Module 22: Multi-core Computing Security
  Lecture 44: Cryptography and ECB
 


ECB Mode of Operation

Threats on ECB Operational Mode

  • If the message contain two identical blocks, the corresponding cipher blocks are also identical.
    • Eavesdropper gets some information.
  • Consider data base rows being sent from one end to another
    • Columns: Name, Position, Salary
    • Each is 64 byte wide (block size: 64 bytes)
  • Now the eavesdropper can find out
    • Number of people at a particular position
    • Number of people at the same salary.

Threats on ECB

  • An employee can even alter the message to change his own salary.
  • Serious flaws:
    • Some one looking at the cipher text can gain information from the repeated blocks.
    • Some can even alter or rearrange the cipher text to his advantage.
  • ECB is rarely used to encrypt messages.