ECB mode
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/83/87/wKioL1d1OMShlESDAACHAtER2cY549.png "title=" 1.png " alt= "Wkiol1d1omshlesdaachater2cy549.png"/>
Encryption in ECB mode
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/83/89/wKiom1d1OMXif9HiAACElYGQIdM425.png "title=" 2.png " alt= "Wkiom1d1omxif9hiaacelygqidm425.png"/>
The decryption of ECB mode
Common in symmetric ciphers are the ECB, CBC, CFB, OFB, and CTR models. Let's take a look at the characteristics of these patterns.
is not used
Mode |
Name |
Advantages |
Disadvantages |
Note |
ECB mode |
electronic codebook electronic password This mode |
|
is reflected in the ciphertext
-
Can operate on clear text by deleting, replacing ciphertext groupings
-
When decrypting a ciphertext containing some bit errors
-
Cannot withstand replay attacks
|
Bing uses |
CBC mode |
cipher Block charning cipher Group link mode |
-
The repeating arrangement of clear text is not reflected in the ciphertext
-
Supports parallel computing (decryption only)
-
To decrypt arbitrary ciphertext groups
|
-
When decrypting ciphertext containing certain error bits , all bits of the first grouping and the corresponding bits of the latter group will be faulted
-
Encryption does not support parallel computing
|
Recommended Use /td> |
CFB mode |
cipher-feedback ciphertext feedback mode |
-
does not need to be populated (padding)
-
supports parallel computing (decryption only)
-
Can decrypt arbitrary ciphertext groupings
|
-
Encryption does not support parallel computing
-
When decrypting ciphertext containing certain error bits, all bits of the first packet and corresponding bits of the latter group will be faulted
-
Cannot withstand replay attacks li>
|
| when
OFB mode |
output-feedback output feedback mode |
-
does not need to be populated (padding)
-
ready to encrypt and decrypt in advance
-
Encrypt, decrypt using the same structure
-
When decrypting ciphertext containing some error bits, only the corresponding bits in the glyph will be faulted
|
-
Does not support parallel operations li>
-
Actively attacking some bits in a ciphertext group, the corresponding bits in the plaintext group are also reversed
|
|
CTR Mode |
Counter counter Mode |
No padding required (padding)
Ready to encrypt and decrypt in advance
Encrypt, decrypt, use the same structure
When decrypting ciphertext containing some error bits, only the corresponding bits in the plaintext will be faulted.
Supports parallel computing (encryption, decryption)
|
When an active attacker reverses some bits in a ciphertext group, the corresponding bits in the plaintext packet are reversed |
Recommended Use |
First, I want you to figure out what the 3 letters of each pattern are. If you can remember the name of each pattern, you can visualize the corresponding structure in your mind, and you will be able to figure out the characteristics of each pattern.
In the Book of Practical Cryptography [schneier,2003], it is noted that the ECB mode should not be used, whereas CBC mode and CTR mode are recommended. See the book "Practical Cryptography" for details.
This article from "Professor elder brother" blog, reprint please contact the author!
A list of the advantages and disadvantages of symmetric encryption algorithms