Module 22: Multi-core Computing Security
  Lecture 44: Cryptography and ECB
 


Asymmetric Key Cryptography

Encrypting a Large Message

  • If the message is more than the size of the block, the message can be broken in multiple blocks.
  • Let the message be known as concatenation of p1, p2, p3, …, pn.
  • There are the following modes of operation
    • Electronic Code Book (ECB)
    • Cipher Block Chaining (CBC)
    • Cipher Feedback Mode (CFB)
    • Output Feedback Mode (OFB)
    • Counter Mode (CTR)