Créer une activité
Jouer Relier
1. Electronic Code Book
2. Cipher Block Chaining
3. Counter
4. Galois/Counter Mode

Simplest

Multiprocessor systems can encrypt/decrypt multiple blocks at the same time

Respected secure mode of operation

Not recommended

Uses an IV for randomness when encrypting the first block

includes hashing techniques for integrity

Widely used due to it's efficiency

Each block uses the same IV but CTM combines it with the counter resulting in a different encryption for each block

Provides authenticity/integrity and confidentiality

Suffers from pipeline delays as encryption is dependent on encrypting every previous block

Used by many block ciphers

Represented as CTR or CM

Combines an IV with a counter, uses results to encrypt each plaintext block

Coverts a block cipher to a stream sipher

Divide plaintext into blocks, encrypts blocks using same key

Combines each block with the previous using XOR

Combines counter with galois method of authentication