You are on page 1of 3

Module Code & Module Title

CC5004NI Security in Computing

Assessment Weightage & Type


10% Weekly Assignment

Year and Semester


2021-22 autumn / 2021-22 spring

Student Name: Nischita Paudel


London Met ID: 20049186
College ID: NP01NT4S210092
Assignment Due Date: 7th December, 2022
Assignment Submission Date: 7th December, 2022

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Tutorial 09 – Understanding modes of operation on block ciphers

Question 01. In the domain of cryptography, explain what are modes of operations.
ANS: A block cipher is the process that works with data blocks of a specific size
to break down the long message into a number of consecutive message blocks, which
the cipher processes one at a time. The modes of operations are divided into two parts
that are: Deterministic Encryption and Probalisitic Encryption.
Deterministic encryptions utilise the same source information and key to generate the
same cipher text every time, whereas probabilistic encryptions use random elements to
generate unique cipher text every time.
Deterministic encryption is further divided into ECB, or electronic code block, which is a
simple method that does not require the key to be updated every time we encrypt or
transmit data. As a result, it's rarely used in real-time, sensitive data-centric applications
and logics.
Block and stream ciphers are the two types of probabilistic encryption, with block
ciphers subdivided into cipher Block Chaining (CBC) and stream ciphers separated into
Output Feedback Mode (OFB) and Cipher Feedback Mode (CFB).

Question 02. List down the core differences between deterministic encryption schemes
and probabilistic encryption schemes (list examples for each as well).
ANS: The difference between deterministic and probabilistic encryption is that
deterministic encryption uses a given source information and key to generate the cipher
text, but probabilistic encryption generates a unique cipher text using a random element
each time it is implemented. There is regular fault occurrence and no uncertainty in
deterministic encryption, whereas there is less fault occurrence and uncertainty in
probabilistic encryption, and a probability is always written to highlight the dangers
involved.
The RSA cryptosystem, AES 256, ECB etc. are the example of deterministic encryption
algorithms.
Oldwasser–Micali Encryption scheme and the Megamall Public-Key Encryption scheme
are the example of Probabilistic encryption algorithm.
Question 03. Explain how Electronic Code Book (ECB) mode can be used for bulk data
encryption. Also give your own opinion on whether this mode should be used in practice
for data sensitive applications.
ANS: It is the most basic method of processing a series of message blocks given in
order. The ECB mode is deterministic, which means that if the plaintext blocks m1, m2,
mn are encrypted twice with the same key, the output ciphertext blocks will be equal.
No, this mode should not be used in practice for data-sensitive applications because an
attacker could move information into their database without the official's knowledge,
making real-time implementation difficult and insecure, and because the cipher text
block will be equal twice, making it less secure.

Question 04. Elaborate how Cipher Block Chaining (CBC) mode can be used to
achieve probabilistic encryption and thus, a more secure cipher-text.
ANS: In this mode, the user decrypts the ciphertext using just the block cipher's
encryption mechanism. The underlying block cipher's decryption algorithm is never
used. The ciphertext corresponding to a given plaintext block in CFB mode varies
significantly from ECB mode in that it depends not only on that plaintext block and the
key, but also on the previous ciphertext block. Thus, it makes a secure cipher-text,

Question 05. Clarify how the Output Feedback (OFB) mode operates on bit-streams for
securing confidential data.
ANS: The Output Feedback (OFB) mode includes block ciphers such as DES, AES,
and others as key-stream generators, with the data being fed into an XOR function with
a direct output of a block cipher that can be used to secure bit-streams.

You might also like