Professional Documents
Culture Documents
Operation
Alberto Grand
Politecnico di Torino
Computer Systems Security – prof. Antonio Lioy
What are modes of operation?
2
Electronic Codebook (ECB)
Associates each possible plaintext block to a
ciphertext block, like a codebook.
Requires padding
Encryption/decryption of multiple blocks in parallel
A 1-bit error in a ciphertext block garbles the
corresponding decrypted block.
3
Deficiencies of ECB
IV
CIPHER-1 CIPHER-1
CIPHER CIPHER IV
7
Cipher Feedback (CFB)
8
Features of CFB
9
OpenPGP with CFB
IV IV
11
Features of OFB (i)
12
Features of OFB (ii)
13
Counter (CTR)
14
Features of CTR (i)
15
Features of CTR (ii)
16
Padding: pros and cons
19
Related-mode attacks (ii)
He chooses P’i = C0 + i
C’i = CIPHk(P’i)
20
The CMAC Mode for
Authentication
What is CMAC?
22
Once upon time…
23
Subkey generation
if Mlen = 0 then n ⃪ 1
else n ⃪ ⌈M
⌈ len / b⌉⌉
if M*n complete then Mn ⃪ M*n ⊕ K1
else Mn ⃪ (M*n ‖10j) ⊕ K1
C0 ⃪ 0b
for i ⃪ 1 to n do
Ci ⃪ CIPHk (Ci-1 ⊕ Mi)
T ⃪ MSBTlen(Cn)
25
CMAC verification
26
Length of the MAC (i)
27
Length of the MAC (ii)
28
Message span of the key (i)
29
Message span of the key (ii)
30
Protection vs. replay attacks
31
Any questions?
32