--%>

Block cipher modes

Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?

E

Expert

Verified

Some block cipher modes of the operation use the encryption since input is set to some initialization vector and leftmost bits of output of encryption function are XORed along with the first segment of the plain text p1 in order to generate the first unit of the cipher text C1 and it is sent. However in the decryption, cipher text is XORed along with the output of encryption function in order to generate the plain text. 

   Related Questions in Computer Network Security

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Key algorithms in S/MIME Specify the

    Specify the key algorithms which are used in the S/MIME?

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : MIME content type State the MIME

    State the MIME content type &explain?

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?

  • Q : LAN Security Systems LAN Security

    LAN Security Systems: The threats might be of very serious concern to the organization and hence they should be addressed with the deployment of a security system which can prevent the attacker to access the information which is sensitive to the organ

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : Problems related to Cryptography and

    A) Provide a specific illustration of how inference control might be implemented in the database.B) For a public-key encryption system (like PGP), list some areas for and against utilizing the similar key pair for both encryption and signature.

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Reusing the stream cipher key Explain

    Explain why it is not desirable to reuse the stream cipher key?