CS 285 Network Security Block Cipher Modes of Operation. Fall 2008. Introduction. How to encrypt a message with variable lengths Decompose the message into blocks, padding if necessary. How should the encryption/decryption process of each individual block interact with each other?
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
CS 285 Network SecurityBlock Cipher Modes of Operation
Block oriented transmission
Not suitable for long messages or highly structured messages. Good for single values (e.g. keys)
message authentication code design
Able to preprocess to generate one-time pad; Random access; High performance requirement; IPsec
no need for padding;
ciphertext has the same length of message;
pipeline is possible for encryption, thus good for low-latency real-time transmission encryption.
transmission over noisy channel
Able to preprocess to generate one-time pad
CS 285 Network SecurityPublic-Key Cryptography
pubic-key (asymmetric) cryptography