This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: ECB ) mode Obvious thing to do Encrypt each block independently There is a serious weakness Cipher Block Chaining ( CBC ) mode Chain the blocks together More secure than ECB, virtually no extra work Counter Mode ( CTR ) mode Acts like a stream cipher Popular for random access Modes of Operation...
View Full Document
This note was uploaded on 03/17/2011 for the course ECE 4472 taught by Professor Ouda during the Fall '10 term at UWO.
- Fall '10
- Information Security