2016
DOI: 10.17485/ijst/2016/v9i28/97795
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…These modes are the Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). The ECB mode of operation is insecure because it reveals the patterns of the plaintext [29]. Apart from the insecurity of the ECB, there is no vulnerability reported in the other recommended modes of operation.…”
Section: The Polymorphic Advanced Encryption Standard (P-aes)mentioning
confidence: 99%
“…These modes are the Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). The ECB mode of operation is insecure because it reveals the patterns of the plaintext [29]. Apart from the insecurity of the ECB, there is no vulnerability reported in the other recommended modes of operation.…”
Section: The Polymorphic Advanced Encryption Standard (P-aes)mentioning
confidence: 99%
“…Establishing robust authentication procedures, encryption protocols, and continuous monitoring Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  systems was critical in mitigating these security concerns and assuring the confidentiality, integrity, and availability of data transiting between IoT devices and fog computing infrastructure [5], [6]. The summary covers various authentication methods in cryptography [7]. Cipher-based message authentication code (CMAC) relies on block ciphers like advanced encryption standard (AES) for secure data processing and generates authentication tags.…”
Section: Introductionmentioning
confidence: 99%