Skip to main content

Questions tagged [modes-of-operation]

ways of applying a block cipher to multi-block messages and enabling repeated use without changing the key.

2 votes
0 answers
83 views

XChaCha20 takes a 192-bit nonce and a 64-bit counter, but I need a 256-bit nonce. Can I simply XOR the 64-bit counter to the bottom of a 256-bit random nonce? This would be analogue to the XCTR mode ...
luiz's user avatar
  • 95
0 votes
1 answer
122 views

My basic idea was that one can use a CBC mode of operation, with the file's message digest as an IV: The digest could then either be stored somewhere, or chaffed (dispersed) through the ciphertext, ...
GeoMldr's user avatar
2 votes
0 answers
43 views

To my mind, there are two go-to uses for a tweak input for a block cipher or mode of operation: A counter to make each block in a sequence of message blocks encrypt differently. A counter for a ...
Melab's user avatar
  • 4,328
3 votes
0 answers
65 views

PRINCE is a low-latecy 64-bit block cipher designed for/by NXP (I don't know if anyone else uses it). For instance, this dev board FRDM-MCXN947 has the following diagram which shows the internal ...
yoyo's user avatar
  • 522
0 votes
1 answer
103 views

I'm learning about block cipher operation modes and have a small question. I am listening to a lecture recording that casually mentions that when using Galois Counter Mode with AES over the internet (...
Joshua Schroijen's user avatar
1 vote
0 answers
34 views

This question concerns any possible single-key block cipher mode of operation that would need two or more "subkeys", derived using the underlying block cipher, for direct invocations of the ...
Melab's user avatar
  • 4,328
1 vote
1 answer
125 views

This question is in regards to "A Graduate Course in Applied Cryptography" by Boneh-Shoup, section 6.4.1 "The CBC prefix-free secure PRF". In the proof for the security strength of ...
Evgeni Vaknin's user avatar
0 votes
0 answers
27 views

This is for understanding when the bound the birthday bound applies in block cipher modes. Suppose that $E(K, X)$/$D(K, X)$ is a block cipher. $T=T_0||T_1||T_2||T_3$ is a tweak value that is twice the ...
Melab's user avatar
  • 4,328
1 vote
0 answers
35 views

In the context of AE mode of operation, what is the maximum possible number of blocks that an $n$-bit MAC tag can protect? I'm assuming it's $2^{n / 2}$.
Melab's user avatar
  • 4,328
4 votes
0 answers
137 views

OCB (Offset Codebook Mode) for block ciphers is a very interesting approach to solving authentication with what appears to be the absolute minimal performance impact possible (for AE under a block ...
VeronicaL86's user avatar
1 vote
0 answers
56 views

Suppose you whiten plaintext with a weak stream cipher (that is not known-plaintext secure) such as the message/key schedule of SHA-2. Using key1 (ex. 512 bits for sha256 schedule). Then encrypt the ...
boolboolean's user avatar
2 votes
1 answer
308 views

Block ciphers have several modes of operation. Some of them (ECB, CBC) require that the function used for decryption be invertible. Other modes (CTR, OFB) use the same function for both encryption and ...
GossamerClaw3045's user avatar
1 vote
1 answer
204 views

I have a black box system that is doing some encryption that I need to reverse engineer so I can replicate it in new software. I know the input, the output, and the key. An example: Plain text: ...
Jordan's user avatar
  • 131
1 vote
0 answers
54 views

L3Harris lists “ECB w/VCC” as a supported AES mode of operation for some of their devices. There seems to be no information on such a mode of operation on the Internet. What could “ECB w/VCC” mean and ...
rkiyanchuk's user avatar
3 votes
1 answer
136 views

The CTR mode of operation converts a block cipher into a stream cipher by having it encrypt a series of counter values (which are derived from the nonce+IV). So long as the counter values used with a ...
oaky_0ffc's user avatar
  • 345

15 30 50 per page
1
2 3 4 5
24