Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
An Introduction
Continued…
Shon Harris
CISSP, 5th Edition
(3.8.1 Contd)
Cipher Feedback Mode (CFB)
If you look again at the Figure for CFB, you see that the
ciphertext from the previous block is used to encrypt the
next block of plaintext. What if a bit in the first ciphertext
gets corrupted? Then we have corrupted values going into
the process of encrypting the next block of plaintext, and this
problem just continues because of the use of chaining in this
mode.
Output Feedback Mode