منابع مشابه
Modes of Operation of a Block Cipher
A n-bit block cipher with a k-bit key is a set of 2k bijections on n-bit strings. A block cipher is a flexible building block; it can be used for encryption and authenticated encryption, to construct MAC algorithms and hash functions. When a block cipher is used for confidentiality protection, the security goal is to prevent a passive eavesdropper with limited computational power to learn any i...
متن کاملAnalogue-digital systems with modes of operation
We consider the nature of the relationship between physical environments, processes and systems, and the algorithms and software that monitor or govern them. In the case of complex physical situtations, no one mathematical model can serve; rather their physical behaviour or operation may reveal several distinct regimes or modes. Thus, for the design of complex physical environments, processes a...
متن کاملAn observation regarding Jutla's modes of operation
Recently, Jutla suggested two new modes of operation for block ciphers. These modes build on traditional CBC and ECB modes, respectively, but add to them masking of the outputs and inputs. Jutla proved that these masking operations considerably strengthen CBC and ECB modes. In particular, together with a simple checksum, the modified modes ensure not only confidentiality, but also authenticity....
متن کاملFundamental Modes of Operation for Mass Customization
The concept of Mass Customization (MC) producing customised goods for a mass market has received considerable attention in the research literature in recent years. However the literature is limited in providing an understanding of the content of MC strategies (the organizational structures, process technologies, etc., that are best in a particular environment) and the process of MC strategies (...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Journal of Riga Technical University. Power and Electrical Engineering
سال: 2009
ISSN: 1407-7345
DOI: 10.2478/v10144-009-0018-y