Describe a block cipher counter (CTR) mode of operation.

What will be an ideal response?


Diffie and Hellman in 1979 introduced the counter mode encryption, which is another way to turn a block cipher into a stream cipher. Counter mode requires using an n-bit string called a counter. The counter can be produced by any sequence-generation function that is guaranteed not to repeat for a long time. Since the counter generation is independent of the encryption/decryption process, random access is achievable. The ith ciphertext block, Ci, can be encrypted or decrypted in a random-access fashion. Compared with CBC mode, encrypting the ith block requires all of the i-1 prior blocks to be encrypted first.

Computer Science & Information Technology

You might also like to view...

A SmartArt layout type that illustrates a decision tree or creates an organization chart

A) Pyramid B) Relationship C) Hierarchy

Computer Science & Information Technology

When used in a search, the ________ operator finds files that contain either search term

A) OR B) ONLY C) AND D) NOT

Computer Science & Information Technology

To create a table, click the ____ tab, and then, in the Tables group, click the Table button.

A. Insert B. Format C. Edit D. Proofing

Computer Science & Information Technology

Which of the following commands can you use to diagnose DNS problems on a Windows computer?

A. nslookup B. ping C. ipconfig D. dig

Computer Science & Information Technology