Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
70 views6 pages

Cipher Feedback (CFB) : Denoted Cfb-1, Cfb-8, Cfb-64, Cfb-128, Etc. C P Xor E (C) C Iv

Cipher Feedback (CFB) is a block cipher mode where the message bits are added to the output of the block cipher and the result is fed back as input for the next stage. The standard allows feeding back any number of bits, with the most efficient being the full block size (64 or 128 bits). Each block of ciphertext is produced by XORing the plaintext block and the encrypted previous ciphertext block.

Uploaded by

Alone Mast
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views6 pages

Cipher Feedback (CFB) : Denoted Cfb-1, Cfb-8, Cfb-64, Cfb-128, Etc. C P Xor E (C) C Iv

Cipher Feedback (CFB) is a block cipher mode where the message bits are added to the output of the block cipher and the result is fed back as input for the next stage. The standard allows feeding back any number of bits, with the most efficient being the full block size (64 or 128 bits). Each block of ciphertext is produced by XORing the plaintext block and the encrypted previous ciphertext block.

Uploaded by

Alone Mast
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 6

Cipher FeedBack (CFB)

 message is treated as a stream of bits


 added to the output of the block cipher
 result is feed back for next stage (hence name)
 standard allows any number of bits (1,8, 64 or
128 etc) to be feed back
 denoted CFB-1, CFB-8, CFB-64, CFB-128, etc.
 most efficient to use all bits in block (64 or 128)
Ci = Pi XOR EK(Ci-1)
C-1 = IV
 uses: stream data encryption, authentication
s-bit
Cipher
FeedBack
(CFB-s)
Advantages and Limitations of
CFB
 most common stream mode
 appropriate when data arrives in bits/bytes
 limitation is need to stall while do block
encryption after every s-bits
 note that the block cipher is used in
encryption mode at both ends (XOR)
 errors propagate for several blocks after
the error ... how many?
Output FeedBack (OFB)
 message is treated as a stream of bits
 output of cipher is added to message
 output is then feed back (hence name)
Oi = EK(Oi-1)
Ci = Pi XOR Oi
O-1 = IV
 feedback is independent of message
 can be computed in advance
 uses: stream encryption on noisy channels
Why noisy channels?
Output
FeedBack
(OFB)
Advantages and Limitations of
OFB
 needs an IV which is unique for each use
 if ever reuse attacker can recover outputs...

 OTP

 can pre-compute
 bit errors do not propagate
 more vulnerable to message stream modification...
 change arbitrary bits by changing ciphertext
 sender & receiver must remain in sync
 only use with full block feedback
 subsequent research has shown that only full block
feedback (ie CFB-64 or CFB-128) should ever be used

You might also like