{"id":1534,"date":"2020-12-15T07:29:07","date_gmt":"2020-12-14T23:29:07","guid":{"rendered":"http:\/\/people.utm.my\/rashidah\/?p=1534"},"modified":"2021-12-16T07:50:05","modified_gmt":"2021-12-15T23:50:05","slug":"cryptography-modes-of-operation","status":"publish","type":"post","link":"https:\/\/people.utm.my\/rashidah\/2020\/12\/15\/cryptography-modes-of-operation\/","title":{"rendered":"Cryptography: Modes of Operation"},"content":{"rendered":"\n<p><strong>Five&nbsp;modes of operation<\/strong>, called<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Electronic Codebook (ECB)\u00a0<\/strong>&#8211; Group 1 &amp; 6<\/li><li><strong>Cipher Block Chaining (CBC)<\/strong>\u00a0&#8211; Group 2, 7 &amp; 11<\/li><li><strong>Cipher Feedback (CFB)<\/strong>\u00a0&#8211; Group 3, 8 &amp; 12<\/li><li><strong>Output Feedback (OFB)<\/strong> &#8211; Group 4, 9 &amp; 13<\/li><li><strong>Counter (CTR) <\/strong>&#8211; Group &#8211; 5 &amp; 10<\/li><\/ol>\n\n\n\n<p>Each group may execute our CL activity based on modes of operation given. <\/p>\n\n\n\n<p>****<\/p>\n\n\n\n<p><strong>Scaffolding<\/strong> for our cooperative learning (CL) activity. <\/p>\n\n\n\n<p>Besides our notes, here we have <strong>six interesting related contents and research works<\/strong> that you may refer to:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lri.fr\/~fmartignon\/documenti\/systemesecurite\/4-DES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Block Ciphers Encryption Modes &amp; Use DES to Construct Stream Ciphers<\/a> pg. 27-38 by Fabio Martignon LRI, France.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.utdallas.edu\/~muratk\/courses\/crypto09s_files\/modes.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Evaluation Criteria (Modes of Operation)<\/a> by Murat Kantarcioglu, UTD Dallas.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/csrc.nist.gov\/csrc\/media\/publications\/fips\/81\/archive\/1980-12-02\/documents\/fips81.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS81 DES Modes of Operation<\/a> by NIST.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.maths.usyd.edu.au\/u\/kohel\/tch\/MATH3024\/Lectures\/lectures_05.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Modes of Operation Properties<\/a> by David Kohel, USYD Sydney.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/235934999_Error_Propagation_in_Various_Cipher_Block_Modes\">Error Propagation in Various Cipher Block Modes<\/a> by Karel Burda, BrnoUT Czech Republic.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tutorialspoint.com\/cryptography\/block_cipher_modes_of_operation.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Block Ciphers Modes of Operation<\/a> by Tutorialspoint.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>You may refer to other resources also for references. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Explore &amp; enjoy. <\/p>\n\n\n\n<p>-msrashidah UTM (updated Dec, 2021)<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Five&nbsp;modes of operation, called Electronic Codebook (ECB)\u00a0&#8211; Group 1 &amp; 6 Cipher Block Chaining (CBC)\u00a0&#8211; Group 2, 7 &amp; 11 Cipher Feedback (CFB)\u00a0&#8211; Group 3, 8 &amp; 12 Output Feedback (OFB) &#8211; Group 4, 9 &amp; 13 Counter (CTR) &#8211; Group &#8211; 5 &amp; 10 Each group may execute our CL activity based on modes &hellip; <a href=\"https:\/\/people.utm.my\/rashidah\/2020\/12\/15\/cryptography-modes-of-operation\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cryptography: Modes of Operation<\/span><\/a><\/p>\n","protected":false},"author":582,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1534","post","type-post","status-publish","format-standard","hentry","category-other"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/comments?post=1534"}],"version-history":[{"count":9,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1534\/revisions"}],"predecessor-version":[{"id":1548,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1534\/revisions\/1548"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/media?parent=1534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/categories?post=1534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/tags?post=1534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}