Simplest
Multiprocessor systems can encrypt/decrypt multiple blocks at the same time
Respected secure mode of operation
Not recommended
Uses an IV for randomness when encrypting the first block
includes hashing techniques for integrity
Widely used due to it's efficiency
Each block uses the same IV but CTM combines it with the counter resulting in a different encryption for each block
Provides authenticity/integrity and confidentiality
Suffers from pipeline delays as encryption is dependent on encrypting every previous block
Used by many block ciphers
Represented as CTR or CM
Combines an IV with a counter, uses results to encrypt each plaintext block
Coverts a block cipher to a stream sipher
Divide plaintext into blocks, encrypts blocks using same key
Combines each block with the previous using XOR
Combines counter with galois method of authentication