Problem
1. Show the diagram for encryption and decryption in the CFB mode when r = n.
2. Show the diagram for encryption and decryption in the OFB mode when r = n.
3. Show the processes used for decryption algorithm in ECB mode if cipher text stealing (CTS) is used.