Abstract
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief background on the modes of operation for symmetric-key block ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When using symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable mode of operation. This paper describes a structure for analyzing the block operation mode combination. This unified operation structure (UOS) combines existing common and popular block modes of operation. UOS does multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key block ciphers to improve their application scenarios. We can get that it is flexible in modern communication applications.
Highlights
Data confidentiality is one of the security services in cryptography
The standard modes of operation described in the literature [7], such as non-feedback electronic codebook (ECB) mode, cipher block chaining (CBC) mode, output feedback (OFB) mode, and cipher feedback (CFB) mode provide confidentiality
Self-synchronizing stream ciphers, such as cipher block chaining (CBC) mode and cipher feedback (CFB) mode, exist one disadvantage with these techniques when they are applied to disk encryption: any modification in encrypted files requires the re-encryption of all succeeding plaintexts after the place of modification
Summary
Data confidentiality is one of the security services in cryptography. The major concept in information security today is to continue to improve encryption algorithms. A striking example of the degree to which non-feedback electronic codebook (ECB) mode can leave plaintext data patterns in the ciphertext can be seen when the electronic codebook mode is used to encrypt a bitmap image which uses large areas of uniform colour. The standard modes of operation described in the literature [7], such as non-feedback electronic codebook (ECB) mode, cipher block chaining (CBC) mode, output feedback (OFB) mode, and cipher feedback (CFB) mode provide confidentiality. The different mode has the different characters Both of CFB and OFB can be design operating without padding with bit-based size keystream output; both of CBC and CFB can self sync to avoid channel noise error propagation; and both of CFB and OFB encryption and decryption applications need an encryption module only to reach both usages.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Network Security & Its Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.