Académique Documents
Professionnel Documents
Culture Documents
USEOFMODERN BLOCKCIPHERS
black eiphew" e*n be dp&e$rfug mqd.em Sywwari*kq eneip.&evmeat Mode.sqf, rye.wtlalt ftqve bee& devisedte eneip.hetteet af.'any ske employingeither DESor AES
Fb'..-]
r{ql
F;;-l
ffil
"' r-,{41 T
Fbt"-l Fbt*l I _ l -
Fu',''l
M M &
Decryptioq
EDcryptioa
Etor Prcpagation A single bit eftor in trunsrr.ission cqn cteate errots I severul in the correspot dW block. Eoweve4 the error doesnot have an! effect on the other blocks,
Ciphertcxl Stculing A techniqae called cipheftert stualing (CTS) can make it possible to use ECB modewithout padding. In this techniquethe last twoplainturt blocks, or are encrypted differently and out of order, as shown below, " *_, " *, has n bits and P has m bits, where m ! n . flssuming thst P N_, *
-+ : -+
Cipher block chaining (CBC) mode E:Eicryptioi l!: ?lai tex.l)lockt K: Secrctkey D:Decryltio Cr: Ciphertext blocki IV: Initialvecior(Co)
Declwtion DecIWtion
in cipheriext block C - duting bqflsmission l eftor in most bits in plaintext block P .duting .lecryption.
may create
Ciphertext Stealing The ciphertexl stealing tuchnique described for ECB mode can also be applied to CBC mode, as shown belaw,
The head fanction is the same as described in ECB mode; the pad function inserts 0's.
Eitcryption
in cipher feedback (CFB) mode D: Decrlption Cr: Ciphertext block i IV: Initial vector(S1) S;:Shiftrister T,: Te$poraryregister
li
Pz
Cz Encryption
KEI- geoemtor
Insecurechaorel Decry?don
Ed-'W
Dffrynho'r
(r bits)i
Pi DecryptioD
In the couater (CTR) mode, there is no leedbach The pseudorandomnessin the ke! strcsm is achievedusing a counter.
Eacrwtion
Key Senerator
Key genefator
Encry?tion
Decryption
Mada ' a ihch ,r-birblock is elcryp{edindependeorly vitlr tbe s$rc cipherke),. Block cilther
SAnre rs 6CB. bur eiichbloakis fifst exckrsire-nred Illock with the previols cipl1crtcxt. crpher Fach,*-bilblock is exch$ive-ored *ith itr r-bit keyvhich is pn|t of prcvious ,iipherlexl SatrcirsCliB. hul tho sllitl rcgisteri$$pdnlcd by $c previous r,bit kcy. SaoeasOFB, b{t 0 corrteris rsodi stead ofl rhift .eliislcf. Skearn ciphel
Srellln c\)he. S||clllrr ciplrcl f<tl
rSrl
sl2J5l
w -.& K[oiK{rlxl2l
Klls5l
Key Streot t Generarion The keys in the key strcam are generated,one b! ohe,
To show the randomness of the stream key, we use a secret key with all bytes set to 0. The key stream for 20 valuesof * is (222,24, 137, 65,163, 55, 93, 58, 138,6, 30, 103, 87, ll0, 146, tog, 199, 26, 127, 163).
A5/1 (a member of the A5 family of ciph*s) is used in the Global System for Mobile Commanication (GSM), a network for mobile telephone
communication,.
Key Generator 45,4 asesthree LFSRs with 19, 22, and 23 bits.
En crypti on/Decryptio n The bit streams createdfrom the key generator are buffered to form a 228bit key that is exclasive-ored with the plaintext frame to create the ciphertext frame. Encryption/decryption is done oneframe dt a time-
10