Skip to main content

Questions tagged [cfb]

Cipher Feedback Mode (CFB) is an encryption mode, that builds a self-synchronizing stream-cipher from a block-cipher.

0 votes
1 answer
181 views

I'm making documentation for an ethernet gateway that using Lantronix xPortEDGE module. It can encrypt/decrypt in AES 128, 192 and 256 bits. I'm struggling to get more information from the ...
corso66's user avatar
0 votes
0 answers
112 views

Full-State Keyed Sponge (aka Donkey Sponge) appears to cross over into block cipher mode territory such as Full Block Cipher Feedback Mode: Full State Keyed Sponge (FKS) construction: FKS has been ...
LightTunnelEnd's user avatar
2 votes
2 answers
260 views

I need to generate a key and IV that will be used to encrypt multiple things over a period of time with AES in CFB mode. The decision to use AES in CFB mode is not mine to change and the key will only ...
Jonathan Wilson's user avatar
1 vote
0 answers
652 views

We use DES in cipher feedback mode (CFB) to encrypt a plaintext $m = m_1\mathbin\|m_2\mathbin\|\ldots\mathbin\|m_{100}$ into a ciphertext $c_1\mathbin\|c_2\mathbin\|\ldots\mathbin\|c_{100}$, where ...
user108810's user avatar
1 vote
0 answers
73 views

To encrypt plaintext $(P_1, P_2, P_3, ... P_n)$ Ciphertext Feedback Mode (CFB) works as follows :- $$ C_0 = IV \\ C_i = E_K (C_{i-1}) \oplus P_i $$ Lets define a modified version of CFB mode as ...
crypt's user avatar
  • 2,532
8 votes
1 answer
1k views

I recently implemented AES block cipher, encryption side only, to be used in QUIC parsing (QUIC uses GCM mode). There are other modes than GCM that use only encryption: for example CTR, OFB, and CFB. ...
juhist's user avatar
  • 1,643
3 votes
1 answer
210 views

I don't understand why $\text{CBC-MAC}(M) = \text{CFB-MAC}(M)$. Has it something to do with $\text{CBC-MAC}(M) = C_L$ and $\text{CFB-MAC}(M) = E_K(C'_{L-1})$?
user97599's user avatar
2 votes
1 answer
159 views

Is SIV mode variant equally secure, if you replace CTR mode encryption with full-block CFB mode encryption? CFB seems to be safe with predictable IV: Is using a predictable IV with CFB mode safe or ...
LightBit's user avatar
  • 1,741
5 votes
2 answers
426 views

According to Wikipedia block cipher modes of operation, simplified CFB supports random read access. but what about the real CFB where we have a shift register? below are pictures extracted from the ...
Masoud jt's user avatar
  • 165
3 votes
1 answer
639 views

I am studying for a test and I don't seem to understand the Block Cipher and its different modes of operations especially when it comes to encrypting and decryption. Could anyone please help solve ...
IAMKIN's user avatar
  • 31
2 votes
2 answers
288 views

Actually, I'm reading the description about Zerologon attack from the original whitepaper document. In there, Tom Tervoort mentions these sentences: So I tried to come up with some chosen-plaintext ...
rjlara's user avatar
  • 21
0 votes
1 answer
3k views

What is the difference between cfb and cfb1 and cfb8 ? like openssl's aria-128-cfb and aria-128-cfb1 and ...
hanshenrik's user avatar
0 votes
1 answer
733 views

I'm really struggling to understand CFB mode (with DES if that matters). I realise after searching around here that these modes are now obsolete but I need to understand them for class. From wikipedia,...
Kiwi breeder's user avatar
1 vote
0 answers
340 views

I'm developing a medical device that operates under extreme low-power constraints and transmits data with BLE, where every unnecessary millisecond of air time matters. I am developing a Beacon ...
exitfailure's user avatar
0 votes
1 answer
78 views

I apologize if this is a dumb question but I'm trying to understand how the final block of partial plaintext is XORed using only n number of bytes in the final keystream block. How do we determine ...
onetruekey's user avatar

15 30 50 per page