--%>

Block cipher modes

Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?

E

Expert

Verified

Some block cipher modes of the operation use the encryption since input is set to some initialization vector and leftmost bits of output of encryption function are XORed along with the first segment of the plain text p1 in order to generate the first unit of the cipher text C1 and it is sent. However in the decryption, cipher text is XORed along with the output of encryption function in order to generate the plain text. 

   Related Questions in Computer Network Security

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : What is ReefEdge Connect System

    ReefEdge Connect System: The ReefEdge connect system works on three layers of security: privacy, access control and authentication. The system then recognizes the technologies needed to address the security requirement for each of the above mentioned

  • Q : What is message authentication Explain

    Explain what is meant by the term message authentication? Describe the classes of message authentication function.

  • Q : Sub Word and Sub Bytes Explain

    Explain difference between the Sub Word and Sub Bytes?

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Explain Kerberos Explain the term

    Explain the term Kerberos.

  • Q : Master key and session key Specify some

    Specify some of the difference between master key and session key?

  • Q : Define Wifi Broadband What do you mean

    What do you mean by the term Wifi Broadband?