Knowledge (XXG)

Block cipher mode of operation

Source 📝

601: 38: 3113:
be controversial; critics argued that "deliberately exposing a cryptosystem to a known systematic input represents an unnecessary risk". However, today CTR mode is widely accepted, and any problems are considered a weakness of the underlying block cipher, which is expected to be secure regardless of systemic bias in its input. Along with CBC, CTR mode is one of two block cipher modes recommended by Niels Ferguson and Bruce Schneier.
1530: 6995: 3176: 3162: 1654: 1640: 1142: 1130: 3019: 3005: 2243: 2229: 1516: 1240: 1226: 1082: 1068: 2213: 1118: 3365:
It might be observed, for example, that a one-block error in the transmitted ciphertext would result in a one-block error in the reconstructed plaintext for ECB mode encryption, while in CBC mode such an error would affect two blocks. Some felt that such resilience was desirable in the face of random
3136:
in many cases, since the attacker may be able to manipulate the entire IV–counter pair to cause a collision. Once an attacker controls the IV–counter pair and plaintext, XOR of the ciphertext with the known plaintext would yield a value that, when XORed with the ciphertext of the other block sharing
341:
In CBC mode, the IV must be unpredictable (random or pseudorandom) at encryption time; in particular, the (previously) common practice of re-using the last ciphertext block of a message as the IV for the next message is insecure (for example, this method was used by SSL 2.0). If an attacker knows the
3426:
Many modes use an initialization vector (IV) which, depending on the mode, may have requirements such as being only used once (a nonce) or being unpredictable ahead of its publication, etc. Reusing an IV with the same key in CTR, GCM or OFB mode results in XORing the same keystream with two or more
3032:
Each output feedback block cipher operation depends on all previous ones, and so cannot be performed in parallel. However, because the plaintext or ciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel
568:
GCM is defined for block ciphers with a block size of 128 bits. Galois message authentication code (GMAC) is an authentication-only variant of the GCM which can form an incremental message authentication code. Both GCM and GMAC can accept initialization vectors of arbitrary length. GCM can take full
345:
For some keys, an all-zero initialization vector may generate some block cipher modes (CFB-8, OFB-8) to get the internal state stuck at all-zero. For CFB-8, an all-zero IV and an all-zero plaintext, causes 1/256 of keys to generate no encryption, plaintext is returned as ciphertext. For OFB-8, using
3112:
block by encrypting successive values of a "counter". The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is the simplest and most popular. The usage of a simple deterministic input function used to
2636:
CFB may also self synchronize in some special cases other than those specified. For example, a one bit change in CFB-128 with an underlying 128 bit block cipher, will re-synchronize after two blocks. (However, CFB-128 etc. will not handle bit loss gracefully; a one-bit loss will cause the decryptor
2265:
The CFB mode also requires an integer parameter, denoted s, such that 1 ≤ s ≤ b. In the specification of the CFB mode below, each plaintext segment (Pj) and ciphertext segment (Cj) consists of s bits. The value of s is sometimes incorporated into the name of the mode, e.g., the 1-bit CFB mode, the
1570:
take advantage of this property by prepending a single random block to the plaintext. Encryption is done as normal, except the IV does not need to be communicated to the decryption routine. Whatever IV decryption uses, only the random block is "corrupted". It can be safely discarded and the rest of
1550:
Decrypting with the incorrect IV causes the first block of plaintext to be corrupt but subsequent plaintext blocks will be correct. This is because each block is XORed with the ciphertext of the previous block, not the plaintext, so one does not need to decrypt the previous block before using it as
564:
Galois/counter mode (GCM) combines the well-known counter mode of encryption with the new Galois mode of authentication. The key feature is the ease of parallel computation of the Galois field multiplication used for authentication. This feature permits higher throughput than encryption algorithms.
3381:
Many more modes of operation for block ciphers have been suggested. Some have been accepted, fully described (even standardized), and are in use. Others have been found insecure, and should never be used. Still others don't categorize as confidentiality, authenticity, or authenticated encryption –
463:
block, producing a final ciphertext block that is the same size as the final partial plaintext block. This characteristic of stream ciphers makes them suitable for applications that require the encrypted ciphertext data to be the same size as the original plaintext data, and for applications that
3131:
If the IV/nonce is random, then they can be combined with the counter using any invertible operation (concatenation, addition, or XOR) to produce the actual unique counter block for encryption. In case of a non-random nonce (such as a packet counter), the nonce and counter should be concatenated
3040:
Using OFB mode with a partial block as feedback like CFB mode reduces the average cycle length by a factor of 2 or more. A mathematical model proposed by Davies and Parkin and substantiated by experimental results showed that only with full feedback an average cycle length near to the obtainable
2632:
CFB-1 is considered self synchronizing and resilient to loss of ciphertext; "When the 1-bit CFB mode is used, then the synchronization is automatically restored b+1 positions after the inserted or deleted bit. For other values of s in the CFB mode, and for the other confidentiality modes in this
1625:
mode was designed to cause small changes in the ciphertext to propagate indefinitely when decrypting, as well as when encrypting. In PCBC mode, each block of plaintext is XORed with both the previous plaintext block and the previous ciphertext block before being encrypted. Like with CBC mode, an
3127:
CTR mode has similar characteristics to OFB, but also allows a random-access property during decryption. CTR mode is well suited to operate on a multi-processor machine, where blocks can be encrypted in parallel. Furthermore, it does not suffer from the short-cycle problem that can affect OFB.
229:
The cryptographic community observed that compositing (combining) a confidentiality mode with an authenticity mode could be difficult and error prone. They therefore began to supply modes which combined confidentiality and data integrity into a single cryptographic primitive (an encryption
3234:
chained in MAC-Then-Encrypt order, any bit error should completely abort decryption and must not generate any specific bit errors to decryptor. I.e. if decryption succeeded, there should not be any bit error. As such error propagation is less important subject in modern cipher modes than in
1555:
be parallelized. Note that a one-bit change to the ciphertext causes complete corruption of the corresponding block of plaintext, and inverts the corresponding bit in the following block of plaintext, but the rest of the blocks remain intact. This peculiarity is exploited in different
1542:
CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as
728:, with a few very small changes (e.g. how AES-CTR is initialized), but which yields practical benefits to its security "This addition allows for encrypting up to 2 messages with the same key, compared to the significant limitation of only 2 messages that were allowed with GCM-SIV." 307:
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct ciphertexts even if the same plaintext is encrypted multiple times, without the need for a slower re-keying process.
2014: 686:
SIV can support external nonce-based authenticated encryption, in which case one of the authenticated data fields is utilized for this purpose. RFC5297 specifies that for interoperability purposes the last authenticated data field should be used external nonce.
717:
AES-GCM-SIV synthesizes the internal IV. It derives a hash of the additional authenticated data and plaintext using the POLYVAL Galois hash function. The hash is then encrypted an AES-key, and used as authentication tag and AES-CTR initialization vector.
584:, usually AES. The result of this encryption is then XORed with the plaintext to produce the ciphertext. Like all counter modes, this is essentially a stream cipher, and so it is essential that a different IV is used for each stream that is encrypted. 311:
An initialization vector has different security requirements than a key, so the IV usually does not need to be secret. For most block cipher modes it is important that an initialization vector is never reused under the same key, i.e. it must be a
713:
is a mode of operation for the Advanced Encryption Standard which provides similar performance to Galois/counter mode as well as misuse resistance in the event of the reuse of a cryptographic nonce. The construction is defined in RFC 8452.
337:
For OFB and CTR, reusing an IV causes key bitstream re-use, which breaks security. This can be seen because both modes effectively create a bitstream that is XORed with the plaintext, and this bitstream is dependent on the key and IV only.
2627: 2521: 1933: 1800: 743:
Different cipher modes mask patterns by cascading outputs from the cipher block or other globally deterministic variables into the subsequent cipher block. The inputs of the listed modes are summarized in the following table:
3036:
It is possible to obtain an OFB mode keystream by using CBC mode with a constant string of zeroes as input. This can be useful, because it allows the usage of fast hardware implementations of CBC mode for OFB mode encryption.
342:
IV (or the previous block of ciphertext) before the next plaintext is specified, they can check their guess about plaintext of some block that was encrypted with the same key before (this is known as the TLS CBC IV attack).
3132:(e.g., storing the nonce in the upper 64 bits and the counter in the lower 64 bits of a 128-bit counter block). Simply adding or XORing the nonce and counter into a single value would break the security under a 2415: 3431:
algorithm and the SIV (RFC 5297) AEAD mode do not require an IV as an input, and return the same ciphertext and authentication tag every time for a given plaintext and key. Other IV misuse-resistant modes such as
3443:. They are generally used in modes of operation similar to the block modes described here. As with all protocols, to be cryptographically secure, care must be taken to design these modes of operation correctly. 358:(PRF) construction called S2V on the input (additional data and plaintext), preventing any external data from directly controlling the IV. External nonces / IV may be fed into S2V as an additional data field. 2715:
with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many
2648:
CFB, OFB and CTR share two advantages over CBC mode: the block cipher is only ever used in the encrypting direction, and the message does not need to be padded to a multiple of the cipher block size (though
349:
Some modes (such as AES-SIV and AES-GCM-SIV) are built to be more nonce-misuse resistant, i.e. resilient to scenarios in which the randomness generation is faulty or under the control of the attacker.
736:
Many modes of operation have been defined. Some of these are described below. The purpose of cipher modes is to mask patterns which exist in encrypted data, as illustrated in the description of the
2633:
recommendation, the synchronization must be restored externally." (NIST SP800-38A). I.e. 1-bit loss in a 128-bit-wide block cipher like AES will render 129 invalid bits before emitting valid bits.
3222:, CBC can be decrypted in the attack by guessing encryption secrets based on error responses. The Padding Oracle attack variant "CBC-R" (CBC Reverse) lets the attacker construct any valid message. 2208:{\displaystyle {\begin{aligned}C_{i}&={\begin{cases}{\text{IV}},&i=0\\E_{K}(C_{i-1})\oplus P_{i},&{\text{otherwise}}\end{cases}}\\P_{i}&=E_{K}(C_{i-1})\oplus C_{i},\end{aligned}}} 2019: 1949:
On a message encrypted in PCBC mode, if two adjacent ciphertext blocks are exchanged, this does not affect the decryption of subsequent blocks. For this reason, PCBC is not used in Kerberos v5.
1455: 1331: 408:
to bring its length up to a multiple of the block size, but care must be taken that the original length of the plaintext can be recovered; this is trivial, for example, if the plaintext is a
3436:
benefit from an IV input, for example in the maximum amount of data that can be safely encrypted with one key, while not failing catastrophically if the same IV is used multiple times.
3369:
However, when proper integrity protection is used, such an error will result (with high probability) in the entire message being rejected. If resistance to random error is desirable,
2837: 2780: 1208:
with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an
1039:). The message is divided into blocks, and each block is encrypted separately. ECB is not recommended for use in cryptographic protocols: the disadvantage of this method is a lack of 107:
Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded
6975: 6805: 3457: 2897: 2986: 2309: 1109:
has supposedly been encrypted, the overall image may still be discerned, as the pattern of identically colored pixels in the original remains visible in the encrypted version.
3148:(IV) in the other diagrams. However, if the offset/location information is corrupt, it will be impossible to partially recover such data due to the dependence on byte offset. 2947: 2004:(CFB) mode, in its simplest form uses the entire output of the block cipher. In this variation, it is very similar to CBC, turning a block cipher into a self-synchronizing 444:
suggest two possibilities, both simple: append a byte with value 128 (hex 80), followed by as many zero bytes as needed to fill the last block, or pad the last block with
4204:
William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining", US Patent 4074066, 1976.
1626:
initialization vector is used in the first block. Unlike CBC, decrypting PCBC with the incorrect IV (initialization vector) causes all blocks of plaintext to be corrupt.
282: 1495: 1371: 1551:
the IV for the decryption of the current one. This means that a plaintext block can be recovered from two adjacent blocks of ciphertext. As a consequence, decryption
100:
to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a
80:(IV), for each encryption operation. The IV must be non-repeating, and for some modes must also be random. The initialization vector is used to ensure that distinct 3661: 2645:
Like CBC mode, changes in the plaintext propagate forever in the ciphertext, and encryption cannot be parallelized. Also like CBC, decryption can be parallelized.
178:
provide confidentiality, but they do not protect against accidental modification or malicious tampering. Modification or tampering can be detected with a separate
3932: 274: 270: 140: 4465: 6658: 5588: 2527: 2421: 361:
AES-GCM-SIVs synthesize an internal IV by running POLYVAL Galois mode of authentication on input (additional data and plaintext), followed by an AES operation.
4560:. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. 4 January 2017. 6578: 5527: 4608: 5966: 4099: 1806: 1673: 483:
A number of modes of operation have been designed to combine secrecy and authentication in a single cryptographic primitive. Examples of such modes are ,
428:
to fill out the block; if the message ends on a block boundary, a whole padding block will be added. Most sophisticated are CBC-specific schemes such as
5995: 455:
CFB, OFB and CTR modes do not require any special measures to handle messages whose lengths are not multiples of the block size, since the modes work by
5833: 278: 73:. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block. 7023: 3196:"Error propagation" properties describe how a decryption behaves during bit errors, i.e. how error in one bit cascades to different decrypted bits. 650:
algorithm designed to provide both authentication and confidentiality. CCM mode is only defined for block ciphers with a block length of 128 bits.
346:
all zero initialization vector will generate no encryption for 1/256 of keys. OFB-8 encryption returns the plaintext unencrypted for affected keys.
96:, but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the final data fragment be 5354: 4710: 334:
For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages.
1101:
A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext can be seen when ECB mode is used to encrypt a
698:, naming schemes for SIV AEAD-variants may lead to some confusion; for example AEAD_AES_SIV_CMAC_256 refers to AES-SIV with two AES-128 keys and 324:. Some block ciphers have particular problems with certain initialization vectors, such as all zero IV generating no encryption (for some keys). 2315: 269:
Modes of operation are defined by a number of national and internationally recognized standards bodies. Notable standards organizations include
65:. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of 4561: 3589: 4359: 4296: 5344: 4838: 3876: 3696: 3564: 3427:
plaintexts, a clear misuse of a stream, with a catastrophic loss of security. Deterministic authenticated encryption modes such as the NIST
3366:
errors (e.g., line noise), while others argued that error correcting increased the scope for attackers to maliciously tamper with a message.
1204:
Ehrsam, Meyer, Smith and Tuchman invented the cipher block chaining (CBC) mode of operation in 1976. In CBC mode, each block of plaintext is
286: 5245: 661:
SIV synthesizes an internal IV using the pseudorandom function S2V. S2V is a keyed hash is based on CMAC, and the input to the function is:
5507: 5481: 5349: 4248: 3726: 518:(authenticated encryption with associated data) schemes. For example, EAX mode is a double-pass AEAD scheme while OCB mode is single-pass. 515: 6522: 6355: 5322: 459:
the plaintext with the output of the block cipher. The last partial block of plaintext is XORed with the first few bytes of the last
3399:
Disk encryption often uses special purpose modes specifically designed for the application. Tweakable narrow-block encryption modes (
7028: 6651: 5895: 5581: 4189: 4162: 4135: 3628: 3215: 3530: 629:
that can be used to verify the integrity of the data. The encrypted text then contains the IV, ciphertext, and authentication tag.
580:
Like in CTR, blocks are numbered sequentially, and then this block number is combined with an IV and encrypted with a block cipher
190:. The cryptographic community recognized the need for dedicated integrity assurances and NIST responded with HMAC, CMAC, and GMAC. 5491: 4601: 327:
It is recommended to review relevant IV requirements for the particular block cipher mode in relevant specification, for example
5959: 5370: 4023: 3963: 393: 389: 290: 6854: 6563: 6048: 6000: 5890: 4438: 4413: 4311: 4279: 3752: 6350: 4505: 6644: 6568: 5574: 4638: 3649: 3502: 3451: 3383: 3231: 144: 3861:. Fast Software Encryption 2001. Lecture Notes in Computer Science. Vol. 2355. Berlin: Springer. pp. 92–108. 1382: 1258: 6970: 6925: 6738: 6337: 5979: 5975: 5434: 4594: 4458: 3781: 3492: 3463: 3447: 179: 131:
The earliest modes of operation, ECB, CBC, OFB, and CFB (see below for all), date back to 1981 and were specified in
4404:
Davies, D. W.; Parkin, G. I. P. (1983). "The average cycle size of the key stream in output feedback encipherment".
3211:
Specific bit errors in stream cipher modes (OFB, CTR, etc.) are trivial. They affect only the specific bit intended.
3041:
maximum can be achieved. For this reason, support for truncated feedback was removed from the specification of OFB.
6849: 5952: 5864: 5723: 5451: 5361: 5339: 4652: 4535: 1547:. Note that a one-bit change in a plaintext or initialization vector (IV) affects all following ciphertext blocks. 433: 6965: 6594: 6233: 5456: 5312: 5265: 4740: 4214: 381: 93: 3675:
Conrad, Eric; Misenar, Seth; Feldman, Joshua (2017-01-01), Conrad, Eric; Misenar, Seth; Feldman, Joshua (eds.),
6955: 6945: 6800: 6573: 6409: 6108: 6103: 5859: 5522: 5404: 5279: 4648: 4088: 3923: 3497: 3404: 3227: 647: 514:
In addition, some modes also allow for the authentication of unencrypted associated data, and these are called
508: 478: 417: 409: 328: 247: 239: 231: 219: 207: 160: 148: 120: 2786: 2729: 3996:"Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES)" 3797:"Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)" 6950: 6940: 6743: 6703: 6696: 6686: 6681: 6496: 6316: 5461: 5250: 4621: 3133: 1040: 622: 165:
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
6691: 6604: 5990: 5553: 5429: 5424: 5376: 3440: 3420: 3416: 3412: 3400: 397: 371: 355: 156: 97: 5225: 2843: 6998: 6844: 6790: 6619: 6269: 6223: 6113: 6071: 6056: 6038: 5931: 5905: 5758: 5543: 5366: 4803: 4378: 3676: 3370: 3219: 3145: 2953: 2717: 2276: 1557: 1209: 302: 77: 3925:
Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
3853: 6960: 6884: 6289: 6193: 6143: 6118: 5926: 5446: 5329: 5255: 4938: 4918: 4037: 3977: 570: 108: 70: 54: 4557: 3581: 2903: 2044: 6723: 6614: 6491: 6440: 6379: 6198: 6158: 6138: 5854: 5409: 5386: 4705: 4338: 4317: 3475: 3141: 2650: 1939: 1544: 600: 504: 429: 313: 243: 215: 168: 6829: 6813: 6760: 6548: 6532: 6481: 6066: 5921: 5394: 5302: 5014: 4943: 4913: 4858: 626: 89: 4240: 3718: 3620: 3613: 3650:"ISO/IEC 10116:2006 – Information technology – Security techniques – Modes of operation for an 2008:. CFB decryption in this variation is almost identical to CBC encryption performed in reverse: 1461: 1337: 195: 6889: 6879: 6750: 6425: 5114: 4813: 4773: 4768: 4735: 4695: 4643: 4434: 4409: 4307: 4275: 4185: 4158: 4131: 3872: 3692: 3624: 3560: 2723:
Because of the symmetry of the XOR operation, encryption and decryption are exactly the same:
982: 187: 167:. Other confidentiality modes exist which have not been approved by NIST. For example, CTS is 37: 679:
SIV encrypts the S2V output and the plaintext using AES-CTR, keyed with the encryption key (K
6824: 6512: 6466: 6228: 5703: 5486: 5381: 5260: 5119: 4999: 4968: 4662: 4349: 4027: 3967: 3936: 3902: 3862: 3849: 3684: 3203:
Random bit errors occur independently in any bit position with an expected probability of ½.
3117: 132: 6527: 6476: 6471: 6259: 5823: 5818: 5793: 5667: 5333: 5317: 5306: 5240: 5199: 5164: 5094: 5074: 4948: 4828: 4823: 4778: 4390: 3487: 3218:
may intelligently combine many different specific bit errors to break the cipher mode. In
112: 58: 2622:{\displaystyle P_{i}=\operatorname {MSB} _{s}{\big (}E_{K}(I_{i-1}){\big )}\oplus C_{i},} 2516:{\displaystyle C_{i}=\operatorname {MSB} _{s}{\big (}E_{K}(I_{i-1}){\big )}\oplus P_{i},} 436:, which do not cause any extra ciphertext, at the expense of some additional complexity. 4339:"SP 800-38A, Recommendation for Block Cipher Modes of Operation: Methods and Techniques" 3522: 6899: 6819: 6780: 6728: 6713: 6517: 6245: 5885: 5738: 5693: 5471: 5419: 5230: 5215: 5154: 5149: 5034: 4783: 3688: 3121: 1154:
ECB mode can also make protocols without integrity protection even more susceptible to
574: 441: 437: 413: 401: 116: 62: 31: 3893: 3199:
Bit errors may occur intentionally in attacks or randomly due to transmission errors.
416:
which contains no null bytes except at the end. Slightly more complex is the original
224:
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
7017: 6980: 6935: 6894: 6874: 6770: 6733: 6708: 6609: 6486: 6188: 5838: 5798: 5778: 5768: 5733: 5597: 5466: 5414: 5293: 5275: 5064: 5039: 5029: 4853: 4843: 4690: 3105: 2704: 2005: 1155: 658:
Synthetic initialization vector (SIV) is a nonce-misuse resistant block cipher mode.
101: 1928:{\displaystyle P_{i}=D_{K}(C_{i})\oplus P_{i-1}\oplus C_{i-1},P_{0}\oplus C_{0}=IV.} 1795:{\displaystyle C_{i}=E_{K}(P_{i}\oplus P_{i-1}\oplus C_{i-1}),P_{0}\oplus C_{0}=IV,} 212:
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
6930: 6775: 6765: 6755: 6718: 6667: 5399: 5220: 5184: 5049: 4928: 4883: 4715: 4667: 4617: 4429:
Jueneman, Robert R. (1983). "Analysis of certain aspects of output feedback mode".
3206:
Specific bit errors occur in the same bit position(s) as the original bit error(s).
3101: 1102: 569:
advantage of parallel processing and implementing GCM can make efficient use of an
456: 377: 321: 111:
as an entirely separate cryptographic goal. Some modern modes of operation combine
50: 3748: 1529: 4179: 4152: 4125: 3855:
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
6909: 6599: 6445: 6374: 6370: 6279: 5773: 5631: 5009: 5004: 4888: 4040: 4017: 3980: 3957: 3717:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
3580:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
3521:
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013).
3471: 3433: 1141: 1129: 1105:
which contains large areas of uniform color. While the color of each individual
710: 259: 4497: 3901:. Eurocrypt 2001. Lecture Notes in Computer Science. Vol. 2045. Springer. 3796: 3175: 3161: 1252:
If the first block has index 1, the mathematical formula for CBC encryption is
464:
transmit data in streaming form where it is inconvenient to add padding bytes.
17: 6869: 6839: 6834: 6795: 5900: 5441: 5159: 5099: 4983: 4978: 4923: 4793: 4656: 3822: 1653: 1639: 1048: 614: 354:
Synthetic initialization vectors (SIV) synthesize an internal IV by running a
81: 3907: 3362:(Source: SP800-38A Table D.2: Summary of Effect of Bit Errors on Decryption) 316:. Many block cipher modes have stronger requirements, such as the IV must be 6859: 6274: 5813: 5743: 5677: 5174: 5169: 5059: 4973: 4868: 4848: 4354: 3941: 3867: 3775: 3109: 3018: 3004: 2708: 2242: 2228: 1515: 1239: 1225: 1081: 1067: 1044: 460: 405: 85: 6061: 4459:"Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption" 2410:{\displaystyle I_{i}={\big (}(I_{i-1}\ll s)+C_{i}{\big )}{\bmod {2}}^{b},} 665:
Additional authenticated data (zero, one or many AAD fields are supported)
6904: 6864: 6553: 6450: 6435: 6430: 6420: 6384: 6304: 6218: 6098: 5626: 5512: 5476: 5270: 4933: 4808: 4788: 4700: 3428: 3408: 1036: 638: 500: 496: 492: 488: 263: 255: 251: 235: 175: 4527: 6389: 6345: 6123: 5672: 5646: 5621: 5179: 5129: 5089: 5079: 5024: 5019: 4863: 4672: 3467: 183: 4218: 4124:
Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (2018).
3995: 3557:
Cryptography Engineering: Design Principles and Practical Applications
6785: 6558: 6299: 6294: 6264: 6254: 6213: 6208: 6203: 6183: 6178: 6153: 6148: 6133: 6093: 5763: 5728: 5698: 5662: 5517: 5139: 5134: 5069: 5054: 5044: 4989: 4963: 4958: 4953: 4833: 4818: 4032: 3972: 3827: 3777:
Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures
2270:
These modes will truncate the output of the underlying block cipher.
1561: 317: 4274:(2nd ed.). Upper Saddle River, NJ: Prentice Hall. p. 319. 1043:, wherein it fails to hide data patterns when it encrypts identical 633:
Counter with cipher block chaining message authentication code (CCM)
396:) require that the final block be padded before encryption. Several 388:), but messages come in a variety of lengths. So some modes (namely 143:(NIST) revised its list of approved modes of operation by including 4241:"Kryptographie FAQ: Frage 84: What are the Counter and PCBC Modes?" 4062: 3611:
Alfred J. Menezes; Paul C. van Oorschot; Scott A. Vanstone (1996).
30:"Mode of operation" redirects here. For "method of operation", see 6284: 6173: 6128: 6076: 6033: 6028: 6022: 5808: 5235: 5194: 5144: 5124: 5109: 4898: 4878: 4798: 4763: 1943: 1106: 36: 6399: 6394: 6365: 6360: 6324: 5828: 5803: 5753: 5748: 5616: 5611: 5084: 4993: 4908: 4903: 4893: 4873: 4745: 4730: 4181:
Applied Cryptography: Protocols, Algorithms and Source Code in C
3389: 511:
modes are classified as single-pass modes or double-pass modes.
203: 191: 6640: 5948: 5570: 4590: 6168: 6163: 6016: 5788: 5783: 5636: 5189: 5104: 4725: 4720: 4297:"The Use of Encryption in Kerberos for Network Authentication" 3446:
There are several schemes which use a block cipher to build a
2712: 1205: 1117: 644:
Counter with cipher block chaining message authentication code
425: 421: 66: 2389: 2266:
8-bit CFB mode, the 64-bit CFB mode, or the 128-bit CFB mode.
92:. Block ciphers may be capable of operating on more than one 76:
Most modes require a unique binary sequence, often called an
4061:
Gueron, Shay; Langley, Adam; Lindell, Yehuda (14 Dec 2018).
4019:
AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
2653:
can also be used for CBC mode to make padding unnecessary).
171:
mode and available in many popular cryptographic libraries.
4482:
Ferguson, Niels; Schneier, Bruce; Kohno, Tadayoshi (2010).
3214:
Specific bit errors in more complex modes such (e.g. CBC):
2128: 1158:, since each block gets decrypted in exactly the same way. 3419:) are designed to securely encrypt sectors of a disk (see 2720:
to function normally even when applied before encryption.
724:
is an improvement over the very similarly named algorithm
473:
Authenticated encryption with additional data (AEAD) modes
4215:"The Transport Layer Security (TLS) Protocol Version 1.1" 3956:
Whiting, D.; Housley, R.; Ferguson, N. (September 2003).
3373:
should be applied to the ciphertext before transmission.
573:
or a hardware pipeline. The CBC mode of operation incurs
41:
Six common block cipher modes of operation for encrypting
4457:
Lipmaa, Helger; Wagner, David; Rogaway, Phillip (2000).
4332: 4330: 3559:. Indianapolis: Wiley Publishing, Inc. pp. 63, 64. 3392:
maintains a list of proposed modes for block ciphers at
88:
is encrypted multiple times independently with the same
4154:
Cryptography's Role in Securing the Information Society
3458:
Cryptographically secure pseudorandom number generators
613:
The ciphertext blocks are considered coefficients of a
6806:
Cryptographically secure pseudorandom number generator
690:
Owing to the use of two keys, the authentication key K
2956: 2906: 2846: 2789: 2732: 2530: 2424: 2318: 2279: 2017: 1809: 1676: 1667:
Encryption and decryption algorithms are as follows:
1464: 1385: 1376:
while the mathematical formula for CBC decryption is
1340: 1261: 4578: 4558:"Modes Development – Block Cipher Techniques – CSRC" 4089:"Recommendation for Block Cipher Modes of Operation" 3137:
the same IV–counter pair, would decrypt that block.
230:
algorithm). These combined modes are referred to as
174:
The block cipher modes ECB, CBC, OFB, CFB, CTR, and
6918: 6674: 6587: 6541: 6505: 6459: 6408: 6336: 6313: 6242: 6086: 6047: 6009: 5914: 5873: 5847: 5716: 5686: 5655: 5645: 5604: 5536: 5500: 5289: 5208: 4754: 4681: 4629: 3895:
Encryption Modes with Almost Free Message Integrity
3077: 3069: 3061: 3051: 2703:(OFB) mode makes a block cipher into a synchronous 2689: 2681: 2673: 2663: 1990: 1982: 1974: 1964: 1607: 1599: 1591: 1581: 1194: 1186: 1178: 1168: 1021: 1013: 1005: 995: 554: 546: 538: 528: 3612: 2980: 2941: 2891: 2831: 2774: 2621: 2515: 2409: 2303: 2207: 1927: 1794: 1489: 1449: 1365: 1325: 153:Recommendation for Block Cipher Modes of Operation 4452: 4450: 3460:(CSPRNGs) can also be built using block ciphers. 1450:{\displaystyle P_{i}=D_{K}(C_{i})\oplus C_{i-1},} 1326:{\displaystyle C_{i}=E_{K}(P_{i}\oplus C_{i-1}),} 617:which is then evaluated at a key-dependent point 200:The Keyed-Hash Message Authentication Code (HMAC) 4431:Advances in Cryptology, Proceedings of CRYPTO 82 4406:Advances in Cryptology, Proceedings of CRYPTO 82 1147:Modes other than ECB result in pseudo-randomness 1135:Using ECB allows patterns to be easily discerned 4270:Kaufman, C.; Perlman, R.; Speciner, M. (2002). 3931:(Technical report). NIST Special Publications. 3033:once the plaintext or ciphertext is available. 3852:; Donescu, Pompiliu (2002). Matsui, M. (ed.). 3555:Ferguson, N.; Schneier, B.; Kohno, T. (2010). 3377:Other modes and other cryptographic primitives 1946:, most notably, but otherwise is not common. 1535:CBC decryption example with a toy 2-bit cipher 1521:CBC encryption example with a toy 2-bit cipher 1035:(ECB) mode (named after conventional physical 487:, integrity-aware parallelizable mode (IAPM), 141:National Institute of Standards and Technology 6652: 5960: 5582: 4602: 3823:"Netlogon CFB8 considered harmful. OFB8 also" 2598: 2559: 2492: 2453: 2382: 2334: 2263:NIST SP800-38A defines CFB with a bit-width. 625:. The result is then encrypted, producing an 485:integrity-aware cipher block chaining (IACBC) 8: 4408:. New York: Plenum Press. pp. 263–282. 3677:"Chapter 3 - Domain 3: Security engineering" 1031:The simplest of the encryption modes is the 577:that hamper its efficiency and performance. 234:, AE or "authenc". Examples of AE modes are 4433:. New York: Plenum Press. pp. 99–127. 3644: 3642: 3640: 3466:(MACs) are often built from block ciphers. 981:) is any deterministic function, often the 6659: 6645: 6637: 5967: 5953: 5945: 5652: 5589: 5575: 5567: 4609: 4595: 4587: 4583: 4579: 3550: 3548: 3454:for descriptions of several such methods. 1571:the decryption is the original plaintext. 4353: 4157:. National Academies Press. p. 132. 4151:Dam, Kenneth W.; Lin, Herbert S. (1996). 4063:"AES-GCM-SIV: Specification and Analysis" 4031: 3971: 3940: 3906: 3866: 2970: 2961: 2955: 2924: 2911: 2905: 2877: 2864: 2851: 2845: 2820: 2807: 2794: 2788: 2763: 2750: 2737: 2731: 2610: 2597: 2596: 2581: 2568: 2558: 2557: 2548: 2535: 2529: 2504: 2491: 2490: 2475: 2462: 2452: 2451: 2442: 2429: 2423: 2398: 2392: 2388: 2381: 2380: 2374: 2346: 2333: 2332: 2323: 2317: 2293: 2284: 2278: 2192: 2170: 2157: 2140: 2120: 2109: 2087: 2074: 2047: 2039: 2026: 2018: 2016: 1907: 1894: 1875: 1856: 1840: 1827: 1814: 1808: 1774: 1761: 1739: 1720: 1707: 1694: 1681: 1675: 1469: 1463: 1432: 1416: 1403: 1390: 1384: 1345: 1339: 1305: 1292: 1279: 1266: 1260: 147:as a block cipher and adding CTR mode in 3749:"Stream Cipher Reuse: A Graphic Example" 3439:Block ciphers can also be used in other 3250:Effect of bit errors in the IV or nonce 3237: 3235:traditional confidentiality-only modes. 2832:{\displaystyle P_{j}=C_{j}\oplus O_{j},} 2775:{\displaystyle C_{j}=P_{j}\oplus O_{j},} 1632:Propagating cipher block chaining (PCBC) 1575:Propagating cipher block chaining (PCBC) 746: 155:. Finally, in January, 2010, NIST added 4337:(NIST), Author: Morris Dworkin (2001). 3513: 3310:, …, until synchronization is restored 400:schemes exist. The simplest is to add 4386: 4376: 4184:. John Wiley & Sons. p. 208. 3303:, …, until synchronization is restored 3048: 2660: 2637:to lose alignment with the encryptor) 1961: 1578: 1165: 992: 525: 119:in an efficient way, and are known as 4564:from the original on 4 September 2017 3533:from the original on November 6, 2012 3144:in this diagram is equivalent to the 3088:Note: CTR mode (CM) is also known as 654:Synthetic initialization vector (SIV) 420:method, which is to add a single one 7: 4508:from the original on 24 October 2017 3755:from the original on 25 January 2015 3681:Eleventh Hour CISSP® (Third Edition) 4365:from the original on 28 August 2017 3411:) and wide-block encryption modes ( 2892:{\displaystyle O_{j}=E_{K}(I_{j}),} 2259:CFB-1, CFB-8, CFB-64, CFB-128, etc. 894:Plaintext XOR F(Y, Key); Ciphertext 4538:from the original on 23 March 2018 4105:from the original on 29 March 2017 3784:from the original on June 30, 2012 3729:from the original on April 2, 2013 3689:10.1016/b978-0-12-811248-9.00003-6 3592:from the original on April 2, 2013 3382:for example key feedback mode and 2981:{\displaystyle I_{0}={\text{IV}}.} 2304:{\displaystyle I_{0}={\text{IV}}.} 646:(counter with CBC-MAC; CCM) is an 25: 4251:from the original on 16 July 2012 3216:adaptive chosen-ciphertext attack 1619:propagating cipher block chaining 1587:Propagating cipher block chaining 1212:must be used in the first block. 737: 6994: 6993: 4471:from the original on 2015-02-26. 4127:Handbook of Applied Cryptography 3892:Jutla, Charanjit S. (May 2001). 3751:. Cryptosmith LLC. 31 May 2008. 3664:from the original on 2012-03-17. 3615:Handbook of Applied Cryptography 3353:for bit error in counter block T 3174: 3160: 3017: 3003: 2248:Cipher feedback (CFB) decryption 2241: 2234:Cipher feedback (CFB) encryption 2227: 1652: 1638: 1528: 1514: 1238: 1224: 1140: 1128: 1116: 1080: 1066: 599: 84:are produced even when the same 7024:Block cipher modes of operation 3100:Like OFB, counter mode turns a 1623:plaintext cipher-block chaining 1568:Explicit initialization vectors 6855:Information-theoretic security 6564:NIST hash function competition 2942:{\displaystyle I_{j}=O_{j-1},} 2883: 2870: 2593: 2574: 2487: 2468: 2364: 2339: 2182: 2163: 2099: 2080: 1846: 1833: 1751: 1700: 1422: 1409: 1317: 1285: 47:block cipher mode of operation 1: 3994:Harkins, Dan (October 2008). 218:was formalized in 2007 under 6569:Password Hashing Competition 5980:message authentication codes 5976:Cryptographic hash functions 5881:block ciphers in stream mode 4217:. p. 20. Archived from 3922:Dworkin, Morris (May 2004). 3821:Blaufish (14 October 2020). 3683:, Syngress, pp. 47–93, 3503:One-way compression function 3464:Message authentication codes 3452:one-way compression function 3232:message authentication codes 49:is an algorithm that uses a 6971:Message authentication code 6926:Cryptographic hash function 6739:Cryptographic hash function 6523:Merkle–Damgård construction 3774:B. Moeller (May 20, 2004), 3493:Message authentication code 3448:cryptographic hash function 3116:CTR mode was introduced by 2641:CFB compared to other modes 1218:Cipher block chaining (CBC) 1162:Cipher block chaining (CBC) 206:was released in 2005 under 180:message authentication code 127:History and standardization 7045: 6850:Harvest now, decrypt later 5865:alternating step generator 4498:"Basic Block Cipher Modes" 4130:. CRC Press. p. 228. 3959:Counter with CBC-MAC (CCM) 732:Confidentiality only modes 636: 476: 434:residual block termination 424:, followed by enough zero 380:works on units of a fixed 369: 300: 297:Initialization vector (IV) 277:(with ISO/IEC 10116), the 29: 6989: 6966:Post-quantum cryptography 6636: 5986: 5944: 5566: 5492:Time/memory/data tradeoff 4586: 4582: 4067:Cryptology ePrint Archive 4016:Gueron, S. (April 2019). 3244:Effect of bit errors in C 3230:(AEAD) or protocols with 3094:segmented integer counter 3070:Decryption parallelizable 3062:Encryption parallelizable 3056: 2682:Decryption parallelizable 2674:Encryption parallelizable 2668: 1983:Decryption parallelizable 1975:Encryption parallelizable 1969: 1600:Decryption parallelizable 1592:Encryption parallelizable 1586: 1490:{\displaystyle C_{0}=IV.} 1366:{\displaystyle C_{0}=IV,} 1187:Decryption parallelizable 1179:Encryption parallelizable 1173: 1060:Electronic Codebook (ECB) 1014:Decryption parallelizable 1006:Encryption parallelizable 1000: 989:Electronic codebook (ECB) 752: 547:Decryption parallelizable 539:Encryption parallelizable 533: 7029:Cryptographic algorithms 6956:Quantum key distribution 6946:Authenticated encryption 6801:Random number generation 6317:key derivation functions 5860:self-shrinking generator 5280:Whitening transformation 4484:Cryptography Engineering 4178:Schneier, Bruce (2015). 3908:10.1007/3-540-44987-6_32 3498:Authenticated encryption 3343:Specific bit errors in P 3318:Specific bit errors in P 3294:Specific bit errors in P 3283:Specific bit errors in P 3277:Specific bit errors in P 3228:authenticated encryption 3108:. It generates the next 648:authenticated encryption 509:Authenticated encryption 479:Authenticated encryption 232:authenticated encryption 194:was approved in 2002 as 121:authenticated encryption 6951:Public-key cryptography 6941:Symmetric-key algorithm 6744:Key derivation function 6704:Cryptographic primitive 6697:Authentication protocol 6687:Outline of cryptography 6682:History of cryptography 6595:Hash-based cryptography 6497:Length extension attack 5251:Confusion and diffusion 4355:10.6028/NIST.SP.800-38A 4304:Proceedings, Crypto '89 3942:10.6028/NIST.SP.800-38C 3868:10.1007/3-540-45473-X_8 3658:ISO Standards Catalogue 3441:cryptographic protocols 3134:chosen-plaintext attack 2711:blocks, which are then 623:finite field arithmetic 6692:Cryptographic protocol 6605:Message authentication 3619:. CRC Press. pp.  3421:disk encryption theory 3371:error-correcting codes 3349:Random bit errors in P 3324:Random bit errors in P 3306:Random bit errors in P 3299:Random bit errors in P 3272:Random bit errors in P 3258:Random bit errors in P 2982: 2943: 2893: 2833: 2776: 2718:error-correcting codes 2623: 2517: 2411: 2305: 2209: 1929: 1796: 1558:padding oracle attacks 1491: 1451: 1367: 1327: 1047:blocks into identical 372:Padding (cryptography) 356:pseudo-random function 137:DES Modes of Operation 42: 27:Cryptography algorithm 6845:End-to-end encryption 6791:Cryptojacking malware 5932:stream cipher attacks 5544:Initialization vector 3723:Cryptographic Toolkit 3586:Cryptographic Toolkit 3527:Cryptographic Toolkit 3220:Padding oracle attack 3146:initialization vector 2997:Output feedback (OFB) 2983: 2944: 2894: 2834: 2777: 2657:Output feedback (OFB) 2624: 2518: 2412: 2306: 2221:Cipher feedback (CFB) 2210: 1953:Cipher feedback (CFB) 1930: 1797: 1492: 1452: 1368: 1328: 1210:initialization vector 1174:Cipher block chaining 959:), Key); IV = token() 864:F(Y, Key); Ciphertext 820:F(Y, Key); Ciphertext 793:Cipher block chaining 671:Authentication key (K 448:bytes all with value 303:Initialization vector 78:initialization vector 40: 6961:Quantum cryptography 6885:Trusted timestamping 5927:correlation immunity 5323:3-subset MITM attack 4939:Intel Cascade Cipher 4919:Hasty Pudding cipher 4306:. Berlin: Springer. 3523:"Block cipher modes" 3090:integer counter mode 2954: 2904: 2844: 2787: 2730: 2528: 2422: 2316: 2277: 2015: 1807: 1674: 1659:PCBC mode decryption 1645:PCBC mode encryption 1462: 1383: 1338: 1259: 694:and encryption key K 593:Galois/Counter (GCM) 571:instruction pipeline 522:Galois/counter (GCM) 109:integrity protection 55:information security 6724:Cryptographic nonce 6492:Side-channel attack 5855:shrinking generator 5605:Widely used ciphers 5362:Differential-linear 4098:. NIST. p. 9. 4069:. Report (2017/168) 3181:CTR mode decryption 3167:CTR mode encryption 3024:OFB mode decryption 3010:OFB mode encryption 2651:ciphertext stealing 1545:ciphertext stealing 1245:CBC mode decryption 1231:CBC mode encryption 1087:ECB mode decryption 1073:ECB mode encryption 1033:electronic codebook 1001:Electronic codebook 764:Electronic codebook 749: 606:GCM mode encryption 430:ciphertext stealing 314:cryptographic nonce 169:ciphertext stealing 45:In cryptography, a 6830:Subliminal channel 6814:Pseudorandom noise 6761:Key (cryptography) 6549:CAESAR Competition 6533:HAIFA construction 6482:Brute-force attack 5922:correlation attack 5435:Differential-fault 4653:internal mechanics 4389:has generic name ( 3654:-bit block cipher" 3078:Random read access 2978: 2939: 2889: 2829: 2772: 2690:Random read access 2619: 2513: 2407: 2301: 2205: 2203: 2127: 1991:Random read access 1925: 1792: 1608:Random read access 1487: 1447: 1363: 1323: 1195:Random read access 1022:Random read access 747: 627:authentication tag 555:Random read access 139:. In 2001, the US 43: 7011: 7010: 7007: 7006: 6890:Key-based routing 6880:Trapdoor function 6751:Digital signature 6632: 6631: 6628: 6627: 6426:ChaCha20-Poly1305 6243:Password hashing/ 5940: 5939: 5712: 5711: 5562: 5561: 5549:Mode of operation 5226:Lai–Massey scheme 4502:www.quadibloc.com 4295:Kohl, J. (1990). 3878:978-3-540-43869-4 3850:Gligor, Virgil D. 3698:978-0-12-811248-9 3566:978-0-470-47424-2 3394:Modes Development 3360: 3359: 3192:Error propagation 3085: 3084: 2973: 2697: 2696: 2296: 2123: 2050: 1998: 1997: 1615: 1614: 1202: 1201: 1029: 1028: 983:identity function 971: 970: 748:Summary of modes 562: 561: 188:digital signature 16:(Redirected from 7036: 6997: 6996: 6825:Insecure channel 6661: 6654: 6647: 6638: 6513:Avalanche effect 6467:Collision attack 6010:Common functions 5969: 5962: 5955: 5946: 5653: 5591: 5584: 5577: 5568: 5420:Power-monitoring 5261:Avalanche effect 4969:Khufu and Khafre 4622:security summary 4611: 4604: 4597: 4588: 4584: 4580: 4574: 4573: 4571: 4569: 4554: 4548: 4547: 4545: 4543: 4528:"Cryptography I" 4524: 4518: 4517: 4515: 4513: 4494: 4488: 4487: 4479: 4473: 4472: 4470: 4463: 4454: 4445: 4444: 4426: 4420: 4419: 4401: 4395: 4394: 4388: 4384: 4382: 4374: 4372: 4370: 4364: 4357: 4343: 4334: 4325: 4324: 4322: 4316:. Archived from 4301: 4292: 4286: 4285: 4272:Network Security 4267: 4261: 4260: 4258: 4256: 4237: 4231: 4230: 4228: 4226: 4211: 4205: 4202: 4196: 4195: 4175: 4169: 4168: 4148: 4142: 4141: 4121: 4115: 4114: 4112: 4110: 4104: 4093: 4085: 4079: 4078: 4076: 4074: 4058: 4052: 4051: 4049: 4047: 4035: 4033:10.17487/RFC8452 4013: 4007: 4006: 4004: 4002: 3991: 3985: 3984: 3975: 3973:10.17487/RFC3610 3953: 3947: 3946: 3944: 3930: 3919: 3913: 3912: 3910: 3900: 3889: 3883: 3882: 3870: 3860: 3846: 3840: 3839: 3837: 3835: 3818: 3812: 3811: 3809: 3807: 3792: 3786: 3785: 3771: 3765: 3764: 3762: 3760: 3745: 3739: 3738: 3736: 3734: 3714: 3708: 3707: 3706: 3705: 3672: 3666: 3665: 3646: 3635: 3634: 3618: 3608: 3602: 3601: 3599: 3597: 3582:"Proposed modes" 3577: 3571: 3570: 3552: 3543: 3542: 3540: 3538: 3518: 3238: 3178: 3164: 3118:Whitfield Diffie 3049: 3021: 3007: 2987: 2985: 2984: 2979: 2974: 2971: 2966: 2965: 2948: 2946: 2945: 2940: 2935: 2934: 2916: 2915: 2898: 2896: 2895: 2890: 2882: 2881: 2869: 2868: 2856: 2855: 2838: 2836: 2835: 2830: 2825: 2824: 2812: 2811: 2799: 2798: 2781: 2779: 2778: 2773: 2768: 2767: 2755: 2754: 2742: 2741: 2707:. It generates 2661: 2628: 2626: 2625: 2620: 2615: 2614: 2602: 2601: 2592: 2591: 2573: 2572: 2563: 2562: 2553: 2552: 2540: 2539: 2522: 2520: 2519: 2514: 2509: 2508: 2496: 2495: 2486: 2485: 2467: 2466: 2457: 2456: 2447: 2446: 2434: 2433: 2416: 2414: 2413: 2408: 2403: 2402: 2397: 2396: 2386: 2385: 2379: 2378: 2357: 2356: 2338: 2337: 2328: 2327: 2310: 2308: 2307: 2302: 2297: 2294: 2289: 2288: 2245: 2231: 2214: 2212: 2211: 2206: 2204: 2197: 2196: 2181: 2180: 2162: 2161: 2145: 2144: 2131: 2130: 2124: 2121: 2114: 2113: 2098: 2097: 2079: 2078: 2051: 2048: 2031: 2030: 1962: 1938:PCBC is used in 1934: 1932: 1931: 1926: 1912: 1911: 1899: 1898: 1886: 1885: 1867: 1866: 1845: 1844: 1832: 1831: 1819: 1818: 1801: 1799: 1798: 1793: 1779: 1778: 1766: 1765: 1750: 1749: 1731: 1730: 1712: 1711: 1699: 1698: 1686: 1685: 1656: 1642: 1579: 1532: 1518: 1496: 1494: 1493: 1488: 1474: 1473: 1456: 1454: 1453: 1448: 1443: 1442: 1421: 1420: 1408: 1407: 1395: 1394: 1372: 1370: 1369: 1364: 1350: 1349: 1332: 1330: 1329: 1324: 1316: 1315: 1297: 1296: 1284: 1283: 1271: 1270: 1242: 1228: 1166: 1144: 1132: 1120: 1084: 1070: 993: 750: 620: 603: 583: 526: 486: 21: 7044: 7043: 7039: 7038: 7037: 7035: 7034: 7033: 7014: 7013: 7012: 7003: 6985: 6914: 6670: 6665: 6624: 6583: 6542:Standardization 6537: 6528:Sponge function 6501: 6477:Birthday attack 6472:Preimage attack 6455: 6411: 6404: 6332: 6315: 6314:General purpose 6309: 6244: 6238: 6087:Other functions 6082: 6049:SHA-3 finalists 6043: 6005: 5982: 5973: 5936: 5910: 5869: 5843: 5708: 5682: 5641: 5600: 5595: 5558: 5532: 5501:Standardization 5496: 5425:Electromagnetic 5377:Integral/Square 5334:Piling-up lemma 5318:Biclique attack 5307:EFF DES cracker 5291: 5285: 5216:Feistel network 5204: 4829:CIPHERUNICORN-E 4824:CIPHERUNICORN-A 4756: 4750: 4683: 4677: 4631: 4625: 4615: 4577: 4567: 4565: 4556: 4555: 4551: 4541: 4539: 4526: 4525: 4521: 4511: 4509: 4496: 4495: 4491: 4481: 4480: 4476: 4468: 4461: 4456: 4455: 4448: 4441: 4428: 4427: 4423: 4416: 4403: 4402: 4398: 4385: 4375: 4368: 4366: 4362: 4341: 4336: 4335: 4328: 4320: 4314: 4299: 4294: 4293: 4289: 4282: 4269: 4268: 4264: 4254: 4252: 4245:www.iks-jena.de 4239: 4238: 4234: 4224: 4222: 4213: 4212: 4208: 4203: 4199: 4192: 4177: 4176: 4172: 4165: 4150: 4149: 4145: 4138: 4123: 4122: 4118: 4108: 4106: 4102: 4091: 4087: 4086: 4082: 4072: 4070: 4060: 4059: 4055: 4045: 4043: 4015: 4014: 4010: 4000: 3998: 3993: 3992: 3988: 3955: 3954: 3950: 3928: 3921: 3920: 3916: 3898: 3891: 3890: 3886: 3879: 3858: 3848: 3847: 3843: 3833: 3831: 3820: 3819: 3815: 3805: 3803: 3795:Tervoort, Tom. 3794: 3793: 3789: 3773: 3772: 3768: 3758: 3756: 3747: 3746: 3742: 3732: 3730: 3719:"Current modes" 3716: 3715: 3711: 3703: 3701: 3699: 3674: 3673: 3669: 3648: 3647: 3638: 3631: 3610: 3609: 3605: 3595: 3593: 3579: 3578: 3574: 3567: 3554: 3553: 3546: 3536: 3534: 3520: 3519: 3515: 3511: 3488:Disk encryption 3484: 3379: 3356: 3352: 3346: 3335: 3331: 3327: 3321: 3309: 3302: 3298: 3297: 3286: 3280: 3276: 3275: 3261: 3247: 3194: 3188: 3186: 3185: 3184: 3183: 3182: 3179: 3170: 3169: 3168: 3165: 3156: 3155: 3047: 3031: 3029: 3028: 3027: 3026: 3025: 3022: 3013: 3012: 3011: 3008: 2999: 2998: 2991: 2957: 2952: 2951: 2920: 2907: 2902: 2901: 2873: 2860: 2847: 2842: 2841: 2816: 2803: 2790: 2785: 2784: 2759: 2746: 2733: 2728: 2727: 2701:output feedback 2669:Output feedback 2659: 2643: 2606: 2577: 2564: 2544: 2531: 2526: 2525: 2500: 2471: 2458: 2438: 2425: 2420: 2419: 2387: 2370: 2342: 2319: 2314: 2313: 2280: 2275: 2274: 2261: 2255: 2253: 2252: 2251: 2250: 2249: 2246: 2237: 2236: 2235: 2232: 2223: 2222: 2202: 2201: 2188: 2166: 2153: 2146: 2136: 2133: 2132: 2126: 2125: 2118: 2105: 2083: 2070: 2067: 2066: 2055: 2040: 2032: 2022: 2013: 2012: 2002:cipher feedback 1970:Cipher feedback 1960: 1955: 1903: 1890: 1871: 1852: 1836: 1823: 1810: 1805: 1804: 1770: 1757: 1735: 1716: 1703: 1690: 1677: 1672: 1671: 1666: 1664: 1663: 1662: 1661: 1660: 1657: 1648: 1647: 1646: 1643: 1634: 1633: 1577: 1540: 1539: 1538: 1537: 1536: 1533: 1524: 1523: 1522: 1519: 1510: 1509: 1503: 1465: 1460: 1459: 1428: 1412: 1399: 1386: 1381: 1380: 1341: 1336: 1335: 1301: 1288: 1275: 1262: 1257: 1256: 1250: 1249: 1248: 1247: 1246: 1243: 1234: 1233: 1232: 1229: 1220: 1219: 1164: 1152: 1151: 1150: 1149: 1148: 1145: 1137: 1136: 1133: 1125: 1124: 1121: 1100: 1097: 1094: 1092: 1091: 1090: 1089: 1088: 1085: 1076: 1075: 1074: 1071: 1062: 1061: 1054: 991: 967: 962:Plaintext XOR Y 950: 934: 929:Plaintext XOR Y 925: 921: 914: 903:Output feedback 897: 891: 884: 873:Cipher feedback 867: 860: 853: 847:XOR (Ciphertext 846: 840: 829:Propagating CBC 823: 817: 810: 804: 788: 781: 775: 738:weakness of ECB 734: 708: 697: 693: 682: 674: 656: 641: 635: 618: 611: 610: 609: 608: 607: 604: 595: 594: 587: 581: 575:pipeline stalls 524: 484: 481: 475: 470: 374: 368: 305: 299: 129: 113:confidentiality 59:confidentiality 35: 28: 23: 22: 18:Encryption mode 15: 12: 11: 5: 7042: 7040: 7032: 7031: 7026: 7016: 7015: 7009: 7008: 7005: 7004: 7002: 7001: 6990: 6987: 6986: 6984: 6983: 6978: 6976:Random numbers 6973: 6968: 6963: 6958: 6953: 6948: 6943: 6938: 6933: 6928: 6922: 6920: 6916: 6915: 6913: 6912: 6907: 6902: 6900:Garlic routing 6897: 6892: 6887: 6882: 6877: 6872: 6867: 6862: 6857: 6852: 6847: 6842: 6837: 6832: 6827: 6822: 6820:Secure channel 6817: 6811: 6810: 6809: 6798: 6793: 6788: 6783: 6781:Key stretching 6778: 6773: 6768: 6763: 6758: 6753: 6748: 6747: 6746: 6741: 6731: 6729:Cryptovirology 6726: 6721: 6716: 6714:Cryptocurrency 6711: 6706: 6701: 6700: 6699: 6689: 6684: 6678: 6676: 6672: 6671: 6666: 6664: 6663: 6656: 6649: 6641: 6634: 6633: 6630: 6629: 6626: 6625: 6623: 6622: 6617: 6612: 6607: 6602: 6597: 6591: 6589: 6585: 6584: 6582: 6581: 6576: 6571: 6566: 6561: 6556: 6551: 6545: 6543: 6539: 6538: 6536: 6535: 6530: 6525: 6520: 6518:Hash collision 6515: 6509: 6507: 6503: 6502: 6500: 6499: 6494: 6489: 6484: 6479: 6474: 6469: 6463: 6461: 6457: 6456: 6454: 6453: 6448: 6443: 6438: 6433: 6428: 6423: 6417: 6415: 6406: 6405: 6403: 6402: 6397: 6392: 6387: 6382: 6377: 6368: 6363: 6358: 6353: 6348: 6342: 6340: 6334: 6333: 6331: 6330: 6327: 6321: 6319: 6311: 6310: 6308: 6307: 6302: 6297: 6292: 6287: 6282: 6277: 6272: 6267: 6262: 6257: 6251: 6249: 6246:key stretching 6240: 6239: 6237: 6236: 6231: 6226: 6221: 6216: 6211: 6206: 6201: 6196: 6191: 6186: 6181: 6176: 6171: 6166: 6161: 6156: 6151: 6146: 6141: 6136: 6131: 6126: 6121: 6116: 6111: 6106: 6101: 6096: 6090: 6088: 6084: 6083: 6081: 6080: 6074: 6069: 6064: 6059: 6053: 6051: 6045: 6044: 6042: 6041: 6036: 6031: 6026: 6020: 6013: 6011: 6007: 6006: 6004: 6003: 5998: 5993: 5987: 5984: 5983: 5974: 5972: 5971: 5964: 5957: 5949: 5942: 5941: 5938: 5937: 5935: 5934: 5929: 5924: 5918: 5916: 5912: 5911: 5909: 5908: 5903: 5898: 5893: 5888: 5886:shift register 5883: 5877: 5875: 5871: 5870: 5868: 5867: 5862: 5857: 5851: 5849: 5845: 5844: 5842: 5841: 5836: 5831: 5826: 5821: 5816: 5811: 5806: 5801: 5796: 5791: 5786: 5781: 5776: 5771: 5766: 5761: 5756: 5751: 5746: 5741: 5736: 5731: 5726: 5720: 5718: 5714: 5713: 5710: 5709: 5707: 5706: 5701: 5696: 5690: 5688: 5684: 5683: 5681: 5680: 5675: 5670: 5665: 5659: 5657: 5650: 5643: 5642: 5640: 5639: 5634: 5629: 5624: 5619: 5614: 5608: 5606: 5602: 5601: 5598:Stream ciphers 5596: 5594: 5593: 5586: 5579: 5571: 5564: 5563: 5560: 5559: 5557: 5556: 5551: 5546: 5540: 5538: 5534: 5533: 5531: 5530: 5525: 5520: 5515: 5510: 5504: 5502: 5498: 5497: 5495: 5494: 5489: 5484: 5479: 5474: 5469: 5464: 5459: 5454: 5449: 5444: 5439: 5438: 5437: 5432: 5427: 5422: 5417: 5407: 5402: 5397: 5392: 5384: 5379: 5374: 5367:Distinguishing 5364: 5359: 5358: 5357: 5352: 5347: 5337: 5327: 5326: 5325: 5320: 5310: 5299: 5297: 5287: 5286: 5284: 5283: 5273: 5268: 5263: 5258: 5253: 5248: 5243: 5238: 5233: 5231:Product cipher 5228: 5223: 5218: 5212: 5210: 5206: 5205: 5203: 5202: 5197: 5192: 5187: 5182: 5177: 5172: 5167: 5162: 5157: 5152: 5147: 5142: 5137: 5132: 5127: 5122: 5117: 5112: 5107: 5102: 5097: 5092: 5087: 5082: 5077: 5072: 5067: 5062: 5057: 5052: 5047: 5042: 5037: 5032: 5027: 5022: 5017: 5012: 5007: 5002: 4997: 4986: 4981: 4976: 4971: 4966: 4961: 4956: 4951: 4946: 4941: 4936: 4931: 4926: 4921: 4916: 4911: 4906: 4901: 4896: 4891: 4886: 4881: 4876: 4871: 4866: 4861: 4859:Cryptomeria/C2 4856: 4851: 4846: 4841: 4836: 4831: 4826: 4821: 4816: 4811: 4806: 4801: 4796: 4791: 4786: 4781: 4776: 4771: 4766: 4760: 4758: 4752: 4751: 4749: 4748: 4743: 4738: 4733: 4728: 4723: 4718: 4713: 4708: 4703: 4698: 4693: 4687: 4685: 4679: 4678: 4676: 4675: 4670: 4665: 4660: 4646: 4641: 4635: 4633: 4627: 4626: 4616: 4614: 4613: 4606: 4599: 4591: 4576: 4575: 4549: 4519: 4489: 4474: 4446: 4439: 4421: 4414: 4396: 4326: 4323:on 2009-06-12. 4312: 4287: 4280: 4262: 4232: 4206: 4197: 4190: 4170: 4163: 4143: 4136: 4116: 4080: 4053: 4008: 3986: 3948: 3914: 3884: 3877: 3841: 3813: 3787: 3766: 3740: 3709: 3697: 3667: 3636: 3629: 3603: 3572: 3565: 3544: 3512: 3510: 3507: 3506: 3505: 3500: 3495: 3490: 3483: 3480: 3478:are examples. 3378: 3375: 3358: 3357: 3354: 3350: 3347: 3344: 3341: 3337: 3336: 3333: 3329: 3325: 3322: 3319: 3316: 3312: 3311: 3307: 3304: 3300: 3295: 3292: 3288: 3287: 3284: 3281: 3278: 3273: 3270: 3266: 3265: 3262: 3259: 3256: 3252: 3251: 3248: 3245: 3242: 3224: 3223: 3212: 3208: 3207: 3204: 3193: 3190: 3180: 3173: 3172: 3171: 3166: 3159: 3158: 3157: 3153: 3152: 3151: 3150: 3140:Note that the 3122:Martin Hellman 3098: 3097: 3083: 3082: 3079: 3075: 3074: 3071: 3067: 3066: 3063: 3059: 3058: 3054: 3053: 3046: 3043: 3023: 3016: 3015: 3014: 3009: 3002: 3001: 3000: 2996: 2995: 2994: 2993: 2989: 2988: 2977: 2969: 2964: 2960: 2949: 2938: 2933: 2930: 2927: 2923: 2919: 2914: 2910: 2899: 2888: 2885: 2880: 2876: 2872: 2867: 2863: 2859: 2854: 2850: 2839: 2828: 2823: 2819: 2815: 2810: 2806: 2802: 2797: 2793: 2782: 2771: 2766: 2762: 2758: 2753: 2749: 2745: 2740: 2736: 2695: 2694: 2691: 2687: 2686: 2683: 2679: 2678: 2675: 2671: 2670: 2666: 2665: 2658: 2655: 2642: 2639: 2630: 2629: 2618: 2613: 2609: 2605: 2600: 2595: 2590: 2587: 2584: 2580: 2576: 2571: 2567: 2561: 2556: 2551: 2547: 2543: 2538: 2534: 2523: 2512: 2507: 2503: 2499: 2494: 2489: 2484: 2481: 2478: 2474: 2470: 2465: 2461: 2455: 2450: 2445: 2441: 2437: 2432: 2428: 2417: 2406: 2401: 2395: 2391: 2384: 2377: 2373: 2369: 2366: 2363: 2360: 2355: 2352: 2349: 2345: 2341: 2336: 2331: 2326: 2322: 2311: 2300: 2292: 2287: 2283: 2260: 2257: 2247: 2240: 2239: 2238: 2233: 2226: 2225: 2224: 2220: 2219: 2218: 2217: 2216: 2215: 2200: 2195: 2191: 2187: 2184: 2179: 2176: 2173: 2169: 2165: 2160: 2156: 2152: 2149: 2147: 2143: 2139: 2135: 2134: 2129: 2119: 2117: 2112: 2108: 2104: 2101: 2096: 2093: 2090: 2086: 2082: 2077: 2073: 2069: 2068: 2065: 2062: 2059: 2056: 2054: 2046: 2045: 2043: 2038: 2035: 2033: 2029: 2025: 2021: 2020: 1996: 1995: 1992: 1988: 1987: 1984: 1980: 1979: 1976: 1972: 1971: 1967: 1966: 1959: 1958:Full-block CFB 1956: 1954: 1951: 1936: 1935: 1924: 1921: 1918: 1915: 1910: 1906: 1902: 1897: 1893: 1889: 1884: 1881: 1878: 1874: 1870: 1865: 1862: 1859: 1855: 1851: 1848: 1843: 1839: 1835: 1830: 1826: 1822: 1817: 1813: 1802: 1791: 1788: 1785: 1782: 1777: 1773: 1769: 1764: 1760: 1756: 1753: 1748: 1745: 1742: 1738: 1734: 1729: 1726: 1723: 1719: 1715: 1710: 1706: 1702: 1697: 1693: 1689: 1684: 1680: 1658: 1651: 1650: 1649: 1644: 1637: 1636: 1635: 1631: 1630: 1629: 1628: 1613: 1612: 1609: 1605: 1604: 1601: 1597: 1596: 1593: 1589: 1588: 1584: 1583: 1576: 1573: 1534: 1527: 1526: 1525: 1520: 1513: 1512: 1511: 1507: 1506: 1505: 1504: 1502: 1499: 1498: 1497: 1486: 1483: 1480: 1477: 1472: 1468: 1457: 1446: 1441: 1438: 1435: 1431: 1427: 1424: 1419: 1415: 1411: 1406: 1402: 1398: 1393: 1389: 1374: 1373: 1362: 1359: 1356: 1353: 1348: 1344: 1333: 1322: 1319: 1314: 1311: 1308: 1304: 1300: 1295: 1291: 1287: 1282: 1278: 1274: 1269: 1265: 1244: 1237: 1236: 1235: 1230: 1223: 1222: 1221: 1217: 1216: 1215: 1214: 1200: 1199: 1196: 1192: 1191: 1188: 1184: 1183: 1180: 1176: 1175: 1171: 1170: 1163: 1160: 1156:replay attacks 1146: 1139: 1138: 1134: 1127: 1126: 1123:Original image 1122: 1115: 1114: 1113: 1112: 1111: 1086: 1079: 1078: 1077: 1072: 1065: 1064: 1063: 1059: 1058: 1057: 1056: 1027: 1026: 1023: 1019: 1018: 1015: 1011: 1010: 1007: 1003: 1002: 998: 997: 990: 987: 969: 968: 963: 960: 946: 943: 940: 936: 935: 930: 927: 923: 916: 910: 907: 904: 900: 899: 895: 892: 886: 880: 877: 874: 870: 869: 865: 862: 855: 848: 842: 836: 833: 830: 826: 825: 821: 818: 812: 811:XOR Ciphertext 806: 800: 797: 794: 790: 789: 786: 783: 777: 771: 768: 765: 761: 760: 757: 754: 733: 730: 707: 704: 695: 691: 680: 677: 676: 672: 669: 666: 655: 652: 637:Main article: 634: 631: 605: 598: 597: 596: 592: 591: 590: 589: 560: 559: 556: 552: 551: 548: 544: 543: 540: 536: 535: 534:Galois/counter 531: 530: 523: 520: 477:Main article: 474: 471: 469: 466: 370:Main article: 367: 364: 363: 362: 359: 301:Main article: 298: 295: 128: 125: 32:Modus operandi 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 7041: 7030: 7027: 7025: 7022: 7021: 7019: 7000: 6992: 6991: 6988: 6982: 6981:Steganography 6979: 6977: 6974: 6972: 6969: 6967: 6964: 6962: 6959: 6957: 6954: 6952: 6949: 6947: 6944: 6942: 6939: 6937: 6936:Stream cipher 6934: 6932: 6929: 6927: 6924: 6923: 6921: 6917: 6911: 6908: 6906: 6903: 6901: 6898: 6896: 6895:Onion routing 6893: 6891: 6888: 6886: 6883: 6881: 6878: 6876: 6875:Shared secret 6873: 6871: 6868: 6866: 6863: 6861: 6858: 6856: 6853: 6851: 6848: 6846: 6843: 6841: 6838: 6836: 6833: 6831: 6828: 6826: 6823: 6821: 6818: 6815: 6812: 6807: 6804: 6803: 6802: 6799: 6797: 6794: 6792: 6789: 6787: 6784: 6782: 6779: 6777: 6774: 6772: 6771:Key generator 6769: 6767: 6764: 6762: 6759: 6757: 6754: 6752: 6749: 6745: 6742: 6740: 6737: 6736: 6735: 6734:Hash function 6732: 6730: 6727: 6725: 6722: 6720: 6717: 6715: 6712: 6710: 6709:Cryptanalysis 6707: 6705: 6702: 6698: 6695: 6694: 6693: 6690: 6688: 6685: 6683: 6680: 6679: 6677: 6673: 6669: 6662: 6657: 6655: 6650: 6648: 6643: 6642: 6639: 6635: 6621: 6618: 6616: 6613: 6611: 6610:Proof of work 6608: 6606: 6603: 6601: 6598: 6596: 6593: 6592: 6590: 6586: 6580: 6577: 6575: 6572: 6570: 6567: 6565: 6562: 6560: 6557: 6555: 6552: 6550: 6547: 6546: 6544: 6540: 6534: 6531: 6529: 6526: 6524: 6521: 6519: 6516: 6514: 6511: 6510: 6508: 6504: 6498: 6495: 6493: 6490: 6488: 6487:Rainbow table 6485: 6483: 6480: 6478: 6475: 6473: 6470: 6468: 6465: 6464: 6462: 6458: 6452: 6449: 6447: 6444: 6442: 6439: 6437: 6434: 6432: 6429: 6427: 6424: 6422: 6419: 6418: 6416: 6413: 6410:Authenticated 6407: 6401: 6398: 6396: 6393: 6391: 6388: 6386: 6383: 6381: 6378: 6376: 6372: 6369: 6367: 6364: 6362: 6359: 6357: 6354: 6352: 6349: 6347: 6344: 6343: 6341: 6339: 6338:MAC functions 6335: 6328: 6326: 6323: 6322: 6320: 6318: 6312: 6306: 6303: 6301: 6298: 6296: 6293: 6291: 6288: 6286: 6283: 6281: 6278: 6276: 6273: 6271: 6268: 6266: 6263: 6261: 6258: 6256: 6253: 6252: 6250: 6247: 6241: 6235: 6232: 6230: 6227: 6225: 6222: 6220: 6217: 6215: 6212: 6210: 6207: 6205: 6202: 6200: 6197: 6195: 6192: 6190: 6187: 6185: 6182: 6180: 6177: 6175: 6172: 6170: 6167: 6165: 6162: 6160: 6157: 6155: 6152: 6150: 6147: 6145: 6142: 6140: 6137: 6135: 6132: 6130: 6127: 6125: 6122: 6120: 6117: 6115: 6112: 6110: 6107: 6105: 6102: 6100: 6097: 6095: 6092: 6091: 6089: 6085: 6078: 6075: 6073: 6070: 6068: 6065: 6063: 6060: 6058: 6055: 6054: 6052: 6050: 6046: 6040: 6037: 6035: 6032: 6030: 6027: 6025:(compromised) 6024: 6021: 6019:(compromised) 6018: 6015: 6014: 6012: 6008: 6002: 6001:Known attacks 5999: 5997: 5994: 5992: 5989: 5988: 5985: 5981: 5977: 5970: 5965: 5963: 5958: 5956: 5951: 5950: 5947: 5943: 5933: 5930: 5928: 5925: 5923: 5920: 5919: 5917: 5913: 5907: 5904: 5902: 5899: 5897: 5894: 5892: 5889: 5887: 5884: 5882: 5879: 5878: 5876: 5872: 5866: 5863: 5861: 5858: 5856: 5853: 5852: 5850: 5846: 5840: 5837: 5835: 5832: 5830: 5827: 5825: 5822: 5820: 5817: 5815: 5812: 5810: 5807: 5805: 5802: 5800: 5797: 5795: 5792: 5790: 5787: 5785: 5782: 5780: 5777: 5775: 5772: 5770: 5767: 5765: 5762: 5760: 5757: 5755: 5752: 5750: 5747: 5745: 5742: 5740: 5737: 5735: 5732: 5730: 5727: 5725: 5722: 5721: 5719: 5717:Other ciphers 5715: 5705: 5702: 5700: 5697: 5695: 5692: 5691: 5689: 5685: 5679: 5676: 5674: 5671: 5669: 5666: 5664: 5661: 5660: 5658: 5654: 5651: 5648: 5644: 5638: 5635: 5633: 5630: 5628: 5625: 5623: 5620: 5618: 5615: 5613: 5610: 5609: 5607: 5603: 5599: 5592: 5587: 5585: 5580: 5578: 5573: 5572: 5569: 5565: 5555: 5552: 5550: 5547: 5545: 5542: 5541: 5539: 5535: 5529: 5526: 5524: 5521: 5519: 5516: 5514: 5511: 5509: 5506: 5505: 5503: 5499: 5493: 5490: 5488: 5485: 5483: 5480: 5478: 5475: 5473: 5470: 5468: 5465: 5463: 5460: 5458: 5455: 5453: 5450: 5448: 5447:Interpolation 5445: 5443: 5440: 5436: 5433: 5431: 5428: 5426: 5423: 5421: 5418: 5416: 5413: 5412: 5411: 5408: 5406: 5403: 5401: 5398: 5396: 5393: 5391: 5390: 5385: 5383: 5380: 5378: 5375: 5372: 5368: 5365: 5363: 5360: 5356: 5353: 5351: 5348: 5346: 5343: 5342: 5341: 5338: 5335: 5331: 5328: 5324: 5321: 5319: 5316: 5315: 5314: 5311: 5308: 5304: 5301: 5300: 5298: 5295: 5294:cryptanalysis 5288: 5281: 5277: 5276:Key whitening 5274: 5272: 5269: 5267: 5264: 5262: 5259: 5257: 5254: 5252: 5249: 5247: 5244: 5242: 5239: 5237: 5234: 5232: 5229: 5227: 5224: 5222: 5219: 5217: 5214: 5213: 5211: 5207: 5201: 5198: 5196: 5193: 5191: 5188: 5186: 5183: 5181: 5178: 5176: 5173: 5171: 5168: 5166: 5163: 5161: 5158: 5156: 5153: 5151: 5148: 5146: 5143: 5141: 5138: 5136: 5133: 5131: 5128: 5126: 5123: 5121: 5118: 5116: 5113: 5111: 5108: 5106: 5103: 5101: 5098: 5096: 5093: 5091: 5088: 5086: 5083: 5081: 5078: 5076: 5073: 5071: 5068: 5066: 5065:New Data Seal 5063: 5061: 5058: 5056: 5053: 5051: 5048: 5046: 5043: 5041: 5038: 5036: 5033: 5031: 5028: 5026: 5023: 5021: 5018: 5016: 5013: 5011: 5008: 5006: 5003: 5001: 4998: 4995: 4991: 4987: 4985: 4982: 4980: 4977: 4975: 4972: 4970: 4967: 4965: 4962: 4960: 4957: 4955: 4952: 4950: 4947: 4945: 4942: 4940: 4937: 4935: 4932: 4930: 4927: 4925: 4922: 4920: 4917: 4915: 4912: 4910: 4907: 4905: 4902: 4900: 4897: 4895: 4892: 4890: 4887: 4885: 4882: 4880: 4877: 4875: 4872: 4870: 4867: 4865: 4862: 4860: 4857: 4855: 4852: 4850: 4847: 4845: 4842: 4840: 4837: 4835: 4832: 4830: 4827: 4825: 4822: 4820: 4817: 4815: 4812: 4810: 4807: 4805: 4804:BEAR and LION 4802: 4800: 4797: 4795: 4792: 4790: 4787: 4785: 4782: 4780: 4777: 4775: 4772: 4770: 4767: 4765: 4762: 4761: 4759: 4753: 4747: 4744: 4742: 4739: 4737: 4734: 4732: 4729: 4727: 4724: 4722: 4719: 4717: 4714: 4712: 4709: 4707: 4704: 4702: 4699: 4697: 4694: 4692: 4689: 4688: 4686: 4680: 4674: 4671: 4669: 4666: 4664: 4661: 4658: 4654: 4650: 4647: 4645: 4642: 4640: 4637: 4636: 4634: 4628: 4623: 4619: 4618:Block ciphers 4612: 4607: 4605: 4600: 4598: 4593: 4592: 4589: 4585: 4581: 4563: 4559: 4553: 4550: 4537: 4533: 4529: 4523: 4520: 4507: 4503: 4499: 4493: 4490: 4486:. p. 71. 4485: 4478: 4475: 4467: 4460: 4453: 4451: 4447: 4442: 4436: 4432: 4425: 4422: 4417: 4411: 4407: 4400: 4397: 4392: 4380: 4361: 4356: 4351: 4347: 4346:csrc.nist.gov 4340: 4333: 4331: 4327: 4319: 4315: 4309: 4305: 4298: 4291: 4288: 4283: 4277: 4273: 4266: 4263: 4250: 4246: 4242: 4236: 4233: 4221:on 2015-01-07 4220: 4216: 4210: 4207: 4201: 4198: 4193: 4191:9781119096726 4187: 4183: 4182: 4174: 4171: 4166: 4164:9780309054751 4160: 4156: 4155: 4147: 4144: 4139: 4137:9780429881329 4133: 4129: 4128: 4120: 4117: 4101: 4097: 4090: 4084: 4081: 4068: 4064: 4057: 4054: 4042: 4039: 4034: 4029: 4025: 4021: 4020: 4012: 4009: 3997: 3990: 3987: 3982: 3979: 3974: 3969: 3965: 3961: 3960: 3952: 3949: 3943: 3938: 3934: 3927: 3926: 3918: 3915: 3909: 3904: 3897: 3896: 3888: 3885: 3880: 3874: 3869: 3864: 3857: 3856: 3851: 3845: 3842: 3830: 3829: 3824: 3817: 3814: 3802: 3798: 3791: 3788: 3783: 3779: 3778: 3770: 3767: 3754: 3750: 3744: 3741: 3728: 3724: 3720: 3713: 3710: 3700: 3694: 3690: 3686: 3682: 3678: 3671: 3668: 3663: 3659: 3655: 3653: 3645: 3643: 3641: 3637: 3632: 3630:0-8493-8523-7 3626: 3622: 3617: 3616: 3607: 3604: 3591: 3587: 3583: 3576: 3573: 3568: 3562: 3558: 3551: 3549: 3545: 3532: 3528: 3524: 3517: 3514: 3508: 3504: 3501: 3499: 3496: 3494: 3491: 3489: 3486: 3485: 3481: 3479: 3477: 3473: 3469: 3465: 3461: 3459: 3455: 3453: 3449: 3444: 3442: 3437: 3435: 3430: 3424: 3422: 3418: 3414: 3410: 3406: 3402: 3397: 3395: 3391: 3387: 3385: 3376: 3374: 3372: 3367: 3363: 3348: 3342: 3339: 3338: 3323: 3317: 3314: 3313: 3305: 3293: 3290: 3289: 3282: 3271: 3268: 3267: 3263: 3257: 3254: 3253: 3249: 3243: 3240: 3239: 3236: 3233: 3229: 3221: 3217: 3213: 3210: 3209: 3205: 3202: 3201: 3200: 3197: 3191: 3189: 3177: 3163: 3154:Counter (CTR) 3149: 3147: 3143: 3138: 3135: 3129: 3125: 3123: 3119: 3114: 3111: 3107: 3106:stream cipher 3103: 3095: 3091: 3087: 3086: 3080: 3076: 3072: 3068: 3064: 3060: 3055: 3050: 3045:Counter (CTR) 3044: 3042: 3038: 3034: 3020: 3006: 2992: 2975: 2967: 2962: 2958: 2950: 2936: 2931: 2928: 2925: 2921: 2917: 2912: 2908: 2900: 2886: 2878: 2874: 2865: 2861: 2857: 2852: 2848: 2840: 2826: 2821: 2817: 2813: 2808: 2804: 2800: 2795: 2791: 2783: 2769: 2764: 2760: 2756: 2751: 2747: 2743: 2738: 2734: 2726: 2725: 2724: 2721: 2719: 2714: 2710: 2706: 2705:stream cipher 2702: 2692: 2688: 2684: 2680: 2676: 2672: 2667: 2662: 2656: 2654: 2652: 2646: 2640: 2638: 2634: 2616: 2611: 2607: 2603: 2588: 2585: 2582: 2578: 2569: 2565: 2554: 2549: 2545: 2541: 2536: 2532: 2524: 2510: 2505: 2501: 2497: 2482: 2479: 2476: 2472: 2463: 2459: 2448: 2443: 2439: 2435: 2430: 2426: 2418: 2404: 2399: 2393: 2375: 2371: 2367: 2361: 2358: 2353: 2350: 2347: 2343: 2329: 2324: 2320: 2312: 2298: 2290: 2285: 2281: 2273: 2272: 2271: 2268: 2267: 2258: 2256: 2244: 2230: 2198: 2193: 2189: 2185: 2177: 2174: 2171: 2167: 2158: 2154: 2150: 2148: 2141: 2137: 2115: 2110: 2106: 2102: 2094: 2091: 2088: 2084: 2075: 2071: 2063: 2060: 2057: 2052: 2041: 2036: 2034: 2027: 2023: 2011: 2010: 2009: 2007: 2006:stream cipher 2003: 1993: 1989: 1985: 1981: 1977: 1973: 1968: 1963: 1957: 1952: 1950: 1947: 1945: 1941: 1922: 1919: 1916: 1913: 1908: 1904: 1900: 1895: 1891: 1887: 1882: 1879: 1876: 1872: 1868: 1863: 1860: 1857: 1853: 1849: 1841: 1837: 1828: 1824: 1820: 1815: 1811: 1803: 1789: 1786: 1783: 1780: 1775: 1771: 1767: 1762: 1758: 1754: 1746: 1743: 1740: 1736: 1732: 1727: 1724: 1721: 1717: 1713: 1708: 1704: 1695: 1691: 1687: 1682: 1678: 1670: 1669: 1668: 1655: 1641: 1627: 1624: 1620: 1610: 1606: 1602: 1598: 1594: 1590: 1585: 1580: 1574: 1572: 1569: 1565: 1563: 1559: 1554: 1548: 1546: 1531: 1517: 1500: 1484: 1481: 1478: 1475: 1470: 1466: 1458: 1444: 1439: 1436: 1433: 1429: 1425: 1417: 1413: 1404: 1400: 1396: 1391: 1387: 1379: 1378: 1377: 1360: 1357: 1354: 1351: 1346: 1342: 1334: 1320: 1312: 1309: 1306: 1302: 1298: 1293: 1289: 1280: 1276: 1272: 1267: 1263: 1255: 1254: 1253: 1241: 1227: 1213: 1211: 1207: 1197: 1193: 1189: 1185: 1181: 1177: 1172: 1167: 1161: 1159: 1157: 1143: 1131: 1119: 1110: 1108: 1104: 1098: 1095: 1083: 1069: 1055: 1052: 1050: 1046: 1042: 1038: 1034: 1024: 1020: 1016: 1012: 1008: 1004: 999: 994: 988: 986: 984: 980: 976: 966: 961: 958: 954: 949: 944: 941: 938: 937: 933: 928: 919: 913: 908: 905: 902: 901: 893: 889: 883: 878: 875: 872: 871: 863: 858: 854:XOR PlainText 851: 845: 839: 834: 831: 828: 827: 819: 815: 809: 803: 798: 795: 792: 791: 784: 780: 776:= F(PlainText 774: 769: 766: 763: 762: 758: 755: 751: 745: 741: 739: 731: 729: 727: 723: 719: 715: 712: 705: 703: 701: 688: 684: 670: 667: 664: 663: 662: 659: 653: 651: 649: 645: 640: 632: 630: 628: 624: 616: 602: 588: 585: 578: 576: 572: 566: 557: 553: 549: 545: 541: 537: 532: 527: 521: 519: 517: 512: 510: 506: 502: 498: 494: 490: 480: 472: 467: 465: 462: 458: 453: 451: 447: 443: 439: 435: 431: 427: 423: 419: 415: 411: 407: 403: 399: 395: 391: 387: 383: 379: 373: 365: 360: 357: 353: 352: 351: 347: 343: 339: 335: 332: 330: 325: 323: 319: 315: 309: 304: 296: 294: 292: 288: 284: 280: 276: 272: 267: 265: 261: 257: 253: 249: 245: 241: 237: 233: 227: 225: 221: 217: 213: 209: 205: 201: 197: 193: 189: 185: 181: 177: 172: 170: 166: 162: 158: 154: 150: 146: 142: 138: 134: 126: 124: 122: 118: 114: 110: 105: 103: 102:stream cipher 99: 95: 91: 87: 83: 79: 74: 72: 68: 64: 60: 56: 52: 48: 39: 33: 19: 6931:Block cipher 6776:Key schedule 6766:Key exchange 6756:Kleptography 6719:Cryptosystem 6668:Cryptography 5880: 5548: 5452:Partitioning 5410:Side-channel 5388: 5355:Higher-order 5340:Differential 5221:Key schedule 4566:. Retrieved 4552: 4540:. Retrieved 4531: 4522: 4510:. Retrieved 4501: 4492: 4483: 4477: 4430: 4424: 4405: 4399: 4387:|first= 4379:cite journal 4367:. Retrieved 4345: 4318:the original 4303: 4290: 4271: 4265: 4253:. Retrieved 4244: 4235: 4223:. Retrieved 4219:the original 4209: 4200: 4180: 4173: 4153: 4146: 4126: 4119: 4107:. Retrieved 4095: 4083: 4071:. Retrieved 4066: 4056: 4044:. Retrieved 4018: 4011: 3999:. Retrieved 3989: 3958: 3951: 3924: 3917: 3894: 3887: 3854: 3844: 3832:. Retrieved 3826: 3816: 3804:. Retrieved 3800: 3790: 3776: 3769: 3757:. Retrieved 3743: 3731:. Retrieved 3722: 3712: 3702:, retrieved 3680: 3670: 3657: 3651: 3614: 3606: 3594:. Retrieved 3585: 3575: 3556: 3535:. Retrieved 3526: 3516: 3462: 3456: 3445: 3438: 3425: 3398: 3393: 3388: 3384:Davies–Meyer 3380: 3368: 3364: 3361: 3225: 3198: 3195: 3187: 3139: 3130: 3126: 3115: 3102:block cipher 3099: 3093: 3089: 3039: 3035: 3030: 2990: 2722: 2700: 2698: 2647: 2644: 2635: 2631: 2269: 2264: 2262: 2254: 2001: 1999: 1948: 1937: 1665: 1622: 1618: 1616: 1567: 1566: 1552: 1549: 1541: 1375: 1251: 1203: 1153: 1103:bitmap image 1099: 1096: 1093: 1053: 1032: 1030: 978: 974: 972: 964: 956: 952: 947: 931: 926:= F(IV, Key) 917: 911: 887: 885:= Ciphertext 881: 856: 849: 843: 837: 813: 807: 801: 778: 772: 742: 735: 725: 721: 720: 716: 709: 699: 689: 685: 678: 660: 657: 643: 642: 612: 586: 579: 567: 563: 513: 482: 468:Common modes 454: 449: 445: 385: 384:(known as a 378:block cipher 375: 348: 344: 340: 336: 333: 326: 322:pseudorandom 310: 306: 268: 228: 223: 211: 199: 173: 164: 152: 136: 130: 117:authenticity 106: 75: 63:authenticity 51:block cipher 46: 44: 6919:Mathematics 6910:Mix network 6600:Merkle tree 6588:Utilization 6574:NSA Suite B 5537:Utilization 5523:NSA Suite B 5508:AES process 5457:Rubber-hose 5395:Related-key 5303:Brute-force 4682:Less common 3434:AES-GCM-SIV 3226:For modern 3096:(SIC) mode. 1940:Kerberos v4 841:= PlainText 805:= PlainText 759:Ciphertext 722:AES-GCM-SIV 711:AES-GCM-SIV 706:AES-GCM-SIV 82:ciphertexts 53:to provide 7018:Categories 6870:Ciphertext 6840:Decryption 6835:Encryption 6796:Ransomware 6412:encryption 6189:RadioGatún 5996:Comparison 5901:T-function 5848:Generators 5724:Achterbahn 5487:Chi-square 5405:Rotational 5345:Impossible 5266:Block size 5160:Spectr-H64 4984:Ladder-DES 4979:Kuznyechik 4924:Hierocrypt 4794:BassOmatic 4757:algorithms 4684:algorithms 4657:Triple DES 4632:algorithms 4440:0306413663 4415:0306413663 4313:0387973176 4281:0130460192 4073:19 October 4046:August 14, 4001:21 October 3945:. 800-38C. 3834:14 October 3806:14 October 3704:2020-11-01 3509:References 3092:(ICM) and 1560:, such as 1049:ciphertext 615:polynomial 402:null bytes 386:block size 289:, and the 94:block size 6860:Plaintext 6329:KDF1/KDF2 6248:functions 6234:Whirlpool 5814:SOBER-128 5744:KCipher-2 5678:SOSEMANUK 5649:Portfolio 5462:Black-bag 5382:Boomerang 5371:Known-key 5350:Truncated 5175:Threefish 5170:SXAL/MBAL 5060:MultiSwap 5015:MacGuffin 4974:KN-Cipher 4914:Grand Cru 4869:CS-Cipher 4849:COCONUT98 4225:7 January 3759:7 January 3733:April 12, 3596:April 14, 3537:April 12, 3386:hashing. 3124:in 1979. 3110:keystream 2929:− 2814:⊕ 2757:⊕ 2709:keystream 2604:⊕ 2586:− 2555:⁡ 2498:⊕ 2480:− 2449:⁡ 2359:≪ 2351:− 2186:⊕ 2175:− 2122:otherwise 2103:⊕ 2092:− 1901:⊕ 1880:− 1869:⊕ 1861:− 1850:⊕ 1768:⊕ 1744:− 1733:⊕ 1725:− 1714:⊕ 1437:− 1426:⊕ 1310:− 1299:⊕ 1045:plaintext 1041:diffusion 1037:codebooks 951:= F(IV + 922:, Key); Y 702:AES-256. 668:Plaintext 461:keystream 406:plaintext 329:SP800-38A 248:SP800-38D 240:SP800-38C 220:SP800-38D 208:SP800-38B 161:SP800-38E 149:SP800-38A 86:plaintext 69:called a 6999:Category 6905:Kademlia 6865:Codetext 6808:(CSPRNG) 6554:CRYPTREC 6385:Poly1305 6305:yescrypt 6219:Streebog 6099:CubeHash 6079:(winner) 5687:Hardware 5656:Software 5627:Crypto-1 5513:CRYPTREC 5477:Weak key 5430:Acoustic 5271:Key size 5115:Red Pike 4934:IDEA NXT 4814:Chiasmus 4809:CAST-256 4789:BaseKing 4774:Akelarre 4769:Adiantum 4736:Skipjack 4701:CAST-128 4696:Camellia 4644:Blowfish 4568:28 April 4562:Archived 4542:28 April 4536:Archived 4532:Coursera 4512:28 April 4506:Archived 4466:Archived 4369:28 April 4360:Archived 4255:28 April 4249:Archived 4100:Archived 4096:NIST.gov 3782:archived 3753:Archived 3727:Archived 3725:. NIST. 3662:Archived 3660:. 2006. 3590:Archived 3588:. NIST. 3531:Archived 3529:. NIST. 3482:See also 3429:Key Wrap 1051:blocks. 756:Formulas 639:CCM mode 621:, using 442:Ferguson 438:Schneier 196:FIPS 198 182:such as 57:such as 6675:General 6460:Attacks 6390:SipHash 6346:CBC-MAC 6280:LM hash 6260:Balloon 6124:HAS-160 5915:Attacks 5704:Trivium 5673:Salsa20 5647:eSTREAM 5554:Padding 5472:Rebound 5180:Treyfer 5130:SAVILLE 5090:PRESENT 5080:NOEKEON 5025:MAGENTA 5020:Madryga 5000:Lucifer 4864:CRYPTON 4673:Twofish 4663:Serpent 4109:1 April 3621:228–233 3468:CBC-MAC 3104:into a 3057:Counter 1508:Example 1501:Example 939:Counter 726:GCM-SIV 404:to the 398:padding 366:Padding 186:, or a 184:CBC-MAC 157:XTS-AES 133:FIPS 81 123:modes. 6786:Keygen 6620:Pepper 6559:NESSIE 6506:Design 6300:scrypt 6295:PBKDF2 6270:Catena 6265:bcrypt 6255:Argon2 6214:Snefru 6209:Shabal 6204:SWIFFT 6184:RIPEMD 6179:N-hash 6154:MASH-2 6149:MASH-1 6134:Kupyna 6094:BLAKE3 6077:Keccak 6062:Grøstl 6039:BLAKE2 5874:Theory 5824:Turing 5819:Spritz 5794:Scream 5764:Phelix 5759:Panama 5729:F-FCSR 5699:MICKEY 5668:Rabbit 5663:HC-128 5622:ChaCha 5518:NESSIE 5467:Davies 5415:Timing 5330:Linear 5290:Attack 5209:Design 5200:Zodiac 5165:Square 5140:SHACAL 5135:SC2000 5095:Prince 5075:Nimbus 5070:NewDES 5055:MULTI2 5045:MISTY1 4988:LOKI ( 4964:KHAZAD 4959:KeeLoq 4954:KASUMI 4949:Kalyna 4834:CLEFIA 4819:CIKS-1 4779:Anubis 4630:Common 4437:  4412:  4310:  4278:  4188:  4161:  4134:  3875:  3828:GitHub 3801:Secura 3695:  3627:  3563:  3450:. See 3407:, and 3332:, …, P 1562:POODLE 973:Note: 832:(PCBC) 782:, Key) 503:, and 457:XORing 414:string 412:style 318:random 281:, the 262:, and 214:, and 98:padded 6816:(PRN) 6414:modes 6290:Makwa 6285:Lyra2 6275:crypt 6224:Tiger 6174:MDC-2 6129:HAVAL 6114:Fugue 6072:Skein 6057:BLAKE 6034:SHA-3 6029:SHA-2 6023:SHA-1 5896:NLFSR 5809:SOBER 5739:ISAAC 5694:Grain 5400:Slide 5256:Round 5241:P-box 5236:S-box 5195:XXTEA 5155:Speck 5150:Simon 5145:SHARK 5125:SAFER 5110:REDOC 5035:Mercy 4994:89/91 4944:Iraqi 4909:G-DES 4899:FEA-M 4879:DES-X 4844:Cobra 4799:BATON 4784:Ascon 4764:3-Way 4755:Other 4469:(PDF) 4462:(PDF) 4363:(PDF) 4342:(PDF) 4321:(PDF) 4300:(PDF) 4103:(PDF) 4092:(PDF) 3929:(PDF) 3899:(PDF) 3859:(PDF) 3142:nonce 2713:XORed 1944:WASTE 1206:XORed 1107:pixel 942:(CTR) 915:= F(Y 906:(OFB) 898:= IV 876:(CFB) 868:= IV 824:= IV 796:(CBC) 767:(ECB) 71:block 6615:Salt 6579:CNSA 6446:IAPM 6400:VMAC 6395:UMAC 6380:PMAC 6375:CMAC 6371:OMAC 6366:NMAC 6361:HMAC 6356:GMAC 6325:HKDF 6194:SIMD 6144:Lane 6119:GOST 6104:ECOH 5991:List 5978:and 5891:LFSR 5839:WAKE 5834:VMPC 5829:VEST 5804:SNOW 5799:SEAL 5789:RC4A 5784:RC4+ 5779:QUAD 5769:Pike 5754:ORYX 5749:MUGI 5734:FISH 5617:A5/2 5612:A5/1 5528:CNSA 5387:Mod 5313:MITM 5085:NUSH 5040:MESH 5030:MARS 4904:FROG 4894:FEAL 4874:DEAL 4854:Crab 4839:CMEA 4746:XTEA 4731:SEED 4711:IDEA 4706:GOST 4691:ARIA 4570:2018 4544:2018 4514:2018 4435:ISBN 4410:ISBN 4391:help 4371:2018 4308:ISBN 4276:ISBN 4257:2018 4227:2015 4186:ISBN 4159:ISBN 4132:ISBN 4111:2017 4075:2020 4048:2019 4041:8452 4024:IETF 4003:2020 3981:3610 3964:IETF 3933:NIST 3873:ISBN 3836:2020 3808:2020 3761:2015 3735:2013 3693:ISBN 3625:ISBN 3598:2013 3561:ISBN 3539:2013 3476:PMAC 3474:and 3472:OMAC 3415:and 3390:NIST 3241:Mode 3120:and 2699:The 2000:The 1942:and 1617:The 1582:PCBC 753:Mode 516:AEAD 440:and 426:bits 392:and 382:size 291:IETF 287:ANSI 283:IEEE 271:NIST 260:IAPM 216:GMAC 204:CMAC 192:HMAC 115:and 67:bits 6451:OCB 6441:GCM 6436:EAX 6431:CWC 6421:CCM 6351:DAA 6229:VSH 6199:SM3 6169:MD6 6164:MD4 6159:MD2 6139:LSH 6109:FSB 6017:MD5 5637:RC4 5482:Tau 5442:XSL 5246:SPN 5190:xmx 5185:UES 5120:S-1 5105:RC2 5050:MMB 4929:ICE 4884:DFC 4741:TEA 4726:RC6 4721:RC5 4716:LEA 4668:SM4 4649:DES 4639:AES 4350:doi 4038:RFC 4028:doi 3978:RFC 3968:doi 3937:doi 3903:doi 3863:doi 3685:doi 3423:). 3417:EME 3413:CMC 3409:XTS 3405:XEX 3401:LRW 3340:CTR 3328:, P 3315:OFB 3301:i+1 3291:CFB 3279:i+1 3269:CBC 3255:ECB 3081:Yes 3073:Yes 3065:Yes 3052:CTR 2664:OFB 2546:MSB 2440:MSB 2390:mod 1994:Yes 1986:Yes 1965:CFB 1621:or 1553:can 1198:Yes 1190:Yes 1169:CBC 1025:Yes 1017:Yes 1009:Yes 996:ECB 700:not 683:). 558:Yes 550:Yes 542:Yes 529:GCM 505:GCM 501:CCM 497:CWC 493:EAX 489:OCB 432:or 422:bit 418:DES 394:CBC 390:ECB 320:or 279:IEC 275:ISO 264:OCB 256:EAX 252:CWC 250:), 244:GCM 242:), 236:CCM 176:XTS 159:in 145:AES 90:key 61:or 7020:: 6067:JH 5906:IV 5774:Py 5632:E0 5010:M8 5005:M6 4992:, 4990:97 4889:E2 4655:, 4534:. 4530:. 4504:. 4500:. 4464:. 4449:^ 4383:: 4381:}} 4377:{{ 4358:. 4348:. 4344:. 4329:^ 4302:. 4247:. 4243:. 4094:. 4065:. 4036:. 4026:. 4022:. 3976:. 3966:. 3962:. 3935:. 3871:. 3825:. 3799:. 3780:, 3721:. 3691:, 3679:, 3656:. 3639:^ 3623:. 3584:. 3547:^ 3525:. 3470:, 3403:, 3396:. 3264:— 2972:IV 2693:No 2685:No 2677:No 2295:IV 2049:IV 1978:No 1611:No 1603:No 1595:No 1564:. 1182:No 985:. 920:−1 890:−1 859:−1 852:−1 816:−1 740:. 675:). 507:. 499:, 495:, 491:, 452:. 376:A 331:. 293:. 285:, 273:, 266:. 258:, 254:, 226:. 222:, 210:, 202:, 198:, 163:, 151:, 135:, 104:. 6660:e 6653:t 6646:v 6373:/ 5968:e 5961:t 5954:v 5590:e 5583:t 5576:v 5389:n 5373:) 5369:( 5336:) 5332:( 5309:) 5305:( 5296:) 5292:( 5282:) 5278:( 5100:Q 4996:) 4659:) 4651:( 4624:) 4620:( 4610:e 4603:t 4596:v 4572:. 4546:. 4516:. 4443:. 4418:. 4393:) 4373:. 4352:: 4284:. 4259:. 4229:. 4194:. 4167:. 4140:. 4113:. 4077:. 4050:. 4030:: 4005:. 3983:. 3970:: 3939:: 3911:. 3905:: 3881:. 3865:: 3838:. 3810:. 3763:. 3737:. 3687:: 3652:n 3633:. 3600:. 3569:. 3541:. 3355:i 3351:i 3345:i 3334:n 3330:2 3326:1 3320:i 3308:1 3296:i 3285:1 3274:i 3260:i 3246:i 2976:. 2968:= 2963:0 2959:I 2937:, 2932:1 2926:j 2922:O 2918:= 2913:j 2909:I 2887:, 2884:) 2879:j 2875:I 2871:( 2866:K 2862:E 2858:= 2853:j 2849:O 2827:, 2822:j 2818:O 2809:j 2805:C 2801:= 2796:j 2792:P 2770:, 2765:j 2761:O 2752:j 2748:P 2744:= 2739:j 2735:C 2617:, 2612:i 2608:C 2599:) 2594:) 2589:1 2583:i 2579:I 2575:( 2570:K 2566:E 2560:( 2550:s 2542:= 2537:i 2533:P 2511:, 2506:i 2502:P 2493:) 2488:) 2483:1 2477:i 2473:I 2469:( 2464:K 2460:E 2454:( 2444:s 2436:= 2431:i 2427:C 2405:, 2400:b 2394:2 2383:) 2376:i 2372:C 2368:+ 2365:) 2362:s 2354:1 2348:i 2344:I 2340:( 2335:( 2330:= 2325:i 2321:I 2299:. 2291:= 2286:0 2282:I 2199:, 2194:i 2190:C 2183:) 2178:1 2172:i 2168:C 2164:( 2159:K 2155:E 2151:= 2142:i 2138:P 2116:, 2111:i 2107:P 2100:) 2095:1 2089:i 2085:C 2081:( 2076:K 2072:E 2064:0 2061:= 2058:i 2053:, 2042:{ 2037:= 2028:i 2024:C 1923:. 1920:V 1917:I 1914:= 1909:0 1905:C 1896:0 1892:P 1888:, 1883:1 1877:i 1873:C 1864:1 1858:i 1854:P 1847:) 1842:i 1838:C 1834:( 1829:K 1825:D 1821:= 1816:i 1812:P 1790:, 1787:V 1784:I 1781:= 1776:0 1772:C 1763:0 1759:P 1755:, 1752:) 1747:1 1741:i 1737:C 1728:1 1722:i 1718:P 1709:i 1705:P 1701:( 1696:K 1692:E 1688:= 1683:i 1679:C 1485:. 1482:V 1479:I 1476:= 1471:0 1467:C 1445:, 1440:1 1434:i 1430:C 1423:) 1418:i 1414:C 1410:( 1405:K 1401:D 1397:= 1392:i 1388:P 1361:, 1358:V 1355:I 1352:= 1347:0 1343:C 1321:, 1318:) 1313:1 1307:i 1303:C 1294:i 1290:P 1286:( 1281:K 1277:E 1273:= 1268:i 1264:C 979:i 977:( 975:g 965:i 957:i 955:( 953:g 948:i 945:Y 932:i 924:0 918:i 912:i 909:Y 896:0 888:i 882:i 879:Y 866:0 861:) 857:i 850:i 844:i 838:i 835:Y 822:0 814:i 808:i 802:i 799:Y 787:i 785:Y 779:i 773:i 770:Y 696:2 692:1 681:2 673:1 619:H 582:E 450:n 446:n 410:C 246:( 238:( 34:. 20:)

Index

Encryption mode
Modus operandi

block cipher
information security
confidentiality
authenticity
bits
block
initialization vector
ciphertexts
plaintext
key
block size
padded
stream cipher
integrity protection
confidentiality
authenticity
authenticated encryption
FIPS 81
National Institute of Standards and Technology
AES
SP800-38A
XTS-AES
SP800-38E
ciphertext stealing
XTS
message authentication code
CBC-MAC

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.