Modes of Operation
This lecture covers the following topics:
- Modes of Operation
- 1. Electronic Code Book (ECB)
- 2. Cipher Block Chaining (CBC)
- 3. k-Bit Output Feedback Mode (OFB)
- 4. k-Bit Cipher Feedback Mode (CFB)
- 5. Counter Mode (CTR)
- Message Authentication Code (MAC)
- Weak and Semi-Weak Keys
- Privacy + Integrity
- MISTY1
- KASUMI
- GSM Encryption
- DES Attacks
- 3DES
- CBC: Outside
- CBC: Inside
- Key 3DES Design Decisions
- 1. Why not 2DES?
- 2. Why Only Two Keys?
- 3. Why E-D-E and not E-E-E?
- 4. Why CBC outside?
- Summary
- References
Presentation slides in Adobe Acrobat Format:
1 slide/page
View Slides+Audio
Right click and save to download
Slides+Audio podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page