Professional Documents
Culture Documents
Network Security
Chapter 3
Fourth Edition
by William Stallings
x y Z- output
0 0 0
0 1 1
1 0 1
1 1 0
Stream cipher
Key generation
algorithm
Operation
•The user takes the first block of plaintext and encrypts it with
the key to produce the first block of ciphertext.
•He then takes the second block of plaintext and follows the
Electronic Code Book (ECB) Mode
Electronic Code Book (ECB) Mode