Cryptography: Modes of Operation

Five modes of operation, called

  1. Electronic Codebook (ECB) – Group 1 & 2
  2. Cipher Block Chaining (CBC) – Group 3, 4 & 11
  3. Cipher Feedback (CFB) – Group 5, 6 & 12
  4. Output Feedback (OFB) – Group 7 & 8
  5. Counter (CTR) – Group – 9 & 10

Each group may execute our CL activity based on modes of operation given.


Scaffolding for our cooperative learning (CL) activity.

Besides our notes, here we have six interesting related contents and research works that you may refer to:

Block Ciphers Encryption Modes & Use DES to Construct Stream Ciphers pg. 27-38 by Fabio Martignon LRI, France.

Evaluation Criteria (Modes of Operation) by Murat Kantarcioglu, UTD Dallas.

FIPS81 DES Modes of Operation by NIST.

Modes of Operation Properties by David Kohel, USYD Sydney.

Error Propagation in Various Cipher Block Modes by Karel Burda, BrnoUT Czech Republic.

Block Ciphers Modes of Operation by Tutorialspoint.

You may refer to other resources also for references.

Explore & enjoy.

-msrashidah UTM (Dec, 2020)

Upload Entry Survey

Go to UTM E-learning: At course main page, Turn editing on > Add an activity or resource > Then select activity - Feedback. Adding a new Feedback page will appear. Then fill in the Name field for example "DL Entry Survey", … [Continue reading]


Sihat dan ceria semua. Hari ini beberapa program mengujakan berjalan. RCEE 2020 The RCEE 2020 Keynote Session starts at 9.30 a.m - 29th September 2020, Tuesday. STEM EDUCATION: A TALE OF TWO PARADIGMS or EVEN PANDEMICS MAY HAVE THEIR … [Continue reading]

Benchmark – COA’s Module 8

CPU & Hardware Performance Benchmarks In computing, a benchmark is the act of running a computer program, a set of programs, or other operations, in order to assess the relative performance of an object, normally by running a number of standard … [Continue reading]

Software Security: Code Review

CODE REVIEW   Industries: Source Code Review (Malaysia) Quite remarkable to know that industries in Malaysia are involving in current cyber security requirements by providing services such as code review and penetration testing. Some of them … [Continue reading]


Assalamualaikum dan selamat kembali ke UTM. Pasti selepas Latihan Industri (LI), semangat dah lain. Berkobar-kobar semua nak siapkan PSM 2 sem ini.    “Zulhamdi belum LI, tak apa. Kita buat PSM 2 sama-sama, dapat aura sama!”   Ada info … [Continue reading]

The difference between Authentication, Authorisation and Access Control

It is important to have a clear difference of security concept - authentication, authorisation and access control.  There are several discussion, some also provide analogy and comparison table. For better understanding you may study them and have … [Continue reading]

Berita Keselamatan Siber

Berita Keselamatan Siber di Malaysia Penipuan transaksi online naik. [2019, Jan 11] … [Continue reading]

Borang-borang Latihan Industri (download)

Borang BLI-1C - permohonan Surat Pengesahan Pelajar dari Sekolah Komputeran, UTM |BLI-1C Borang LI_template| … [Continue reading]

Pengesahan Penerbitan dan Insentif Penerbitan

Maklumat pustakawan UTM bagi : Pengesahan Penerbitan/Insentif Penerbitan Pn Norashikin Johari Tel: 07-5530029 Email: Pengesahan Kenaikan Pangkat/Insentif Penerbitan Pn Syahranah Ahmad Raqi Tel: 07-5530027 Email: … [Continue reading]