ALA10: MODES OF OPERATION

There are five modes of block ciphers operation, called ECB, CBC, CFB, OFB, CTR.

Besides our notes, here we have five interesting related contents and research works that you may refer to:

Block Ciphers Encryption Modes & Use DES to Construct Stream Ciphers pg. 27-38 by Fabio Martignon LRI, France.

Evaluation Criteria (Modes of Operation) by Murat Kantarcioglu, UTD Dallas.

FIPS81 DES Modes of Operation by NIST.

Error Propagation in Various Cipher Block Modes by Karel Burda, BrnoUT Czech Republic.

Block Ciphers Modes of Operation by Tutorialspoint.

You may refer to other resources also for references.

1. Each group member must perform research individually: (1.5 marks)

  • Member 1 ECB & CTR
  • Member 2 CBC
  • Member 3 CFB
  • Member  4 OFB

Compare and discuss the advantage(s) and disadvantage(s) for each of properties:

  1. Identical plaintext
  2. Chaining dependencies
  3. Error propagation
  4. Efficiency

2. Then come out with ONE comparative table for modes of operation. (2 marks)

3. Then make an interesting Question and Answer based video. Maximum 5 minutes only. Publish on youtube. Share the link on the e-learning forum. (1.5 marks)

Explore & enjoy.

Due: Dec 2, 2024 Monday

The difference between Authentication, Authorisation and Access Control

It is important to have a clear difference of security concept – authentication, authorisation and access control.  There are several discussion, some also provide analogy and comparison table. For better understanding you may study them and have your own definition.
They are:
  1. IBM Knowledge Centre [link]
  2. Priocept [link]
  3. CloudKnox [link]
  4. BU TechWeb[link]
DIY task in 10 minutes:  Write down your own definition of Authentication, Authorisation and Access Control on A4 paper. Submit during the class.
Rashidah Kadir 
20190920 12:57pm(Jumaat)

Cryptography Task 1 | Security Threats, Services and Mechanism

CRYPTOGRAPHY – TASK 1

As an Security Consultant, review ONE cryptography application, then;

  1. Identify and discuss the main task offered that require security mechanism.
  2. Identify and elaborate security threats against the application.
  3. Identify and explain existing cryptography security services and security mechanism of the application.

Find the example of cryptography applications on Introduction note – page 2.

Prepare a slide of your review results and present (more to knowledge sharing).

Do follow the Guidelines of the task. [pdf]

 

Other related information: