Block Cipher Operations
Block Cipher Operations
Network Security
Chapter 6
Fifth Edition
by William Stallings
OTP
can pre-compute
bit errors do not propagate
more vulnerable to message stream modification...
change arbitrary bits by changing ciphertext
sender & receiver must remain in sync
only use with full block feedback
subsequent research has shown that only full block
feedback (ie CFB-64 or CFB-128) should ever be used
Counter (CTR)
a “new” mode, though proposed early on
similar to OFB but encrypts counter value
rather than any feedback value
Oi = EK(i)
Ci = Pi XOR Oi
must have a different key & counter value
for every plaintext block (never reused)
again, OTP issue
uses: high-speed network encryptions
Counter
(CTR)
Advantages and Limitations of
CTR
efficiency
can do parallel encryptions in h/w or s/w
can preprocess in advance of need
good for bursty high speed links
random access to encrypted data blocks
provable security (good as other modes)
never have cycle less than 2b
but must ensure never reuse key/counter
values, otherwise could break (cf OFB)
Feedback
Character-
istics
XTS-AES Mode
need mode for block oriented storage
– No extra room in sector – data only
– Disk addressed by sector number
– Encryption can only take key externally
– Encryption can also use sector#, block#
Access to any sector should be
independent of other sectors
Must prevent attack that copies sector to
unused sector, then requests decryption
XTS-AES Mode
new mode, for block oriented storage use
in IEEE Std 1619-2007
concept of tweakable block cipher
different requirements to transmitted data
uses AES twice for each block
Tj = EK2(i) XOR αj
Cj = EK1(Pj XOR Tj) XOR Tj
where i is tweak & j is sector no
each sector may have multiple blocks
XTS-AES
Mode
per block
Key whitening applied by XOR
With “tweak” that depends on
- sector
- block
- second key
Makes attacks more difficult
Makes operations depend on
data location
XTS-AES
Mode
Overview
Advantages and Limitations of
XTS-AES
efficiency
can do parallel encryptions in h/w or s/w
random access to encrypted data blocks
has both nonce & counter
addresses security concerns related to
stored data
Summary
Multiple Encryption & Triple-DES
Modes of Operation
ECB, CBC, CFB, OFB, CTR, XTS-AES
Next – Stream ciphers (Ch 7), then hash
functions (Ch 11)