Differences
This shows you the differences between two versions of the page.
 
    
    
                        
                    | Both sides previous revision
Previous revision
Next revision | Previous revision | 
                        
                | en:racfor_wiki:template [2021/01/15 15:11] jli [Introduction]
 | en:racfor_wiki:template [2024/12/05 12:24] (current) 
 | 
        
| ====== Block Cipher Modes ====== | ====== Title ====== | 
|  |  | 
| ===== Abstract ===== | ===== Abstract ===== | 
|  |  | 
| Block cipher is one of the most widely-used tool in cryptography, and its mode of operation features the use of a symmetric-key block-cipher algorithm in providing information security such as confidentiality or authenticity. Five modes of operation with AES algorithm will be discussed in this paper: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).  These modes can provide cryptographic protection for sensitive, but classified, computer data. | How do you write an abstract? Identify your purpose. You're writing about a correlation between lack of lunches in schools and poor grades. … Explain the problem at hand. Abstracts state the “problem” behind your work. … Explain your methods. … (Source) Save your work regularly!!! Describe your results (informative abstract only). … Abstract should be no longer that 400 words. Please note that the table of contents in the  upper part of the page is generated automatically based on the used headings. | 
|  |  | 
| Keywords: Computer security; cryptography; block cipher; mode of operation | Keywords: abstract; bastract; astract; retract; tractor | 
|  |  | 
| ===== Introduction ===== | ===== Introduction ===== | 
|  |  | 
| Block cipher is one of the most widely-used tool in cryptography, but itself is only used of one fixed-length group of bits called a block [1]. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block [2]. |  | 
|  |  | 
| The five modes—the Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes can provide data confidentiality. |  | 
| ===== Chapter 1 ===== | ===== Chapter 1 ===== | 
|  |  |