Security and Cryptography - Chapter 7: Block Cipher Operation
Studied by 0 people
0.0(0)
LearnA personalized and smart learning plan
Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 5
There's no tags or description
Looks like no one added any tags here yet for you.
6 Terms
1
block cipher modes of operation
Methods of using a block cipher algorithm to provide different security properties, including ECB, CBC, CFB, OFB, and CTR modes.
New cards
2
ciphertext stealing
A technique used in block cipher encryption that allows the final ciphertext block to be the same size as the plaintext when the plaintext is not an integer multiple of the block size.
New cards
3
meet-in-the-middle attack
A cryptographic attack technique that can reduce the security of multiple encryption with independent keys.
New cards
4
nonce
A "number used once" that provides randomization in cryptographic protocols to prevent replay attacks.
New cards
5
triple DES (3DES)
A symmetric-key block cipher that applies the DES cipher algorithm three times to each data block, providing increased security over standard DES.
New cards
6
tweakable block cipher
A type of block cipher that takes an additional input called a "tweak" along with the key and plaintext, allowing various modifications to the encryption algorithm.