Cryptography and Network Security William Stallings
Cryptography and Network Security William Stallings
Cryptography and Network Security William Stallings
Network Security
Chapter 6
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
Double-DES?
could use 2 DES encrypts on each block
C = EK2(EK1(P))
C = EK1(DK2(EK1(P)))
nb encrypt & decrypt equivalent in security
if K1=K2 then can work with single DES
C = EK3(DK2(EK1(P)))
Modes of Operation
block ciphers encrypt fixed size blocks
Electronic
Codebook
Book
(ECB)
Cipher
Block
Chaining
(CBC)
Message Padding
at end of message must handle a possible
all blocks
before it
any change to a block affects all following
ciphertext blocks
need Initialization Vector (IV)
stream cipher
of pseudo-
s-bit
Cipher
FeedBack
(CFB-s)
mode
limitation is need to stall while do block
encryption after every n-bits
note that the block cipher is used in
encryption mode at both ends
errors propogate for several blocks after
the error
uses: stream
Output
FeedBack
(OFB)
Counter (CTR)
a new mode, though proposed early on
similar to OFB but encrypts counter value
Counter
(CTR)
Feedback
Characteristics
XTS-AES Mode
new mode, for block oriented storage use
concept
XTS-AES
Mode
per block
XTS-AES
Mode
Overview
stored data
Summary
Multiple Encryption & Triple-DES
Modes of Operation