Date: Fri, 5 May 2000 11:17:30 +1000 From: Peter Jeremy <peter.jeremy@alcatel.com.au> To: Mark Murray <mark@grondar.za> Cc: "Andrew J. Korty" <ajk@iu.edu>, security@FreeBSD.ORG Subject: Re: Cryptographic dump(8) Message-ID: <00May5.111951est.116340@border.alcanet.com.au> In-Reply-To: <200005042015.WAA07617@grimreaper.grondar.za>; from mark@grondar.za on Fri, May 05, 2000 at 06:16:30AM %2B1000 References: <Pine.BSF.4.21.0005041318270.26492-100000@verbal.uits.iupui.edu> <ajk@iu.edu> <200005042015.WAA07617@grimreaper.grondar.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2000-May-05 06:16:30 +1000, Mark Murray <mark@grondar.za> wrote:
>> I was under the impression that the CBC mode would also propagate this
>> entry throughout the block. Must I use one of the feedback modes?
>
>Yes.
Not exactly.
> I have no hard references in front of me, but I'll put ${bodypart}
>on a block that CBC is 8-bytes-at-a-time-with-same-key-each-time.
Bzzzt. You lose (I hope you didn't set ${bodypart} to anything important).
You are thinking of ECB (Electronic Code Book): This mode takes each
block and individually encrypts it.
CBC (Cipher Block Chaining) is Cn = Ek(C(n-1) XOR Pn) An initialisation
vector (IV) is XOR'd with the first block.
CFB (Cipher feedback) is Cn = Pn XOR Ek(C(n-1))
OFB (Output feedback) is Cn = Pn XOR (Rn = Ek(R(n-1)))
As for propagation:
ECB: the output block depends on the key only.
OFB: the output block depends on the key and IV only.
CBC and CFB: the output block depends on key, IV and all preceeding plaintext
(They all have different behaviours regarding corruption and
synchronisation - which is important if your backup tape loses a few
bits).
Peter
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00May5.111951est.116340>
