ALA10: MODES OF OPERATION

There are five modes of block ciphers operation, called ECB, CBC, CFB, OFB, CTR.

Besides our notes, here we have five interesting related contents and research works that you may refer to:

Block Ciphers Encryption Modes & Use DES to Construct Stream Ciphers pg. 27-38 by Fabio Martignon LRI, France.

Evaluation Criteria (Modes of Operation) by Murat Kantarcioglu, UTD Dallas.

FIPS81 DES Modes of Operation by NIST.

Error Propagation in Various Cipher Block Modes by Karel Burda, BrnoUT Czech Republic.

Block Ciphers Modes of Operation by Tutorialspoint.

You may refer to other resources also for references.

1. Each group member must perform research individually: (1.5 marks)

  • Member 1 ECB & CTR
  • Member 2 CBC
  • Member 3 CFB
  • Member  4 OFB

Compare and discuss the advantage(s) and disadvantage(s) for each of properties:

  1. Identical plaintext
  2. Chaining dependencies
  3. Error propagation
  4. Efficiency

2. Then come out with ONE comparative table for modes of operation. (2 marks)

3. Then make an interesting Question and Answer based video. Maximum 5 minutes only. Publish on youtube. Share the link on the e-learning forum. (1.5 marks)

Explore & enjoy.

Due: Dec 2, 2024 Monday

The difference between Authentication, Authorisation and Access Control

It is important to have a clear difference of security concept – authentication, authorisation and access control.  There are several discussion, some also provide analogy and comparison table. For better understanding you may study them and have your own definition.
They are:
  1. IBM Knowledge Centre [link]
  2. Priocept [link]
  3. CloudKnox [link]
  4. BU TechWeb[link]
DIY task in 10 minutes:  Write down your own definition of Authentication, Authorisation and Access Control on A4 paper. Submit during the class.
Rashidah Kadir 
20190920 12:57pm(Jumaat)