Problem
1. Define CFR and list its advantages and disadvantages.
2. Divide the five modes of operation into two groups: those that use the encryption and decryption functions of the underlying cipher (for example, DES or AES) and those that use only the encryption function.