004), 3488:Message authentication code 3476: 3443:cryptographic hash function 3111:CTR mode was introduced by 2636:CFB compared to other modes 1213:Cipher block chaining (CBC) 1157:Cipher block chaining (CBC) 195:was released in 2005 under 169:message authentication code 116:History and standardization 10: 7055: 6860:Harvest now, decrypt later 5860:alternating step generator 4493:"Basic Block Cipher Modes" 4125:. CRC Press. p. 228. 3954:Counter with CBC-MAC (CCM) 1495: 727:Confidentiality only modes 631: 514: 465: 423:residual block termination 413:, followed by enough zero 369:works on units of a fixed 358: 354: 289: 286:Initialization vector (IV) 266:(with ISO/IEC 10116), the 18: 6999: 6976:Post-quantum cryptography 6928: 6669: 6631: 6582: 6536: 6500: 6454: 6403: 6331: 6308: 6237: 6081: 6042: 6004: 5981: 5939: 5909: 5868: 5842: 5711: 5681: 5650: 5640: 5599: 5561: 5531: 5495: 5487:Time/memory/data tradeoff 5284: 5203: 4749: 4676: 4624: 4581: 4577: 4062:Cryptology ePrint Archive 4011:Gueron, S. (April 2019). 3239:Effect of bit errors in C 3225:(AEAD) or protocols with 3089:segmented integer counter 3072: 3065:Decryption parallelizable 3064: 3057:Encryption parallelizable 3056: 3051: 3046: 2684: 2677:Decryption parallelizable 2676: 2669:Encryption parallelizable 2668: 2663: 2658: 1985: 1978:Decryption parallelizable 1977: 1970:Encryption parallelizable 1969: 1964: 1959: 1602: 1595:Decryption parallelizable 1594: 1587:Encryption parallelizable 1586: 1581: 1576: 1485:{\displaystyle C_{0}=IV.} 1361:{\displaystyle C_{0}=IV,} 1189: 1182:Decryption parallelizable 1181: 1174:Encryption parallelizable 1173: 1168: 1163: 1055:Electronic Codebook (ECB) 1016: 1009:Decryption parallelizable 1008: 1001:Encryption parallelizable 1000: 995: 990: 984:Electronic codebook (ECB) 747: 549: 542:Decryption parallelizable 541: 534:Encryption parallelizable 533: 528: 523: 7039:Cryptographic algorithms 6966:Quantum key distribution 6956:Authenticated encryption 6811:Random number generation 6312:key derivation functions 5855:self-shrinking generator 5275:Whitening transformation 4479:Cryptography Engineering 4173:Schneier, Bruce (2015). 3903:10.1007/3-540-44987-6_32 3493:Authenticated encryption 3338:Specific bit errors in P 3313:Specific bit errors in P 3289:Specific bit errors in P 3278:Specific bit errors in P 3272:Specific bit errors in P 3223:authenticated encryption 3103:. It generates the next 643:authenticated encryption 498:Authenticated encryption 468:Authenticated encryption 221:authenticated encryption 183:was approved in 2002 as 110:authenticated encryption 6961:Public-key cryptography 6951:Symmetric-key algorithm 6744:Key derivation function 6704:Cryptographic primitive 6697:Authentication protocol 6682:Outline of cryptography 6677:History of cryptography 6590:Hash-based cryptography 6492:Length extension attack 5246:Confusion and diffusion 4350:10.6028/NIST.SP.800-38A 4299:Proceedings, Crypto '89 3937:10.6028/NIST.SP.800-38C 3863:10.1007/3-540-45473-X_8 3653:ISO Standards Catalogue 3436:cryptographic protocols 3129:chosen-plaintext attack 2706:blocks, which are then 618:finite field arithmetic 6749:Secure Hash Algorithms 6692:Cryptographic protocol 6600:Message authentication 3614:. CRC Press. pp.  3416:disk encryption theory 3366:error-correcting codes 3344:Random bit errors in P 3319:Random bit errors in P 3301:Random bit errors in P 3294:Random bit errors in P 3267:Random bit errors in P 3253:Random bit errors in P 2977: 2938: 2888: 2828: 2771: 2713:error-correcting codes 2618: 2512: 2406: 2300: 2204: 1924: 1791: 1553:padding oracle attacks 1486: 1446: 1362: 1322: 1042:blocks into identical 361:Padding (cryptography) 345:pseudo-random function 126:DES Modes of Operation 31: 16:Cryptography algorithm 6855:End-to-end encryption 6801:Cryptojacking malware 5927:stream cipher attacks 5539:Initialization vector 3718:Cryptographic Toolkit 3581:Cryptographic Toolkit 3522:Cryptographic Toolkit 3215:Padding oracle attack 3141:initialization vector 2992:Output feedback (OFB) 2978: 2939: 2889: 2829: 2772: 2652:Output feedback (OFB) 2619: 2513: 2407: 2301: 2216:Cipher feedback (CFB) 2205: 1948:Cipher feedback (CFB) 1925: 1792: 1487: 1447: 1363: 1323: 1205:initialization vector 1169:Cipher block chaining 954:), Key); IV = token() 859:F(Y, Key); Ciphertext 815:F(Y, Key); Ciphertext 788:Cipher block chaining 666:Authentication key (K 437:bytes all with value 292:Initialization vector 67:initialization vector 29: 6971:Quantum cryptography 6895:Trusted timestamping 5922:correlation immunity 5318:3-subset MITM attack 4934:Intel Cascade Cipher 4914:Hasty Pudding cipher 4301:. Berlin: Springer. 3518:"Block cipher modes" 3085:integer counter mode 2949: 2899: 2839: 2782: 2725: 2523: 2417: 2311: 2272: 2010: 1802: 1669: 1654:PCBC mode decryption 1640:PCBC mode encryption 1457: 1378: 1333: 1254: 689:and encryption key K 588:Galois/Counter (GCM) 566:instruction pipeline 511:Galois/counter (GCM) 98:integrity protection 44:information security 6724:Cryptographic nonce 6487:Side-channel attack 5850:shrinking generator 5600:Widely used ciphers 5357:Differential-linear 4093:. NIST. p. 9. 4064:. Report (2017/168) 3176:CTR mode decryption 3162:CTR mode encryption 3019:OFB mode decryption 3005:OFB mode encryption 2646:ciphertext stealing 1540:ciphertext stealing 1240:CBC mode decryption 1226:CBC mode encryption 1082:ECB mode decryption 1068:ECB mode encryption 1028:electronic codebook 996:Electronic codebook 759:Electronic codebook 744: 601:GCM mode encryption 517:Galois/Counter Mode 419:ciphertext stealing 303:cryptographic nonce 158:ciphertext stealing 34:In cryptography, a 6840:Subliminal channel 6824:Pseudorandom noise 6766:Key (cryptography) 6544:CAESAR Competition 6528:HAIFA construction 6477:Brute-force attack 5917:correlation attack 5430:Differential-fault 4648:internal mechanics 4384:has generic name ( 3649:-bit block cipher" 3073:Random read access 2973: 2934: 2884: 2824: 2767: 2685:Random read access 2614: 2508: 2402: 2296: 2200: 2198: 2122: 1986:Random read access 1920: 1787: 1603:Random read access 1482: 1442: 1358: 1318: 1190:Random read access 1017:Random read access 742: 622:authentication tag 550:Random read access 128:. In 2001, the US 32: 7021: 7020: 7017: 7016: 6900:Key-based routing 6890:Trapdoor function 6756:Digital signature 6627: 6626: 6623: 6622: 6421:ChaCha20-Poly1305 6238:Password hashing/ 5935: 5934: 5707: 5706: 5557: 5556: 5544:Mode of operation 5221:Lai–Massey scheme 4497:www.quadibloc.com 4290:Kohl, J. (1990). 3873:978-3-540-43869-4 3845:Gligor, Virgil D. 3693:978-0-12-811248-9 3561:978-0-470-47424-2 3389:Modes Development 3355: 3354: 3187:Error propagation 3080: 3079: 2968: 2692: 2691: 2291: 2118: 2045: 1993: 1992: 1610: 1609: 1197: 1196: 1024: 1023: 978:identity function 966: 965: 743:Summary of modes 557: 556: 177:digital signature 7046: 7007: 7006: 6835:Insecure channel 6687:Classical cipher 6656: 6649: 6642: 6633: 6632: 6508:Avalanche effect 6462:Collision attack 6005:Common functions 5964: 5957: 5950: 5941: 5940: 5648: 5647: 5586: 5579: 5572: 5563: 5562: 5415:Power-monitoring 5256:Avalanche effect 4964:Khufu and Khafre 4617:security summary 4606: 4599: 4592: 4583: 4582: 4579: 4578: 4575: 4574: 4569: 4568: 4566: 4564: 4549: 4543: 4542: 4540: 4538: 4523:"Cryptography I" 4519: 4513: 4512: 4510: 4508: 4489: 4483: 4482: 4474: 4468: 4467: 4465: 4458: 4449: 4440: 4439: 4421: 4415: 4414: 4396: 4390: 4389: 4383: 4379: 4377: 4369: 4367: 4365: 4359: 4352: 4338: 4329: 4320: 4319: 4317: 4311:. Archived from 4296: 4287: 4281: 4280: 4267:Network Security 4262: 4256: 4255: 4253: 4251: 4232: 4226: 4225: 4223: 4221: 4206: 4200: 4197: 4191: 4190: 4170: 4164: 4163: 4143: 4137: 4136: 4116: 4110: 4109: 4107: 4105: 4099: 4088: 4080: 4074: 4073: 4071: 4069: 4053: 4047: 4046: 4044: 4042: 4030: 4028:10.17487/RFC8452 4008: 4002: 4001: 3999: 3997: 3986: 3980: 3979: 3970: 3968:10.17487/RFC3610 3948: 3942: 3941: 3939: 3925: 3914: 3908: 3907: 3905: 3895: 3884: 3878: 3877: 3865: 3855: 3841: 3835: 3834: 3832: 3830: 3813: 3807: 3806: 3804: 3802: 3787: 3781: 3780: 3766: 3760: 3759: 3757: 3755: 3740: 3734: 3733: 3731: 3729: 3709: 3703: 3702: 3701: 3700: 3667: 3661: 3660: 3641: 3630: 3629: 3613: 3603: 3597: 3596: 3594: 3592: 3577:"Proposed modes" 3572: 3566: 3565: 3547: 3538: 3537: 3535: 3533: 3513: 3233: 3232: 3173: 3159: 3113:Whitfield Diffie 3044: 3043: 3016: 3002: 2982: 2980: 2979: 2974: 2969: 2966: 2961: 2960: 2943: 2941: 2940: 2935: 2930: 2929: 2911: 2910: 2893: 2891: 2890: 2885: 2877: 2876: 2864: 2863: 2851: 2850: 2833: 2831: 2830: 2825: 2820: 2819: 2807: 2806: 2794: 2793: 2776: 2774: 2773: 2768: 2763: 2762: 2750: 2749: 2737: 2736: 2702:. It generates 2656: 2655: 2623: 2621: 2620: 2615: 2610: 2609: 2597: 2596: 2587: 2586: 2568: 2567: 2558: 2557: 2548: 2547: 2535: 2534: 2517: 2515: 2514: 2509: 2504: 2503: 2491: 2490: 2481: 2480: 2462: 2461: 2452: 2451: 2442: 2441: 2429: 2428: 2411: 2409: 2408: 2403: 2398: 2397: 2392: 2391: 2381: 2380: 2374: 2373: 2352: 2351: 2333: 2332: 2323: 2322: 2305: 2303: 2302: 2297: 2292: 2289: 2284: 2283: 2240: 2226: 2209: 2207: 2206: 2201: 2199: 2192: 2191: 2176: 2175: 2157: 2156: 2140: 2139: 2126: 2125: 2119: 2116: 2109: 2108: 2093: 2092: 2074: 2073: 2046: 2043: 2026: 2025: 1957: 1956: 1933:PCBC is used in 1929: 1927: 1926: 1921: 1907: 1906: 1894: 1893: 1881: 1880: 1862: 1861: 1840: 1839: 1827: 1826: 1814: 1813: 1796: 1794: 1793: 1788: 1774: 1773: 1761: 1760: 1745: 1744: 1726: 1725: 1707: 1706: 1694: 1693: 1681: 1680: 1651: 1637: 1574: 1573: 1527: 1513: 1491: 1489: 1488: 1483: 1469: 1468: 1451: 1449: 1448: 1443: 1438: 1437: 1416: 1415: 1403: 1402: 1390: 1389: 1367: 1365: 1364: 1359: 1345: 1344: 1327: 1325: 1324: 1319: 1311: 1310: 1292: 1291: 1279: 1278: 1266: 1265: 1237: 1223: 1161: 1160: 1139: 1127: 1115: 1079: 1065: 988: 987: 745: 741: 615: 598: 578: 521: 520: 475: 7054: 7053: 7049: 7048: 7047: 7045: 7044: 7043: 7024: 7023: 7022: 7013: 6995: 6924: 6665: 6660: 6619: 6578: 6537:Standardization 6532: 6523:Sponge function 6496: 6472:Birthday attack 6467:Preimage attack 6450: 6406: 6399: 6327: 6310: 6309:General purpose 6304: 6239: 6233: 6082:Other functions 6077: 6044:SHA-3 finalists 6038: 6000: 5977: 5968: 5931: 5905: 5864: 5838: 5703: 5677: 5636: 5595: 5590: 5553: 5527: 5496:Standardization 5491: 5420:Electromagnetic 5372:Integral/Square 5329:Piling-up lemma 5313:Biclique attack 5302:EFF DES cracker 5286: 5280: 5211:Feistel network 5199: 4824:CIPHERUNICORN-E 4819:CIPHERUNICORN-A 4751: 4745: 4678: 4672: 4626: 4620: 4610: 4572: 4562: 4560: 4551: 4550: 4546: 4536: 4534: 4521: 4520: 4516: 4506: 4504: 4491: 4490: 4486: 4475: 4471: 4463: 4456: 4450: 4443: 4436: 4422: 4418: 4411: 4397: 4393: 4381: 4380: 4371: 4370: 4363: 4361: 4357: 4336: 4330: 4323: 4315: 4309: 4294: 4288: 4284: 4277: 4263: 4259: 4249: 4247: 4240:www.iks-jena.de 4234: 4233: 4229: 4219: 4217: 4208: 4207: 4203: 4198: 4194: 4187: 4171: 4167: 4160: 4144: 4140: 4133: 4117: 4113: 4103: 4101: 4097: 4086: 4082: 4081: 4077: 4067: 4065: 4054: 4050: 4040: 4038: 4009: 4005: 3995: 3993: 3987: 3983: 3949: 3945: 3923: 3915: 3911: 3893: 3885: 3881: 3874: 3853: 3842: 3838: 3828: 3826: 3814: 3810: 3800: 3798: 3790:Tervoort, Tom. 3788: 3784: 3767: 3763: 3753: 3751: 3742: 3741: 3737: 3727: 3725: 3714:"Current modes" 3710: 3706: 3698: 3696: 3694: 3668: 3664: 3643: 3642: 3633: 3626: 3604: 3600: 3590: 3588: 3573: 3569: 3562: 3548: 3541: 3531: 3529: 3514: 3510: 3506: 3483:Disk encryption 3479: 3374: 3351: 3347: 3341: 3330: 3326: 3322: 3316: 3304: 3297: 3293: 3292: 3281: 3275: 3271: 3270: 3256: 3242: 3189: 3183: 3181: 3180: 3179: 3178: 3177: 3174: 3165: 3164: 3163: 3160: 3151: 3150: 3042: 3026: 3024: 3023: 3022: 3021: 3020: 3017: 3008: 3007: 3006: 3003: 2994: 2993: 2986: 2965: 2956: 2952: 2950: 2947: 2946: 2919: 2915: 2906: 2902: 2900: 2897: 2896: 2872: 2868: 2859: 2855: 2846: 2842: 2840: 2837: 2836: 2815: 2811: 2802: 2798: 2789: 2785: 2783: 2780: 2779: 2758: 2754: 2745: 2741: 2732: 2728: 2726: 2723: 2722: 2696:output feedback 2664:Output feedback 2654: 2638: 2605: 2601: 2592: 2591: 2576: 2572: 2563: 2559: 2553: 2552: 2543: 2539: 2530: 2526: 2524: 2521: 2520: 2499: 2495: 2486: 2485: 2470: 2466: 2457: 2453: 2447: 2446: 2437: 2433: 2424: 2420: 2418: 2415: 2414: 2393: 2387: 2383: 2382: 2376: 2375: 2369: 2365: 2341: 2337: 2328: 2327: 2318: 2314: 2312: 2309: 2308: 2288: 2279: 2275: 2273: 2270: 2269: 2256: 2250: 2248: 2247: 2246: 2245: 2244: 2241: 2232: 2231: 2230: 2227: 2218: 2217: 2197: 2196: 2187: 2183: 2165: 2161: 2152: 2148: 2141: 2135: 2131: 2128: 2127: 2121: 2120: 2115: 2113: 2104: 2100: 2082: 2078: 2069: 2065: 2062: 2061: 2050: 2042: 2035: 2034: 2027: 2021: 2017: 2013: 2011: 2008: 2007: 1997:cipher feedback 1965:Cipher feedback 1955: 1950: 1902: 1898: 1889: 1885: 1870: 1866: 1851: 1847: 1835: 1831: 1822: 1818: 1809: 1805: 1803: 1800: 1799: 1769: 1765: 1756: 1752: 1734: 1730: 1715: 1711: 1702: 1698: 1689: 1685: 1676: 1672: 1670: 1667: 1666: 1661: 1659: 1658: 1657: 1656: 1655: 1652: 1643: 1642: 1641: 1638: 1629: 1628: 1572: 1535: 1534: 1533: 1532: 1531: 1528: 1519: 1518: 1517: 1514: 1505: 1504: 1498: 1464: 1460: 1458: 1455: 1454: 1427: 1423: 1411: 1407: 1398: 1394: 1385: 1381: 1379: 1376: 1375: 1340: 1336: 1334: 1331: 1330: 1300: 1296: 1287: 1283: 1274: 1270: 1261: 1257: 1255: 1252: 1251: 1245: 1244: 1243: 1242: 1241: 1238: 1229: 1228: 1227: 1224: 1215: 1214: 1159: 1147: 1146: 1145: 1144: 1143: 1140: 1132: 1131: 1128: 1120: 1119: 1116: 1095: 1092: 1089: 1087: 1086: 1085: 1084: 1083: 1080: 1071: 1070: 1069: 1066: 1057: 1056: 1049: 986: 962: 957:Plaintext XOR Y 945: 929: 924:Plaintext XOR Y 920: 916: 909: 898:Output feedback 892: 886: 879: 868:Cipher feedback 862: 855: 848: 842:XOR (Ciphertext 841: 835: 824:Propagating CBC 818: 812: 805: 799: 783: 776: 770: 733:weakness of ECB 729: 703: 692: 688: 677: 669: 651: 636: 630: 613: 606: 605: 604: 603: 602: 599: 590: 589: 582: 576: 570:pipeline stalls 519: 513: 473: 470: 464: 459: 363: 357: 294: 288: 118: 102:confidentiality 48:confidentiality 24: 17: 12: 11: 5: 7052: 7042: 7041: 7036: 7019: 7018: 7015: 7014: 7012: 7011: 7000: 6997: 6996: 6994: 6993: 6988: 6986:Random numbers 6983: 6978: 6973: 6968: 6963: 6958: 6953: 6948: 6943: 6938: 6932: 6930: 6926: 6925: 6923: 6922: 6917: 6912: 6910:Garlic routing 6907: 6902: 6897: 6892: 6887: 6882: 6877: 6872: 6867: 6862: 6857: 6852: 6847: 6842: 6837: 6832: 6830:Secure channel 6827: 6821: 6820: 6819: 6808: 6803: 6798: 6793: 6788: 6786:Key stretching 6783: 6778: 6773: 6768: 6763: 6758: 6753: 6752: 6751: 6746: 6741: 6731: 6729:Cryptovirology 6726: 6721: 6716: 6714:Cryptocurrency 6711: 6706: 6701: 6700: 6699: 6689: 6684: 6679: 6673: 6671: 6667: 6666: 6659: 6658: 6651: 6644: 6636: 6629: 6628: 6625: 6624: 6621: 6620: 6618: 6617: 6612: 6607: 6602: 6597: 6592: 6586: 6584: 6580: 6579: 6577: 6576: 6571: 6566: 6561: 6556: 6551: 6546: 6540: 6538: 6534: 6533: 6531: 6530: 6525: 6520: 6515: 6513:Hash collision 6510: 6504: 6502: 6498: 6497: 6495: 6494: 6489: 6484: 6479: 6474: 6469: 6464: 6458: 6456: 6452: 6451: 6449: 6448: 6443: 6438: 6433: 6428: 6423: 6418: 6412: 6410: 6401: 6400: 6398: 6397: 6392: 6387: 6382: 6377: 6372: 6363: 6358: 6353: 6348: 6343: 6337: 6335: 6329: 6328: 6326: 6325: 6322: 6316: 6314: 6306: 6305: 6303: 6302: 6297: 6292: 6287: 6282: 6277: 6272: 6267: 6262: 6257: 6252: 6246: 6244: 6241:key stretching 6235: 6234: 6232: 6231: 6226: 6221: 6216: 6211: 6206: 6201: 6196: 6191: 6186: 6181: 6176: 6171: 6166: 6161: 6156: 6151: 6146: 6141: 6136: 6131: 6126: 6121: 6116: 6111: 6106: 6101: 6096: 6091: 6085: 6083: 6079: 6078: 6076: 6075: 6069: 6064: 6059: 6054: 6048: 6046: 6040: 6039: 6037: 6036: 6031: 6026: 6021: 6015: 6008: 6006: 6002: 6001: 5999: 5998: 5993: 5988: 5982: 5979: 5978: 5967: 5966: 5959: 5952: 5944: 5937: 5936: 5933: 5932: 5930: 5929: 5924: 5919: 5913: 5911: 5907: 5906: 5904: 5903: 5898: 5893: 5888: 5883: 5881:shift register 5878: 5872: 5870: 5866: 5865: 5863: 5862: 5857: 5852: 5846: 5844: 5840: 5839: 5837: 5836: 5831: 5826: 5821: 5816: 5811: 5806: 5801: 5796: 5791: 5786: 5781: 5776: 5771: 5766: 5761: 5756: 5751: 5746: 5741: 5736: 5731: 5726: 5721: 5715: 5713: 5709: 5708: 5705: 5704: 5702: 5701: 5696: 5691: 5685: 5683: 5679: 5678: 5676: 5675: 5670: 5665: 5660: 5654: 5652: 5645: 5638: 5637: 5635: 5634: 5629: 5624: 5619: 5614: 5609: 5603: 5601: 5597: 5596: 5593:Stream ciphers 5589: 5588: 5581: 5574: 5566: 5559: 5558: 5555: 5554: 5552: 5551: 5546: 5541: 5535: 5533: 5529: 5528: 5526: 5525: 5520: 5515: 5510: 5505: 5499: 5497: 5493: 5492: 5490: 5489: 5484: 5479: 5474: 5469: 5464: 5459: 5454: 5449: 5444: 5439: 5434: 5433: 5432: 5427: 5422: 5417: 5412: 5402: 5397: 5392: 5387: 5379: 5374: 5369: 5362:Distinguishing 5359: 5354: 5353: 5352: 5347: 5342: 5332: 5322: 5321: 5320: 5315: 5305: 5294: 5292: 5282: 5281: 5279: 5278: 5268: 5263: 5258: 5253: 5248: 5243: 5238: 5233: 5228: 5226:Product cipher 5223: 5218: 5213: 5207: 5205: 5201: 5200: 5198: 5197: 5192: 5187: 5182: 5177: 5172: 5167: 5162: 5157: 5152: 5147: 5142: 5137: 5132: 5127: 5122: 5117: 5112: 5107: 5102: 5097: 5092: 5087: 5082: 5077: 5072: 5067: 5062: 5057: 5052: 5047: 5042: 5037: 5032: 5027: 5022: 5017: 5012: 5007: 5002: 4997: 4992: 4981: 4976: 4971: 4966: 4961: 4956: 4951: 4946: 4941: 4936: 4931: 4926: 4921: 4916: 4911: 4906: 4901: 4896: 4891: 4886: 4881: 4876: 4871: 4866: 4861: 4856: 4854:Cryptomeria/C2 4851: 4846: 4841: 4836: 4831: 4826: 4821: 4816: 4811: 4806: 4801: 4796: 4791: 4786: 4781: 4776: 4771: 4766: 4761: 4755: 4753: 4747: 4746: 4744: 4743: 4738: 4733: 4728: 4723: 4718: 4713: 4708: 4703: 4698: 4693: 4688: 4682: 4680: 4674: 4673: 4671: 4670: 4665: 4660: 4655: 4641: 4636: 4630: 4628: 4622: 4621: 4609: 4608: 4601: 4594: 4586: 4571: 4570: 4544: 4514: 4484: 4469: 4441: 4434: 4416: 4409: 4391: 4321: 4318:on 2009-06-12. 4307: 4282: 4275: 4257: 4227: 4201: 4192: 4185: 4165: 4158: 4138: 4131: 4111: 4075: 4048: 4003: 3981: 3943: 3909: 3879: 3872: 3836: 3808: 3782: 3761: 3735: 3704: 3692: 3662: 3631: 3624: 3598: 3567: 3560: 3539: 3507: 3505: 3502: 3501: 3500: 3495: 3490: 3485: 3478: 3475: 3473:are examples. 3373: 3370: 3353: 3352: 3349: 3345: 3342: 3339: 3336: 3332: 3331: 3328: 3324: 3320: 3317: 3314: 3311: 3307: 3306: 3302: 3299: 3295: 3290: 3287: 3283: 3282: 3279: 3276: 3273: 3268: 3265: 3261: 3260: 3257: 3254: 3251: 3247: 3246: 3243: 3240: 3237: 3219: 3218: 3207: 3203: 3202: 3199: 3188: 3185: 3175: 3168: 3167: 3166: 3161: 3154: 3153: 3152: 3148: 3147: 3146: 3145: 3135:Note that the 3117:Martin Hellman 3093: 3092: 3078: 3077: 3074: 3070: 3069: 3066: 3062: 3061: 3058: 3054: 3053: 3049: 3048: 3041: 3038: 3018: 3011: 3010: 3009: 3004: 2997: 2996: 2995: 2991: 2990: 2989: 2988: 2984: 2983: 2972: 2964: 2959: 2955: 2944: 2933: 2928: 2925: 2922: 2918: 2914: 2909: 2905: 2894: 2883: 2880: 2875: 2871: 2867: 2862: 2858: 2854: 2849: 2845: 2834: 2823: 2818: 2814: 2810: 2805: 2801: 2797: 2792: 2788: 2777: 2766: 2761: 2757: 2753: 2748: 2744: 2740: 2735: 2731: 2690: 2689: 2686: 2682: 2681: 2678: 2674: 2673: 2670: 2666: 2665: 2661: 2660: 2653: 2650: 2637: 2634: 2625: 2624: 2613: 2608: 2604: 2600: 2595: 2590: 2585: 2582: 2579: 2575: 2571: 2566: 2562: 2556: 2551: 2546: 2542: 2538: 2533: 2529: 2518: 2507: 2502: 2498: 2494: 2489: 2484: 2479: 2476: 2473: 2469: 2465: 2460: 2456: 2450: 2445: 2440: 2436: 2432: 2427: 2423: 2412: 2401: 2396: 2390: 2386: 2379: 2372: 2368: 2364: 2361: 2358: 2355: 2350: 2347: 2344: 2340: 2336: 2331: 2326: 2321: 2317: 2306: 2295: 2287: 2282: 2278: 2255: 2252: 2242: 2235: 2234: 2233: 2228: 2221: 2220: 2219: 2215: 2214: 2213: 2212: 2211: 2210: 2195: 2190: 2186: 2182: 2179: 2174: 2171: 2168: 2164: 2160: 2155: 2151: 2147: 2144: 2142: 2138: 2134: 2130: 2129: 2124: 2114: 2112: 2107: 2103: 2099: 2096: 2091: 2088: 2085: 2081: 2077: 2072: 2068: 2064: 2063: 2060: 2057: 2054: 2051: 2049: 2041: 2040: 2038: 2033: 2030: 2028: 2024: 2020: 2016: 2015: 1991: 1990: 1987: 1983: 1982: 1979: 1975: 1974: 1971: 1967: 1966: 1962: 1961: 1954: 1953:Full-block CFB 1951: 1949: 1946: 1931: 1930: 1919: 1916: 1913: 1910: 1905: 1901: 1897: 1892: 1888: 1884: 1879: 1876: 1873: 1869: 1865: 1860: 1857: 1854: 1850: 1846: 1843: 1838: 1834: 1830: 1825: 1821: 1817: 1812: 1808: 1797: 1786: 1783: 1780: 1777: 1772: 1768: 1764: 1759: 1755: 1751: 1748: 1743: 1740: 1737: 1733: 1729: 1724: 1721: 1718: 1714: 1710: 1705: 1701: 1697: 1692: 1688: 1684: 1679: 1675: 1653: 1646: 1645: 1644: 1639: 1632: 1631: 1630: 1626: 1625: 1624: 1623: 1608: 1607: 1604: 1600: 1599: 1596: 1592: 1591: 1588: 1584: 1583: 1579: 1578: 1571: 1568: 1529: 1522: 1521: 1520: 1515: 1508: 1507: 1506: 1502: 1501: 1500: 1499: 1497: 1494: 1493: 1492: 1481: 1478: 1475: 1472: 1467: 1463: 1452: 1441: 1436: 1433: 1430: 1426: 1422: 1419: 1414: 1410: 1406: 1401: 1397: 1393: 1388: 1384: 1369: 1368: 1357: 1354: 1351: 1348: 1343: 1339: 1328: 1317: 1314: 1309: 1306: 1303: 1299: 1295: 1290: 1286: 1282: 1277: 1273: 1269: 1264: 1260: 1239: 1232: 1231: 1230: 1225: 1218: 1217: 1216: 1212: 1211: 1210: 1209: 1195: 1194: 1191: 1187: 1186: 1183: 1179: 1178: 1175: 1171: 1170: 1166: 1165: 1158: 1155: 1151:replay attacks 1141: 1134: 1133: 1129: 1122: 1121: 1118:Original image 1117: 1110: 1109: 1108: 1107: 1106: 1081: 1074: 1073: 1072: 1067: 1060: 1059: 1058: 1054: 1053: 1052: 1051: 1022: 1021: 1018: 1014: 1013: 1010: 1006: 1005: 1002: 998: 997: 993: 992: 985: 982: 964: 963: 958: 955: 941: 938: 935: 931: 930: 925: 922: 918: 911: 905: 902: 899: 895: 894: 890: 887: 881: 875: 872: 869: 865: 864: 860: 857: 850: 843: 837: 831: 828: 825: 821: 820: 816: 813: 807: 806:XOR Ciphertext 801: 795: 792: 789: 785: 784: 781: 778: 772: 766: 763: 760: 756: 755: 752: 749: 728: 725: 702: 699: 690: 686: 675: 672: 671: 667: 664: 661: 650: 647: 632:Main article: 629: 626: 600: 593: 592: 591: 587: 586: 585: 584: 555: 554: 551: 547: 546: 543: 539: 538: 535: 531: 530: 529:Galois/counter 526: 525: 515:Main article: 512: 509: 466:Main article: 463: 460: 458: 455: 359:Main article: 356: 353: 352: 351: 348: 290:Main article: 287: 284: 117: 114: 21:Modus operandi 15: 9: 6: 4: 3: 2: 7051: 7040: 7037: 7035: 7032: 7031: 7029: 7010: 7002: 7001: 6998: 6992: 6991:Steganography 6989: 6987: 6984: 6982: 6979: 6977: 6974: 6972: 6969: 6967: 6964: 6962: 6959: 6957: 6954: 6952: 6949: 6947: 6946:Stream cipher 6944: 6942: 6939: 6937: 6934: 6933: 6931: 6927: 6921: 6918: 6916: 6913: 6911: 6908: 6906: 6905:Onion routing 6903: 6901: 6898: 6896: 6893: 6891: 6888: 6886: 6885:Shared secret 6883: 6881: 6878: 6876: 6873: 6871: 6868: 6866: 6863: 6861: 6858: 6856: 6853: 6851: 6848: 6846: 6843: 6841: 6838: 6836: 6833: 6831: 6828: 6825: 6822: 6817: 6814: 6813: 6812: 6809: 6807: 6804: 6802: 6799: 6797: 6794: 6792: 6789: 6787: 6784: 6782: 6779: 6777: 6776:Key generator 6774: 6772: 6769: 6767: 6764: 6762: 6759: 6757: 6754: 6750: 6747: 6745: 6742: 6740: 6737: 6736: 6735: 6734:Hash function 6732: 6730: 6727: 6725: 6722: 6720: 6717: 6715: 6712: 6710: 6709:Cryptanalysis 6707: 6705: 6702: 6698: 6695: 6694: 6693: 6690: 6688: 6685: 6683: 6680: 6678: 6675: 6674: 6672: 6668: 6664: 6657: 6652: 6650: 6645: 6643: 6638: 6637: 6634: 6630: 6616: 6613: 6611: 6608: 6606: 6605:Proof of work 6603: 6601: 6598: 6596: 6593: 6591: 6588: 6587: 6585: 6581: 6575: 6572: 6570: 6567: 6565: 6562: 6560: 6557: 6555: 6552: 6550: 6547: 6545: 6542: 6541: 6539: 6535: 6529: 6526: 6524: 6521: 6519: 6516: 6514: 6511: 6509: 6506: 6505: 6503: 6499: 6493: 6490: 6488: 6485: 6483: 6482:Rainbow table 6480: 6478: 6475: 6473: 6470: 6468: 6465: 6463: 6460: 6459: 6457: 6453: 6447: 6444: 6442: 6439: 6437: 6434: 6432: 6429: 6427: 6424: 6422: 6419: 6417: 6414: 6413: 6411: 6408: 6405:Authenticated 6402: 6396: 6393: 6391: 6388: 6386: 6383: 6381: 6378: 6376: 6373: 6371: 6367: 6364: 6362: 6359: 6357: 6354: 6352: 6349: 6347: 6344: 6342: 6339: 6338: 6336: 6334: 6333:MAC functions 6330: 6323: 6321: 6318: 6317: 6315: 6313: 6307: 6301: 6298: 6296: 6293: 6291: 6288: 6286: 6283: 6281: 6278: 6276: 6273: 6271: 6268: 6266: 6263: 6261: 6258: 6256: 6253: 6251: 6248: 6247: 6245: 6242: 6236: 6230: 6227: 6225: 6222: 6220: 6217: 6215: 6212: 6210: 6207: 6205: 6202: 6200: 6197: 6195: 6192: 6190: 6187: 6185: 6182: 6180: 6177: 6175: 6172: 6170: 6167: 6165: 6162: 6160: 6157: 6155: 6152: 6150: 6147: 6145: 6142: 6140: 6137: 6135: 6132: 6130: 6127: 6125: 6122: 6120: 6117: 6115: 6112: 6110: 6107: 6105: 6102: 6100: 6097: 6095: 6092: 6090: 6087: 6086: 6084: 6080: 6073: 6070: 6068: 6065: 6063: 6060: 6058: 6055: 6053: 6050: 6049: 6047: 6045: 6041: 6035: 6032: 6030: 6027: 6025: 6022: 6020:(compromised) 6019: 6016: 6014:(compromised) 6013: 6010: 6009: 6007: 6003: 5997: 5996:Known attacks 5994: 5992: 5989: 5987: 5984: 5983: 5980: 5976: 5972: 5965: 5960: 5958: 5953: 5951: 5946: 5945: 5942: 5938: 5928: 5925: 5923: 5920: 5918: 5915: 5914: 5912: 5908: 5902: 5899: 5897: 5894: 5892: 5889: 5887: 5884: 5882: 5879: 5877: 5874: 5873: 5871: 5867: 5861: 5858: 5856: 5853: 5851: 5848: 5847: 5845: 5841: 5835: 5832: 5830: 5827: 5825: 5822: 5820: 5817: 5815: 5812: 5810: 5807: 5805: 5802: 5800: 5797: 5795: 5792: 5790: 5787: 5785: 5782: 5780: 5777: 5775: 5772: 5770: 5767: 5765: 5762: 5760: 5757: 5755: 5752: 5750: 5747: 5745: 5742: 5740: 5737: 5735: 5732: 5730: 5727: 5725: 5722: 5720: 5717: 5716: 5714: 5712:Other ciphers 5710: 5700: 5697: 5695: 5692: 5690: 5687: 5686: 5684: 5680: 5674: 5671: 5669: 5666: 5664: 5661: 5659: 5656: 5655: 5653: 5649: 5646: 5643: 5639: 5633: 5630: 5628: 5625: 5623: 5620: 5618: 5615: 5613: 5610: 5608: 5605: 5604: 5602: 5598: 5594: 5587: 5582: 5580: 5575: 5573: 5568: 5567: 5564: 5560: 5550: 5547: 5545: 5542: 5540: 5537: 5536: 5534: 5530: 5524: 5521: 5519: 5516: 5514: 5511: 5509: 5506: 5504: 5501: 5500: 5498: 5494: 5488: 5485: 5483: 5480: 5478: 5475: 5473: 5470: 5468: 5465: 5463: 5460: 5458: 5455: 5453: 5450: 5448: 5445: 5443: 5442:Interpolation 5440: 5438: 5435: 5431: 5428: 5426: 5423: 5421: 5418: 5416: 5413: 5411: 5408: 5407: 5406: 5403: 5401: 5398: 5396: 5393: 5391: 5388: 5386: 5385: 5380: 5378: 5375: 5373: 5370: 5367: 5363: 5360: 5358: 5355: 5351: 5348: 5346: 5343: 5341: 5338: 5337: 5336: 5333: 5330: 5326: 5323: 5319: 5316: 5314: 5311: 5310: 5309: 5306: 5303: 5299: 5296: 5295: 5293: 5290: 5289:cryptanalysis 5283: 5276: 5272: 5271:Key whitening 5269: 5267: 5264: 5262: 5259: 5257: 5254: 5252: 5249: 5247: 5244: 5242: 5239: 5237: 5234: 5232: 5229: 5227: 5224: 5222: 5219: 5217: 5214: 5212: 5209: 5208: 5206: 5202: 5196: 5193: 5191: 5188: 5186: 5183: 5181: 5178: 5176: 5173: 5171: 5168: 5166: 5163: 5161: 5158: 5156: 5153: 5151: 5148: 5146: 5143: 5141: 5138: 5136: 5133: 5131: 5128: 5126: 5123: 5121: 5118: 5116: 5113: 5111: 5108: 5106: 5103: 5101: 5098: 5096: 5093: 5091: 5088: 5086: 5083: 5081: 5078: 5076: 5073: 5071: 5068: 5066: 5063: 5061: 5060:New Data Seal 5058: 5056: 5053: 5051: 5048: 5046: 5043: 5041: 5038: 5036: 5033: 5031: 5028: 5026: 5023: 5021: 5018: 5016: 5013: 5011: 5008: 5006: 5003: 5001: 4998: 4996: 4993: 4990: 4986: 4982: 4980: 4977: 4975: 4972: 4970: 4967: 4965: 4962: 4960: 4957: 4955: 4952: 4950: 4947: 4945: 4942: 4940: 4937: 4935: 4932: 4930: 4927: 4925: 4922: 4920: 4917: 4915: 4912: 4910: 4907: 4905: 4902: 4900: 4897: 4895: 4892: 4890: 4887: 4885: 4882: 4880: 4877: 4875: 4872: 4870: 4867: 4865: 4862: 4860: 4857: 4855: 4852: 4850: 4847: 4845: 4842: 4840: 4837: 4835: 4832: 4830: 4827: 4825: 4822: 4820: 4817: 4815: 4812: 4810: 4807: 4805: 4802: 4800: 4799:BEAR and LION 4797: 4795: 4792: 4790: 4787: 4785: 4782: 4780: 4777: 4775: 4772: 4770: 4767: 4765: 4762: 4760: 4757: 4756: 4754: 4748: 4742: 4739: 4737: 4734: 4732: 4729: 4727: 4724: 4722: 4719: 4717: 4714: 4712: 4709: 4707: 4704: 4702: 4699: 4697: 4694: 4692: 4689: 4687: 4684: 4683: 4681: 4675: 4669: 4666: 4664: 4661: 4659: 4656: 4653: 4649: 4645: 4642: 4640: 4637: 4635: 4632: 4631: 4629: 4623: 4618: 4614: 4613:Block ciphers 4607: 4602: 4600: 4595: 4593: 4588: 4587: 4584: 4580: 4576: 4558: 4554: 4548: 4532: 4528: 4524: 4518: 4502: 4498: 4494: 4488: 4481:. p. 71. 4480: 4473: 4462: 4455: 4448: 4446: 4437: 4431: 4427: 4420: 4412: 4406: 4402: 4395: 4387: 4375: 4356: 4351: 4346: 4342: 4341:csrc.nist.gov 4335: 4328: 4326: 4314: 4310: 4304: 4300: 4293: 4286: 4278: 4272: 4268: 4261: 4245: 4241: 4237: 4231: 4216:on 2015-01-07 4215: 4211: 4205: 4196: 4188: 4186:9781119096726 4182: 4178: 4177: 4169: 4161: 4159:9780309054751 4155: 4151: 4150: 4142: 4134: 4132:9780429881329 4128: 4124: 4123: 4115: 4096: 4092: 4085: 4079: 4063: 4059: 4052: 4037: 4034: 4029: 4024: 4020: 4016: 4015: 4007: 3992: 3985: 3977: 3974: 3969: 3964: 3960: 3956: 3955: 3947: 3938: 3933: 3929: 3922: 3921: 3913: 3904: 3899: 3892: 3891: 3883: 3875: 3869: 3864: 3859: 3852: 3851: 3846: 3840: 3825: 3824: 3819: 3812: 3797: 3793: 3786: 3778: 3774: 3773: 3765: 3749: 3745: 3739: 3723: 3719: 3715: 3708: 3695: 3689: 3685: 3681: 3677: 3673: 3666: 3658: 3654: 3650: 3648: 3640: 3638: 3636: 3627: 3625:0-8493-8523-7 3621: 3617: 3612: 3611: 3602: 3586: 3582: 3578: 3571: 3563: 3557: 3553: 3546: 3544: 3527: 3523: 3519: 3512: 3508: 3499: 3496: 3494: 3491: 3489: 3486: 3484: 3481: 3480: 3474: 3472: 3468: 3464: 3460: 3456: 3454: 3450: 3448: 3444: 3439: 3437: 3432: 3430: 3425: 3419: 3417: 3413: 3409: 3405: 3401: 3397: 3392: 3390: 3386: 3382: 3380: 3369: 3367: 3362: 3358: 3343: 3337: 3334: 3333: 3318: 3312: 3309: 3308: 3300: 3288: 3285: 3284: 3277: 3266: 3263: 3262: 3252: 3249: 3248: 3244: 3238: 3235: 3234: 3231: 3228: 3224: 3216: 3212: 3208: 3205: 3204: 3200: 3197: 3196: 3195: 3192: 3184: 3172: 3158: 3149:Counter (CTR) 3144: 3142: 3138: 3133: 3130: 3124: 3120: 3118: 3114: 3109: 3106: 3102: 3101:stream cipher 3098: 3090: 3086: 3082: 3081: 3075: 3071: 3067: 3063: 3059: 3055: 3050: 3045: 3040:Counter (CTR) 3037: 3033: 3029: 3015: 3001: 2987: 2970: 2962: 2957: 2953: 2945: 2931: 2926: 2923: 2920: 2916: 2912: 2907: 2903: 2895: 2881: 2873: 2869: 2860: 2856: 2852: 2847: 2843: 2835: 2821: 2816: 2812: 2808: 2803: 2799: 2795: 2790: 2786: 2778: 2764: 2759: 2755: 2751: 2746: 2742: 2738: 2733: 2729: 2721: 2720: 2719: 2716: 2714: 2709: 2705: 2701: 2700:stream cipher 2697: 2687: 2683: 2679: 2675: 2671: 2667: 2662: 2657: 2649: 2647: 2641: 2633: 2629: 2611: 2606: 2602: 2598: 2583: 2580: 2577: 2573: 2564: 2560: 2549: 2544: 2540: 2536: 2531: 2527: 2519: 2505: 2500: 2496: 2492: 2477: 2474: 2471: 2467: 2458: 2454: 2443: 2438: 2434: 2430: 2425: 2421: 2413: 2399: 2394: 2388: 2370: 2366: 2362: 2356: 2353: 2348: 2345: 2342: 2338: 2324: 2319: 2315: 2307: 2293: 2285: 2280: 2276: 2268: 2267: 2266: 2263: 2262: 2251: 2239: 2225: 2193: 2188: 2184: 2180: 2172: 2169: 2166: 2162: 2153: 2149: 2145: 2143: 2136: 2132: 2110: 2105: 2101: 2097: 2089: 2086: 2083: 2079: 2070: 2066: 2058: 2055: 2052: 2047: 2036: 2031: 2029: 2022: 2018: 2006: 2005: 2004: 2002: 2001:stream cipher 1998: 1988: 1984: 1980: 1976: 1972: 1968: 1963: 1958: 1945: 1942: 1940: 1936: 1917: 1914: 1911: 1908: 1903: 1899: 1895: 1890: 1886: 1882: 1877: 1874: 1871: 1867: 1863: 1858: 1855: 1852: 1848: 1844: 1836: 1832: 1823: 1819: 1815: 1810: 1806: 1798: 1784: 1781: 1778: 1775: 1770: 1766: 1762: 1757: 1753: 1749: 1741: 1738: 1735: 1731: 1727: 1722: 1719: 1716: 1712: 1708: 1703: 1699: 1690: 1686: 1682: 1677: 1673: 1665: 1664: 1663: 1650: 1636: 1622: 1619: 1615: 1605: 1601: 1597: 1593: 1589: 1585: 1580: 1575: 1567: 1564: 1560: 1558: 1554: 1549: 1543: 1541: 1526: 1512: 1479: 1476: 1473: 1470: 1465: 1461: 1453: 1439: 1434: 1431: 1428: 1424: 1420: 1412: 1408: 1399: 1395: 1391: 1386: 1382: 1374: 1373: 1372: 1355: 1352: 1349: 1346: 1341: 1337: 1329: 1315: 1307: 1304: 1301: 1297: 1293: 1288: 1284: 1275: 1271: 1267: 1262: 1258: 1250: 1249: 1248: 1236: 1222: 1208: 1206: 1202: 1192: 1188: 1184: 1180: 1176: 1172: 1167: 1162: 1154: 1152: 1138: 1126: 1114: 1105: 1103: 1099: 1093: 1090: 1078: 1064: 1050: 1047: 1045: 1041: 1037: 1033: 1029: 1019: 1015: 1011: 1007: 1003: 999: 994: 989: 981: 979: 975: 971: 961: 956: 953: 949: 944: 939: 936: 933: 932: 928: 923: 914: 908: 903: 900: 897: 896: 888: 884: 878: 873: 870: 867: 866: 858: 853: 849:XOR PlainText 846: 840: 834: 829: 826: 823: 822: 814: 810: 804: 798: 793: 790: 787: 786: 779: 775: 771:= F(PlainText 769: 764: 761: 758: 757: 753: 750: 746: 740: 736: 734: 724: 722: 718: 714: 710: 707: 698: 696: 683: 679: 665: 662: 659: 658: 657: 654: 646: 644: 640: 635: 625: 623: 619: 611: 597: 583: 580: 573: 571: 567: 561: 552: 548: 544: 540: 536: 532: 527: 522: 518: 508: 506: 501: 499: 495: 491: 487: 483: 479: 469: 454: 451: 447: 442: 440: 436: 432: 428: 424: 420: 416: 412: 408: 404: 400: 396: 392: 388: 384: 380: 376: 372: 368: 362: 349: 346: 342: 341: 340: 336: 332: 328: 324: 321: 319: 314: 312: 308: 304: 298: 293: 283: 281: 277: 273: 269: 265: 261: 256: 254: 250: 246: 242: 238: 234: 230: 226: 222: 216: 214: 210: 206: 202: 198: 194: 190: 186: 182: 178: 174: 170: 166: 161: 159: 155: 151: 147: 143: 139: 135: 131: 127: 123: 113: 111: 107: 103: 99: 94: 92: 91:stream cipher 88: 84: 80: 76: 72: 68: 63: 61: 57: 53: 49: 45: 41: 37: 28: 22: 6941:Block cipher 6781:Key schedule 6771:Key exchange 6761:Kleptography 6719:Cryptosystem 6663:Cryptography 5875: 5543: 5447:Partitioning 5405:Side-channel 5383: 5350:Higher-order 5335:Differential 5216:Key schedule 4561:. Retrieved 4547: 4535:. Retrieved 4526: 4517: 4505:. Retrieved 4496: 4487: 4478: 4472: 4425: 4419: 4400: 4394: 4382:|first= 4374:cite journal 4362:. Retrieved 4340: 4313:the original 4298: 4285: 4266: 4260: 4248:. Retrieved 4239: 4230: 4218:. Retrieved 4214:the original 4204: 4195: 4175: 4168: 4148: 4141: 4121: 4114: 4102:. Retrieved 4090: 4078: 4066:. Retrieved 4061: 4051: 4039:. Retrieved 4013: 4006: 3994:. Retrieved 3984: 3953: 3946: 3919: 3912: 3889: 3882: 3849: 3839: 3827:. Retrieved 3821: 3811: 3799:. Retrieved 3795: 3785: 3771: 3764: 3752:. Retrieved 3738: 3726:. Retrieved 3717: 3707: 3697:, retrieved 3675: 3665: 3652: 3646: 3609: 3601: 3589:. Retrieved 3580: 3570: 3551: 3530:. Retrieved 3521: 3511: 3457: 3451: 3440: 3433: 3420: 3393: 3388: 3383: 3379:Davies–Meyer 3375: 3363: 3359: 3356: 3220: 3193: 3190: 3182: 3134: 3125: 3121: 3110: 3097:block cipher 3094: 3088: 3084: 3034: 3030: 3025: 2985: 2717: 2695: 2693: 2642: 2639: 2630: 2626: 2264: 2259: 2257: 2249: 1996: 1994: 1943: 1932: 1660: 1617: 1613: 1611: 1562: 1561: 1547: 1544: 1536: 1370: 1246: 1198: 1148: 1098:bitmap image 1094: 1091: 1088: 1048: 1027: 1025: 973: 969: 967: 959: 951: 947: 942: 926: 921:= F(IV, Key) 912: 906: 882: 880:= Ciphertext 876: 851: 844: 838: 832: 808: 802: 796: 773: 767: 737: 730: 720: 716: 715: 711: 704: 694: 684: 680: 673: 655: 652: 638: 637: 607: 581: 574: 562: 558: 502: 471: 457:Common modes 443: 438: 434: 374: 373:(known as a 367:block cipher 364: 337: 333: 329: 325: 322: 315: 311:pseudorandom 299: 295: 257: 217: 212: 200: 188: 162: 153: 141: 125: 119: 106:authenticity 95: 64: 52:authenticity 40:block cipher 35: 33: 6929:Mathematics 6920:Mix network 6595:Merkle tree 6583:Utilization 6569:NSA Suite B 5532:Utilization 5518:NSA Suite B 5503:AES process 5452:Rubber-hose 5390:Related-key 5298:Brute-force 4677:Less common 3429:AES-GCM-SIV 3221:For modern 3091:(SIC) mode. 1935:Kerberos v4 836:= PlainText 800:= PlainText 754:Ciphertext 717:AES-GCM-SIV 706:AES-GCM-SIV 701:AES-GCM-SIV 71:ciphertexts 42:to provide 7028:Categories 6880:Ciphertext 6850:Decryption 6845:Encryption 6806:Ransomware 6407:encryption 6184:RadioGatún 5991:Comparison 5896:T-function 5843:Generators 5719:Achterbahn 5482:Chi-square 5400:Rotational 5340:Impossible 5261:Block size 5155:Spectr-H64 4979:Ladder-DES 4974:Kuznyechik 4919:Hierocrypt 4789:BassOmatic 4752:algorithms 4679:algorithms 4652:Triple DES 4627:algorithms 4435:0306413663 4410:0306413663 4308:0387973176 4276:0130460192 4068:19 October 4041:August 14, 3996:21 October 3940:. 800-38C. 3829:14 October 3801:14 October 3699:2020-11-01 3504:References 3087:(ICM) and 1555:, such as 1044:ciphertext 610:polynomial 391:null bytes 375:block size 278:, and the 83:block size 6870:Plaintext 6324:KDF1/KDF2 6243:functions 6229:Whirlpool 5809:SOBER-128 5739:KCipher-2 5673:SOSEMANUK 5644:Portfolio 5457:Black-bag 5377:Boomerang 5366:Known-key 5345:Truncated 5170:Threefish 5165:SXAL/MBAL 5055:MultiSwap 5010:MacGuffin 4969:KN-Cipher 4909:Grand Cru 4864:CS-Cipher 4844:COCONUT98 4220:7 January 3754:7 January 3728:April 12, 3591:April 14, 3532:April 12, 3381:hashing. 3119:in 1979. 3105:keystream 2924:− 2809:⊕ 2752:⊕ 2704:keystream 2599:⊕ 2581:− 2550:⁡ 2493:⊕ 2475:− 2444:⁡ 2354:≪ 2346:− 2181:⊕ 2170:− 2117:otherwise 2098:⊕ 2087:− 1896:⊕ 1875:− 1864:⊕ 1856:− 1845:⊕ 1763:⊕ 1739:− 1728:⊕ 1720:− 1709:⊕ 1432:− 1421:⊕ 1305:− 1294:⊕ 1040:plaintext 1036:diffusion 1032:codebooks 946:= F(IV + 917:, Key); Y 697:AES-256. 663:Plaintext 450:keystream 395:plaintext 318:SP800-38A 237:SP800-38D 229:SP800-38C 209:SP800-38D 197:SP800-38B 150:SP800-38E 138:SP800-38A 75:plaintext 58:called a 7009:Category 6915:Kademlia 6875:Codetext 6818:(CSPRNG) 6796:Machines 6549:CRYPTREC 6380:Poly1305 6300:yescrypt 6214:Streebog 6094:CubeHash 6074:(winner) 5682:Hardware 5651:Software 5622:Crypto-1 5508:CRYPTREC 5472:Weak key 5425:Acoustic 5266:Key size 5110:Red Pike 4929:IDEA NXT 4809:Chiasmus 4804:CAST-256 4784:BaseKing 4769:Akelarre 4764:Adiantum 4731:Skipjack 4696:CAST-128 4691:Camellia 4639:Blowfish 4563:28 April 4557:Archived 4537:28 April 4531:Archived 4527:Coursera 4507:28 April 4501:Archived 4461:Archived 4364:28 April 4355:Archived 4250:28 April 4244:Archived 4095:Archived 4091:NIST.gov 3777:archived 3748:Archived 3722:Archived 3720:. NIST. 3657:Archived 3655:. 2006. 3585:Archived 3583:. NIST. 3526:Archived 3524:. NIST. 3477:See also 3424:Key Wrap 1046:blocks. 751:Formulas 634:CCM mode 616:, using 431:Ferguson 427:Schneier 185:FIPS 198 171:such as 46:such as 6670:General 6455:Attacks 6385:SipHash 6341:CBC-MAC 6275:LM hash 6255:Balloon 6119:HAS-160 5910:Attacks 5699:Trivium 5668:Salsa20 5642:eSTREAM 5549:Padding 5467:Rebound 5175:Treyfer 5125:SAVILLE 5085:PRESENT 5075:NOEKEON 5020:MAGENTA 5015:Madryga 4995:Lucifer 4859:CRYPTON 4668:Twofish 4658:Serpent 4104:1 April 3616:228–233 3463:CBC-MAC 3099:into a 3052:Counter 1503:Example 1496:Example 934:Counter 721:GCM-SIV 393:to the 387:padding 355:Padding 175:, or a 173:CBC-MAC 146:XTS-AES 122:FIPS 81 112:modes. 6791:Keygen 6615:Pepper 6554:NESSIE 6501:Design 6295:scrypt 6290:PBKDF2 6265:Catena 6260:bcrypt 6250:Argon2 6209:Snefru 6204:Shabal 6199:SWIFFT 6179:RIPEMD 6174:N-hash 6149:MASH-2 6144:MASH-1 6129:Kupyna 6089:BLAKE3 6072:Keccak 6057:Grøstl 6034:BLAKE2 5869:Theory 5819:Turing 5814:Spritz 5789:Scream 5759:Phelix 5754:Panama 5724:F-FCSR 5694:MICKEY 5663:Rabbit 5658:HC-128 5617:ChaCha 5513:NESSIE 5462:Davies 5410:Timing 5325:Linear 5285:Attack 5204:Design 5195:Zodiac 5160:Square 5135:SHACAL 5130:SC2000 5090:Prince 5070:Nimbus 5065:NewDES 5050:MULTI2 5040:MISTY1 4983:LOKI ( 4959:KHAZAD 4954:KeeLoq 4949:KASUMI 4944:Kalyna 4829:CLEFIA 4814:CIKS-1 4774:Anubis 4625:Common 4432:  4407:  4305:  4273:  4183:  4156:  4129:  3870:  3823:GitHub 3796:Secura 3690:  3622:  3558:  3445:. See 3402:, and 3327:, …, P 1557:POODLE 968:Note: 827:(PCBC) 777:, Key) 492:, and 446:XORing 403:string 401:style 307:random 270:, the 251:, and 203:, and 87:padded 6826:(PRN) 6409:modes 6285:Makwa 6280:Lyra2 6270:crypt 6219:Tiger 6169:MDC-2 6124:HAVAL 6109:Fugue 6067:Skein 6052:BLAKE 6029:SHA-3 6024:SHA-2 6018:SHA-1 5891:NLFSR 5804:SOBER 5734:ISAAC 5689:Grain 5395:Slide 5251:Round 5236:P-box 5231:S-box 5190:XXTEA 5150:Speck 5145:Simon 5140:SHARK 5120:SAFER 5105:REDOC 5030:Mercy 4989:89/91 4939:Iraqi 4904:G-DES 4894:FEA-M 4874:DES-X 4839:Cobra 4794:BATON 4779:Ascon 4759:3-Way 4750:Other 4464:(PDF) 4457:(PDF) 4358:(PDF) 4337:(PDF) 4316:(PDF) 4295:(PDF) 4098:(PDF) 4087:(PDF) 3924:(PDF) 3894:(PDF) 3854:(PDF) 3137:nonce 2708:XORed 1939:WASTE 1201:XORed 1102:pixel 937:(CTR) 910:= F(Y 901:(OFB) 893:= IV 871:(CFB) 863:= IV 819:= IV 791:(CBC) 762:(ECB) 60:block 6610:Salt 6574:CNSA 6441:IAPM 6395:VMAC 6390:UMAC 6375:PMAC 6370:CMAC 6366:OMAC 6361:NMAC 6356:HMAC 6351:GMAC 6320:HKDF 6189:SIMD 6139:Lane 6114:GOST 6099:ECOH 5986:List 5973:and 5886:LFSR 5834:WAKE 5829:VMPC 5824:VEST 5799:SNOW 5794:SEAL 5784:RC4A 5779:RC4+ 5774:QUAD 5764:Pike 5749:ORYX 5744:MUGI 5729:FISH 5612:A5/2 5607:A5/1 5523:CNSA 5382:Mod 5308:MITM 5080:NUSH 5035:MESH 5025:MARS 4899:FROG 4889:FEAL 4869:DEAL 4849:Crab 4834:CMEA 4741:XTEA 4726:SEED 4706:IDEA 4701:GOST 4686:ARIA 4565:2018 4539:2018 4509:2018 4430:ISBN 4405:ISBN 4386:help 4366:2018 4303:ISBN 4271:ISBN 4252:2018 4222:2015 4181:ISBN 4154:ISBN 4127:ISBN 4106:2017 4070:2020 4043:2019 4036:8452 4019:IETF 3998:2020 3976:3610 3959:IETF 3928:NIST 3868:ISBN 3831:2020 3803:2020 3756:2015 3730:2013 3688:ISBN 3620:ISBN 3593:2013 3556:ISBN 3534:2013 3471:PMAC 3469:and 3467:OMAC 3410:and 3385:NIST 3236:Mode 3115:and 2694:The 1995:The 1937:and 1612:The 1577:PCBC 748:Mode 505:AEAD 429:and 415:bits 381:and 371:size 280:IETF 276:ANSI 272:IEEE 260:NIST 249:IAPM 205:GMAC 193:CMAC 181:HMAC 104:and 56:bits 6446:OCB 6436:GCM 6431:EAX 6426:CWC 6416:CCM 6346:DAA 6224:VSH 6194:SM3 6164:MD6 6159:MD4 6154:MD2 6134:LSH 6104:FSB 6012:MD5 5632:RC4 5477:Tau 5437:XSL 5241:SPN 5185:xmx 5180:UES 5115:S-1 5100:RC2 5045:MMB 4924:ICE 4879:DFC 4736:TEA 4721:RC6 4716:RC5 4711:LEA 4663:SM4 4644:DES 4634:AES 4345:doi 4033:RFC 4023:doi 3973:RFC 3963:doi 3932:doi 3898:doi 3858:doi 3680:doi 3418:). 3412:EME 3408:CMC 3404:XTS 3400:XEX 3396:LRW 3335:CTR 3323:, P 3310:OFB 3296:i+1 3286:CFB 3274:i+1 3264:CBC 3250:ECB 3076:Yes 3068:Yes 3060:Yes 3047:CTR 2659:OFB 2541:MSB 2435:MSB 2385:mod 1989:Yes 1981:Yes 1960:CFB 1616:or 1548:can 1193:Yes 1185:Yes 1164:CBC 1020:Yes 1012:Yes 1004:Yes 991:ECB 695:not 678:). 553:Yes 545:Yes 537:Yes 524:GCM 494:GCM 490:CCM 486:CWC 482:EAX 478:OCB 421:or 411:bit 407:DES 383:CBC 379:ECB 309:or 268:IEC 264:ISO 253:OCB 245:EAX 241:CWC 239:), 233:GCM 231:), 225:CCM 165:XTS 148:in 134:AES 79:key 50:or 7030:: 6062:JH 5901:IV 5769:Py 5627:E0 5005:M8 5000:M6 4987:, 4985:97 4884:E2 4650:, 4529:. 4525:. 4499:. 4495:. 4459:. 4444:^ 4378:: 4376:}} 4372:{{ 4353:. 4343:. 4339:. 4324:^ 4297:. 4242:. 4238:. 4089:. 4060:. 4031:. 4021:. 4017:. 3971:. 3961:. 3957:. 3930:. 3866:. 3820:. 3794:. 3775:, 3716:. 3686:, 3674:, 3651:. 3634:^ 3618:. 3579:. 3542:^ 3520:. 3465:, 3398:, 3391:. 3259:— 2967:IV 2688:No 2680:No 2672:No 2290:IV 2044:IV 1973:No 1606:No 1598:No 1590:No 1559:. 1177:No 980:. 915:−1 885:−1 854:−1 847:−1 811:−1 735:. 670:). 496:. 488:, 484:, 480:, 441:. 365:A 320:. 282:. 274:, 262:, 255:. 247:, 243:, 215:. 211:, 199:, 191:, 187:, 152:, 140:, 124:, 93:. 6655:e 6648:t 6641:v 6368:/ 5963:e 5956:t 5949:v 5585:e 5578:t 5571:v 5384:n 5368:) 5364:( 5331:) 5327:( 5304:) 5300:( 5291:) 5287:( 5277:) 5273:( 5095:Q 4991:) 4654:) 4646:( 4619:) 4615:( 4605:e 4598:t 4591:v 4567:. 4541:. 4511:. 4438:. 4413:. 4388:) 4368:. 4347:: 4279:. 4254:. 4224:. 4189:. 4162:. 4135:. 4108:. 4072:. 4045:. 4025:: 4000:. 3978:. 3965:: 3934:: 3906:. 3900:: 3876:. 3860:: 3833:. 3805:. 3758:. 3732:. 3682:: 3647:n 3628:. 3595:. 3564:. 3536:. 3350:i 3346:i 3340:i 3329:n 3325:2 3321:1 3315:i 3303:1 3291:i 3280:1 3269:i 3255:i 3241:i 2971:. 2963:= 2958:0 2954:I 2932:, 2927:1 2921:j 2917:O 2913:= 2908:j 2904:I 2882:, 2879:) 2874:j 2870:I 2866:( 2861:K 2857:E 2853:= 2848:j 2844:O 2822:, 2817:j 2813:O 2804:j 2800:C 2796:= 2791:j 2787:P 2765:, 2760:j 2756:O 2747:j 2743:P 2739:= 2734:j 2730:C 2612:, 2607:i 2603:C 2594:) 2589:) 2584:1 2578:i 2574:I 2570:( 2565:K 2561:E 2555:( 2545:s 2537:= 2532:i 2528:P 2506:, 2501:i 2497:P 2488:) 2483:) 2478:1 2472:i 2468:I 2464:( 2459:K 2455:E 2449:( 2439:s 2431:= 2426:i 2422:C 2400:, 2395:b 2389:2 2378:) 2371:i 2367:C 2363:+ 2360:) 2357:s 2349:1 2343:i 2339:I 2335:( 2330:( 2325:= 2320:i 2316:I 2294:. 2286:= 2281:0 2277:I 2194:, 2189:i 2185:C 2178:) 2173:1 2167:i 2163:C 2159:( 2154:K 2150:E 2146:= 2137:i 2133:P 2111:, 2106:i 2102:P 2095:) 2090:1 2084:i 2080:C 2076:( 2071:K 2067:E 2059:0 2056:= 2053:i 2048:, 2037:{ 2032:= 2023:i 2019:C 1918:. 1915:V 1912:I 1909:= 1904:0 1900:C 1891:0 1887:P 1883:, 1878:1 1872:i 1868:C 1859:1 1853:i 1849:P 1842:) 1837:i 1833:C 1829:( 1824:K 1820:D 1816:= 1811:i 1807:P 1785:, 1782:V 1779:I 1776:= 1771:0 1767:C 1758:0 1754:P 1750:, 1747:) 1742:1 1736:i 1732:C 1723:1 1717:i 1713:P 1704:i 1700:P 1696:( 1691:K 1687:E 1683:= 1678:i 1674:C 1480:. 1477:V 1474:I 1471:= 1466:0 1462:C 1440:, 1435:1 1429:i 1425:C 1418:) 1413:i 1409:C 1405:( 1400:K 1396:D 1392:= 1387:i 1383:P 1356:, 1353:V 1350:I 1347:= 1342:0 1338:C 1316:, 1313:) 1308:1 1302:i 1298:C 1289:i 1285:P 1281:( 1276:K 1272:E 1268:= 1263:i 1259:C 974:i 972:( 970:g 960:i 952:i 950:( 948:g 943:i 940:Y 927:i 919:0 913:i 907:i 904:Y 891:0 883:i 877:i 874:Y 861:0 856:) 852:i 845:i 839:i 833:i 830:Y 817:0 809:i 803:i 797:i 794:Y 782:i 780:Y 774:i 768:i 765:Y 691:2 687:1 676:2 668:1 614:H 577:E 439:n 435:n 399:C 235:( 227:( 23:.

Index

Modus operandi

block cipher
information security
confidentiality
authenticity
bits
block
initialization vector
ciphertexts
plaintext
key
block size
padded
stream cipher
integrity protection
confidentiality
authenticity
authenticated encryption
FIPS 81
National Institute of Standards and Technology
AES
SP800-38A
XTS-AES
SP800-38E
ciphertext stealing
XTS
message authentication code
CBC-MAC
digital signature

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.