SlideShare a Scribd company logo
Comparative analysis on DES model ECB, CBC, CFB,
OFB, CTR
Course Name: Computer, Data and Network Security
Course Code: CSE 802
Submitted by
Rayhanul Islam BSSE 0203
Md. Saeed Siddik BSSE 0218
Md. Selim BSSE 0221
Submitted to
Dr. Md. Shariful Islam
Associate Professor
IIT, University of Dhaka
Date : 16th
September 2013
Institute of Information technology
University of Dhaka
Electronic codebook (ECB)
The simplest of the encryption modes is the electronic codebook (ECB) mode.
The message is divided into blocks and each block is encrypted separately.
The disadvantage of this method is that identical plaintext blocks are encrypted into
identical ciphertext blocks; thus, it does not hide data patterns well. In some
senses, it doesn't provide serious message confidentiality, and it is not
recommended for use in cryptographic protocols at all.
A striking example of the degree to which ECB can leave plaintext data patterns in
the ciphertext can be seen when ECB mode is used to encrypt a bitmap image
which uses large areas of uniform colour. While the colour of each individual pixel is
encrypted, the overall image may still be discerned as the pattern of identically
coloured pixels in the original remains in the encrypted version.
Encryption parallelizable: Yes
Decryption parallelizable: Yes
Cipher-block chaining (CBC)
IBM invented the cipher-block chaining (CBC) mode of operation in 1976 In CBC
mode, each block of plaintext is XOR with the previous ciphertext block before
being encrypted. This way, each ciphertext block depends on all plaintext blocks
processed up to that point. To make each message unique, an initialization vector
must be used in the first block.
CBC has been the most commonly used mode of operation. Its main drawbacks are
that encryption is sequential (i.e., it cannot be parallelized), and that the message
must be padded to a multiple of the cipher block size. One way to handle this last
issue is through the method known as ciphertext stealing. Note that a one-bit
change in a plaintext or IV affects all following ciphertext blocks.
Decrypting with the incorrect IV causes the first block of plaintext to be corrupt but
subsequent plaintext blocks will be correct. This is because a plaintext block can be
recovered from two adjacent blocks of ciphertext. As a consequence, decryption can
be parallelized. Note that a one-bit change to the ciphertext causes complete
corruption of the corresponding block of plaintext, and inverts the corresponding bit
in the following block of plaintext, but the rest of the blocks remain intact.
Cipher feedback (CFB)
The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher
into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB
decryption is almost identical to CBC encryption performed in reverse:
This simplest way of using CFB described above is not any more self-synchronizing
than other cipher modes like CBC. If a whole blocksize of ciphertext is lost both CBC
and CFB will synchronize, but losing only a single byte or bit will permanently throw
off decryption. To be able to synchronize after the loss of only a single byte or bit, a
single byte or bit must be encrypted at a time. CFB can be used this way when
combined with a shift register as the input for the block cipher.
Encryption parallelizable: No
Decryption parallelizable: Yes
Output feedback (OFB)
The output feedback (OFB) mode makes a block cipher into a synchronous stream
cipher. It generates keystream blocks, which are then XORed with the plaintext
blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the
ciphertext produces a flipped bit in the plaintext at the same location. This property
allows many error correcting codes to function normally even when applied before
encryption.
It is possible to obtain an OFB mode keystream by using CBC mode with a constant
string of zeroes as input. This can be useful, because it allows the usage of fast
hardware implementations of CBC mode for OFB mode encryption.
Using OFB mode with a partial block as feedback like CFB mode reduces the
average cycle length by a factor of 2^{32} or more. A mathematical model
proposed by Davies and Parkin and substantiated by experimental results showed
that only with full feedback an average cycle length near to the obtainable
maximum can be achieved. For this reason, support for truncated feedback was
removed from the specification of OFB.
Encryption parallelizable: No
Decryption parallelizable: No
Counter (CTR)
CTR mode has similar characteristics to OFB, but also allows a random access
property during decryption. CTR mode is well suited to operate on a multi-processor
machine where blocks can be encrypted in parallel. Furthermore, it does not suffer
from the short-cycle problem that can affect OFB.
The counter can be any function which produces a sequence which is guaranteed
not to repeat for a long time, although an actual increment-by-one counter is the
simplest and most popular. CTR mode is widely accepted, and problems resulting
from the input function are recognized as a weakness of the underlying block cipher
instead of the CTR mode. Along with CBC, CTR mode is one of two block cipher
modes recommended by many security specialists.
References
1. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Cryptography Engineering,
page 71, 2010
2. William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman,
"Message verification and transmission error detection by block chaining", US
Patent 4074066, 1976
3. http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
4. Cryptography and Network Security Principles and Practice, 5th Edition by W
Stallings

More Related Content

PPT
Information Security
PPTX
Information and data security block cipher operation
PDF
Block cipher modes of operations
PPTX
Block Cipher and Operation Modes
PPTX
Modes of Operation
PPT
Ciphers
PDF
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
PDF
4. algorithm modes (1)
Information Security
Information and data security block cipher operation
Block cipher modes of operations
Block Cipher and Operation Modes
Modes of Operation
Ciphers
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
4. algorithm modes (1)

What's hot (17)

PPTX
Block cipher modes of operation
PPT
Block Cipher and its Design Principles
PDF
PPTX
Byte rotation encryption algorithm
PDF
Ciphers modes
PPTX
Byte Rotation Algorithm
PPTX
Modern symmetric cipher
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Transposition cipher techniques
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPT
13528 l8
PPT
Network Security Lec4
PDF
Next generation block ciphers
PPT
DOCX
Symmetric ciphers questions and answers
PPT
Stream ciphers presentation
Block cipher modes of operation
Block Cipher and its Design Principles
Byte rotation encryption algorithm
Ciphers modes
Byte Rotation Algorithm
Modern symmetric cipher
Block Ciphers and the Data Encryption Standard
Transposition cipher techniques
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
13528 l8
Network Security Lec4
Next generation block ciphers
Symmetric ciphers questions and answers
Stream ciphers presentation
Ad

Viewers also liked (15)

PDF
Electronic delivery of services initiative
PDF
Connect dell equallogic storage to linux instance
PDF
Ict enabled municipal initiative
PDF
Comparison between VMware and Open Stack Cloud
PDF
Quantile Quantile Plot qq plot
PPT
Models in E-government
PPTX
Birth & death information automation
PDF
Deadlock in distribute system by saeed siddik
PPTX
E-governance Models
PDF
Uid management-system
PPTX
MIS Case Study
PDF
Online Bus ticket reservation
PDF
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
PDF
Employee Recruitment System srs
PDF
clinic database and software management system
Electronic delivery of services initiative
Connect dell equallogic storage to linux instance
Ict enabled municipal initiative
Comparison between VMware and Open Stack Cloud
Quantile Quantile Plot qq plot
Models in E-government
Birth & death information automation
Deadlock in distribute system by saeed siddik
E-governance Models
Uid management-system
MIS Case Study
Online Bus ticket reservation
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Recruitment System srs
clinic database and software management system
Ad

Similar to Comparative analysis on different DES model (20)

PPTX
Cryptography and Network Security-MOD_3.pptx
PPTX
Lectrue-09,10ModofOperation in information security.pptx
PPTX
Cipher Block Operations Presentation Slide.
PPTX
Block cipher and stream cipher-1.2.2pptx copy.pptx
PPT
NIS block cipher modes network and information security
PPT
modes-of-operation in cryptography. .ppt
PPTX
block ciphermodes of operation.pptx
PDF
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
PPTX
Encryption
PPTX
12_2019_12_03!04_59_50_PM symmetric.pptx
PPT
CR 06 - Block Cipher Operation.ppt
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PPT
PDF
Block Ciphers Modes of Operation
PDF
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PPTX
Data Encryption Standard (DES)
Cryptography and Network Security-MOD_3.pptx
Lectrue-09,10ModofOperation in information security.pptx
Cipher Block Operations Presentation Slide.
Block cipher and stream cipher-1.2.2pptx copy.pptx
NIS block cipher modes network and information security
modes-of-operation in cryptography. .ppt
block ciphermodes of operation.pptx
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
Encryption
12_2019_12_03!04_59_50_PM symmetric.pptx
CR 06 - Block Cipher Operation.ppt
Unit 1_Transposition Techniques_Ciphers.pdf
Block Ciphers Modes of Operation
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Data Encryption Standard (DES)

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Touch Screen Technology
PPTX
TLE Review Electricity (Electricity).pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
A comparative study of natural language inference in Swahili using monolingua...
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Touch Screen Technology
TLE Review Electricity (Electricity).pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Chapter 5: Probability Theory and Statistics
Univ-Connecticut-ChatGPT-Presentaion.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

Comparative analysis on different DES model

  • 1. Comparative analysis on DES model ECB, CBC, CFB, OFB, CTR Course Name: Computer, Data and Network Security Course Code: CSE 802 Submitted by Rayhanul Islam BSSE 0203 Md. Saeed Siddik BSSE 0218 Md. Selim BSSE 0221 Submitted to Dr. Md. Shariful Islam Associate Professor IIT, University of Dhaka Date : 16th September 2013 Institute of Information technology University of Dhaka
  • 2. Electronic codebook (ECB) The simplest of the encryption modes is the electronic codebook (ECB) mode. The message is divided into blocks and each block is encrypted separately. The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all. A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext can be seen when ECB mode is used to encrypt a bitmap image which uses large areas of uniform colour. While the colour of each individual pixel is encrypted, the overall image may still be discerned as the pattern of identically coloured pixels in the original remains in the encrypted version. Encryption parallelizable: Yes Decryption parallelizable: Yes Cipher-block chaining (CBC) IBM invented the cipher-block chaining (CBC) mode of operation in 1976 In CBC mode, each block of plaintext is XOR with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block. CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message
  • 3. must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as ciphertext stealing. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks. Decrypting with the incorrect IV causes the first block of plaintext to be corrupt but subsequent plaintext blocks will be correct. This is because a plaintext block can be recovered from two adjacent blocks of ciphertext. As a consequence, decryption can be parallelized. Note that a one-bit change to the ciphertext causes complete corruption of the corresponding block of plaintext, and inverts the corresponding bit in the following block of plaintext, but the rest of the blocks remain intact. Cipher feedback (CFB) The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse: This simplest way of using CFB described above is not any more self-synchronizing than other cipher modes like CBC. If a whole blocksize of ciphertext is lost both CBC and CFB will synchronize, but losing only a single byte or bit will permanently throw off decryption. To be able to synchronize after the loss of only a single byte or bit, a single byte or bit must be encrypted at a time. CFB can be used this way when combined with a shift register as the input for the block cipher. Encryption parallelizable: No Decryption parallelizable: Yes Output feedback (OFB) The output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption.
  • 4. It is possible to obtain an OFB mode keystream by using CBC mode with a constant string of zeroes as input. This can be useful, because it allows the usage of fast hardware implementations of CBC mode for OFB mode encryption. Using OFB mode with a partial block as feedback like CFB mode reduces the average cycle length by a factor of 2^{32} or more. A mathematical model proposed by Davies and Parkin and substantiated by experimental results showed that only with full feedback an average cycle length near to the obtainable maximum can be achieved. For this reason, support for truncated feedback was removed from the specification of OFB. Encryption parallelizable: No Decryption parallelizable: No Counter (CTR) CTR mode has similar characteristics to OFB, but also allows a random access property during decryption. CTR mode is well suited to operate on a multi-processor machine where blocks can be encrypted in parallel. Furthermore, it does not suffer from the short-cycle problem that can affect OFB. The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is the simplest and most popular. CTR mode is widely accepted, and problems resulting from the input function are recognized as a weakness of the underlying block cipher instead of the CTR mode. Along with CBC, CTR mode is one of two block cipher modes recommended by many security specialists. References 1. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Cryptography Engineering, page 71, 2010 2. William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining", US Patent 4074066, 1976 3. http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation 4. Cryptography and Network Security Principles and Practice, 5th Edition by W Stallings