Tag: modes-of-operation

4 Implementing CBC Encryption Using Decryption 2015-08-01T21:08:53.817

4 What are the constraints on using GCM with a tag size of 96 and 128 bits 2015-08-06T22:17:28.733

4 Single bit error in CBC 2015-10-29T19:25:59.453

4 Block cipher mode of operation with beyond-birthday-bound security 2016-02-17T07:34:40.333

4 Should I use a self-designed Block Cipher Mode of Operation? 2016-03-23T07:37:54.623

4 How secure would hand ciphers be using a Block Cipher Mode? 2016-03-28T21:14:13.880

4 AES in Counter mode for 64 bit input 2016-12-18T18:11:30.163

4 Modes of Triple DES - When to use each? 2017-03-03T04:57:18.657

4 Security of AES in CTR mode with fixed nonce (but different key) 2017-09-27T14:02:19.123

4 Why is SIV a thing if MAC-and-encrypt is not the most secure way to go? 2018-01-02T21:55:44.170

4 Is error propagation desired in modes of operation 2018-03-02T01:07:54.830

4 Text partially decrypted regardless of IV 2018-03-26T05:59:23.963

4 Random Access vs. Parallelism modes of operation 2018-05-26T09:08:40.030

4 "Weak" implementation of AES-CTR? 2018-10-23T10:59:05.940

4 Known Plaintext Attack on Block Cipher in ECB and CBC Modes of Operations 2018-10-25T20:25:28.867

3 How can I encrypt more than 64 bit with the Data Encryption Standard? 2011-10-26T19:16:58.707

3 OCB - brute force against unknown IV 2012-01-18T13:53:12.280

3 What "Tag Length" should be used for the EAX MAC? 2012-04-10T09:04:18.530

3 What cipher mode is suitable for independantly decryptable short messages? 2012-11-28T22:36:24.500

3 Why nobody considers counter re-keying as a standard Block Cipher Mode? 2013-02-22T19:57:57.957

3 Non-malleable file encryption using AES XTS 256? 2013-06-24T21:28:55.653

3 CBC with random prefix but no IV - secure? 2013-07-12T03:57:27.913

3 Block Cipher Mode Amicable to Fast Key Change/Rotation Like XOR? 2013-12-11T03:04:27.113

3 IV/Nonce in CTR&GCM mode of operation 2014-02-17T08:21:06.877

3 Can XEX or XTS modes be used with only one tweak? 2014-04-30T05:40:02.637

3 Error propagation in CBC mode 2014-05-26T19:09:31.870

3 How do I construct variable length input (VIL) in a block cipher mode? 2014-06-08T19:40:54.143

3 Galois field step in XEX mode 2014-07-14T15:54:07.180

3 AES-ECB as an authentication mechanism 2014-09-03T14:55:12.660

3 How does CTR-ESSIV work? 2015-02-08T22:06:42.213

3 Can IGE mode be parallelized? 2015-03-07T06:49:46.373

3 Is MCrypt's 8-bit OFB mode secure? 2015-04-18T14:04:29.390

3 Post-quantum authenticated encryption 2015-05-18T23:07:49.470

3 Is it practical to use a stream cipher in a block cipher mode? 2015-05-25T09:40:25.003

3 Precisely how does CBC mode use the initialization vector? 2015-09-11T23:44:47.060

3 Unknown authenticated encryption mode 2015-10-27T11:11:24.017

3 Are all self-synchronizing cryptosystems necessarily self-synchronizing stream ciphers? 2016-03-31T04:05:21.843

3 How secure is $\operatorname{AES256}_{\operatorname{ECB}}(\operatorname{ChaCha20}(\text{plaintext}))$? 2016-04-08T00:31:55.600

3 Is OCB the state of the art in authenticated encryption modes of operation for block ciphers? 2016-04-13T12:25:54.643

3 Why can't we use the first block of AES-CBC as MAC 2016-04-16T09:13:57.560

3 Can I use a block cipher in CTR mode to generate keys from a master key? 2016-05-20T00:30:25.120

3 Should I use XTS or GCM to encrypt my hard drives? 2016-05-23T10:26:22.577

3 Cryptopals challenge 2.11: Distinguish ECB and CBC encryption 2017-11-18T18:57:25.937

3 Does XEX mode specify how the whitening value is generated? 2017-12-01T00:10:51.877

3 Propagating CBC insecure Authenticated Encryption 2018-05-29T08:10:44.530

3 Are there recommended modes of operation for lightweight ciphers? 2018-10-24T11:27:58.147

2 How does Output Feedback mode use the initialization vector? 2012-04-30T08:49:15.000

2 Is my pseudo-random initialization vector secure? 2012-05-22T13:35:11.213

2 Difference in one time key and one time pad and many time key 2012-08-22T00:31:15.947

2 Is there an efficient way to hide the encrypted plaintext length with a block cipher? 2013-03-11T10:11:43.730

2 Camellia cipher - is it a symmetric or asymmetric cipher? 2013-08-14T11:16:09.433

2 AES with different modes of operation 2013-09-14T19:40:09.937

2 Is it possible to split a large AES encrypted string and decrypt the parts one by one? 2013-12-06T13:58:58.953

2 Encryption mode with chained algorithms 2014-03-23T14:52:41.127

2 Difference between plain AES CTR and "CCM-style" CTR 2014-04-10T18:37:35.010

2 Construct block cipher from a smaller one with mixing function 2014-08-17T21:22:41.277

2 Is any specific packet cipher mode to be prefered for use with – for example – UDP? 2014-08-23T01:42:01.487

2 How can AES be considered secure when encrypting large files? 2014-09-11T18:12:06.667

2 Does AES CTR mode store header information in encrypted files? 2014-10-06T13:22:26.723

2 What is the use of segments in Cipher Feedback Mode (CFB) 2014-11-12T00:24:45.277

2 Why are modes of operation used, what attacks do they prevent? 2015-03-12T10:15:16.740

2 About the Security of PCBC Encryption Mode 2015-03-21T14:45:19.447

2 Does XTS provide random write access? 2015-07-03T08:50:09.213

2 How can I read the AE figures? 2015-07-23T12:57:08.737

2 Subkey generation in OMAC1/CMAC with XTEA? 2015-09-16T12:37:25.120

2 Is it secure to encrypt random key with block cipher in ECB mode? 2015-12-08T06:33:42.070

2 security of a block cipher mode of operation 2016-04-12T03:24:12.553

2 Is there a cipher that uses part of the already-computed ciphertext in the encryption scheme? 2016-07-30T02:43:21.560

2 Repeated NONCE in CTR mode 2016-08-24T05:01:54.183

2 If using large keysizes, is McOE-X actually safe? 2016-09-09T12:25:46.940

2 Why do the majority of SSL cipher suite used CBC? 2016-09-30T17:14:24.717

2 Double-CBC as AES-KW Substitute? 2017-06-17T12:41:14.143

2 Are there any deterministic multi-block encryption constructions that have an avalanche effect going both ways? 2017-06-18T04:17:09.890

2 Security of CCM in TLS, in comparison to GCM, SHA or SHA2 for the digest 2017-07-24T07:06:08.003

2 Why is using an authenticated AES mode better for in-place data protection? 2017-08-03T18:21:41.470

2 How does CCM handle variable-length messages? 2017-11-16T17:02:32.287

2 Why does the Gameboy Advance serial encryption include the destination byte address? 2017-12-20T05:52:55.827

2 Does it matter how the IV and XOR are applied for a single AES-128 block? 2018-09-27T00:12:27.047

2 TLS ciphersuite without mode of operation 2018-10-24T09:41:02.460

1 Complexity of ECB and OFB 2012-05-03T16:01:50.987

1 Which attacks can be avoided by the use of OFB instead of ECB? 2012-05-03T16:49:15.077

1 Partial decryption of large file in AES-GCM (or other modes)? 2013-03-13T00:31:07.877

1 Do I need to know the "mode of operation" to decrypt a message encrypted with a block cipher? 2013-04-06T18:47:28.250

1 How to build a secure AE scheme with generic composition? 2013-06-23T21:54:06.143

1 Compared to GCM or XTS modes, how secure is H xor R1, E (R2, R1, Message) for confidentiality and integrity? 2014-02-21T00:06:12.623

1 Does not using padding mean a lack of security? 2014-05-01T15:20:15.740

1 Modes of Operations Exercise 2014-06-18T12:24:28.533

1 Modes of operation for Public Key Encryption schemes 2014-09-20T04:02:17.017

1 Random vs. Fixed Paddings 2014-09-22T10:53:10.360

1 The perfect way of using IV in CTR mode 2015-01-13T16:02:56.663

1 With wrong IV at receiver side, the CFB in better than OFB? 2015-01-27T22:38:08.060

1 What are the advantages of using OFB (Output Feedback Mode)? 2015-07-04T19:30:14.640

1 Is super encryption (aka “multiple encryption”) always good? 2015-12-30T06:01:00.193

1 Security of a parallelizable block cipher mode 2016-02-03T23:56:46.807

1 Is this a better GCM? 2016-02-17T20:23:19.183

1 What information about the ciphertext can an attacker discern if a key is used too many times? 2016-02-24T23:39:08.497

1 Reykeyed AES in CTR mode as a stream cipher 2016-03-02T22:18:57.930

1 Is it possible to create a detection oracle for all block cipher modes? -- ciphertext-only cryptanalysis 2016-03-08T09:27:34.570

1 mode of operation in cryptography 2016-04-27T14:14:12.920