Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Encryption Modes of Operation

29

Flashcards

0/29

Still learning
StarStarStarStar

CTR (Counter)

StarStarStarStar

Encrypts a sequential counter value to form a stream of keystream blocks, which are XORed with plaintext.

StarStarStarStar

OCB (Offset CodeBook)

StarStarStarStar

A mode that combines privacy and authenticity efficiently using block ciphers.

StarStarStarStar

XTS-AES (IEEE P1619)

StarStarStarStar

A tweakable block cipher specifically designed for disk sector encryption by IEEE P1619.

StarStarStarStar

GMAC (Galois Message Authentication Code)

StarStarStarStar

An authentication-only variant of the GCM which can be used as a MAC.

StarStarStarStar

CCM (Counter with CBC-MAC)

StarStarStarStar

Provides both authentication and confidentiality, combining CTR mode encryption with CBC-MAC.

StarStarStarStar

CBC-MAC (Cipher Block Chaining Message Authentication Code)

StarStarStarStar

A technique for constructing a message authentication code from a block cipher.

StarStarStarStar

GCM (Galois/Counter Mode)

StarStarStarStar

A mode of operation for symmetric key cryptographic block ciphers that has built-in authentication.

StarStarStarStar

KWP (Key Wrapping Protocol)

StarStarStarStar

Used for wrapping (encrypting) cryptographic keys with another key.

StarStarStarStar

CFB-8 (8-bit Cipher Feedback)

StarStarStarStar

A variation of CFB that encrypts data 8 bits or 1 byte at a time.

StarStarStarStar

GMODE (Galois/Counter Mode with Dual Encryption)

StarStarStarStar

Enhancement of GCM mode that provides pre-encrypting and post-encrypting data for additional security.

StarStarStarStar

PCFB (Plaintext Cipher Feedback)

StarStarStarStar

A variation of CFB where the feedback is the plaintext, not the ciphertext.

StarStarStarStar

PCBC (Propagating Cipher Block Chaining)

StarStarStarStar

Similar to CBC mode, with added complexity to protect against stream cipher attacks.

StarStarStarStar

LRW (Liskov-Rivest-Wagner)

StarStarStarStar

Designed to make block ciphers secure against chosen-plaintext attacks.

StarStarStarStar

SIV (Synthetic Initialization Vector)

StarStarStarStar

Provides deterministic authenticated encryption, protecting against repeat plaintext attacks without a nonce.

StarStarStarStar

HCBC (Hash-Chain Block Chaining)

StarStarStarStar

An encryption mode that incorporates hash functions into CBC for improved security.

StarStarStarStar

CMAC (Cipher-based Message Authentication Code)

StarStarStarStar

An algorithm to authenticate encryption that is based on symmetric key block ciphers.

StarStarStarStar

KW (Key Wrapping)

StarStarStarStar

An encryption mode specifically for encrypting and integrity-checking secret keys.

StarStarStarStar

CFB (Cipher Feedback)

StarStarStarStar

Converts a block cipher into a self-synchronizing stream cipher, obscuring patterns in the plaintext.

StarStarStarStar

EME (ECB-Mix-ECB)

StarStarStarStar

A wide-block encryption mode that uses two layers of ECB encryption and a mixing step.

StarStarStarStar

CWC (Carter-Wegman + CTR)

StarStarStarStar

Combines a Wegman-Carter style MAC with the CTR mode of encryption for authenticated encryption.

StarStarStarStar

ECB (Electronic Codebook)

StarStarStarStar

Encrypts blocks independently, susceptible to pattern attacks.

StarStarStarStar

XTS (XEX-based Tweaked CodeBook mode with Ciphertext Stealing)

StarStarStarStar

Commonly used for disk encryption; provides two independent keys for ciphertext and tweak.

StarStarStarStar

TDEA (Triple Data Encryption Algorithm)

StarStarStarStar

Uses a block cipher three times to increase the encryption strength.

StarStarStarStar

OFB (Output Feedback)

StarStarStarStar

Also turns a block cipher into a stream cipher but without synchronizing – errors do not propagate.

StarStarStarStar

CBC (Cipher Block Chaining)

StarStarStarStar

Combines each plaintext block with the previous ciphertext block before encrypting.

StarStarStarStar

ACFP (Authenticated CFB plus PipeLine)

StarStarStarStar

An authenticated encryption mode that builds on CFB and includes pipeline stages.

StarStarStarStar

CTR-ACPKM (Counter with Autonomous Counter with Key Management)

StarStarStarStar

A mode of operation that provides confidentiality and supports key management by updating keys for each message.

StarStarStarStar

EAX (Authenticated Encryption with Associated Data)

StarStarStarStar

A mode of operation that provides both confidentiality and authentication, suitable for software implementation.

StarStarStarStar

CFB-1 (1-bit Cipher Feedback)

StarStarStarStar

A variant of the CFB mode that processes data 1 bit at a time.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.