Modes of Encryption and Decryption
Modes of Encryption and Decryption
DECRYPTION
ECB
ENCRYPTION
DECRYPTION
ANALYSIS OF ECB
APPLICATION :
This is the mode of operation used by Private Encryptor.
ADVANTAGE :
ECB is the fastest.
Easiest to implement.
Most common mode of DES seen in commercial applications.
DISADVANTAGE :
ECB is the weakest of the various modes because no additional security
the ciphertext
the key
the ciphertext for the previous block
The first block to be encrypted has no previous ciphertext.
So, the plaintext is XORed with a 64-bit number called the Initialization Vector, or IV
for short.
ENCRYPTION
DECRYPTION
ANALYSIS OF CBC
ADVANTAGE :
The error doesn't propagate any further.
DISADVANTAGE :
This mode of operation is more secure than ECB because
the extra XOR step adds one more layer to the encryption
process.
can be encrypted.
Normally, special processing has to be used to handle files whose
size is not a perfect multiple of 8 bytes, but this mode removes that
necessity (Private Encryptor handles this case by adding several
dummy bytes to the end of a file before encrypting it).
The plaintext itself is not actually passed through the DES algorithm, but merely XORed
with an output block from it, in the following manner:
A 64-bit block called the Shift Register is used as the input plaintext to
DES.
This is initially set to some arbitrary value, and encrypted with the DES
algorithm.
The ciphertext is then passed through an extra component called the Mbox, which simply selects the left-most M bits of the ciphertext, where M is
the number of bits in the block we wish to encrypt.
This value is XORed with the real plaintext, and the output of that is the
final ciphertext.
Finally, the ciphertext is fed back into the Shift Register, and used as the
plaintext seed for the next block to be encrypted.
ENCRYPTION
DECRYPTION
ANALYSIS OF CFB
ADVANTAGE :
This mode of operation is similar to CBC and is very secure.
DISADVANTAGE :
As with CBC mode, an error in one block affects all subsequent blocks
fed back into the Shift Register, rather than the actual final ciphertext.
The Shift Register is set to an arbitrary initial value.
It is then passed through the DES algorithm.
The output from DES is passed through the M-box and then fed back into
the Shift Register to prepare for the next block.
This value is then XORed with the real plaintext (which may be less than
64 bits in length, like CFB mode), and the result is the final ciphertext.
ENCRYPTION
DECRYPTION
ANALYSIS OF OFB
ADVANTAGE :
Unlike CFB and CBC, a transmission error in one block will not affect
subsequent blocks because once the recipient has the initial Shift Register value,
it will continue to generate new Shift Register plaintext inputs without any
further data input.
Knowledge of the key is not required.
DISADVANTAGE :
This mode of operation is less secure than CFB mode because only the
real ciphertext and DES ciphertext output is needed to find the plaintext of
the most recent block.
RELIABILITY OF DES
There are many attacks and methods recorded
RELIABILITY OF AES
Brute force attack is the only effective attack
BLOWFISH
Blowfish is a symmetric block cipher that can be effectively used for
RELIABILITY OF BLOWFISH
Though it suffers from weak keys problem, no