Electronic Code Book (ECB) and Cipher Block Chaining (CBC)

Encryption normally works by taking a number of text blocks, and then applies a key to these to produce cipher blocks. Typical block sizes are 128 or 256 bits. Unfortunately, the cipher blocks could end up being the same, for the same input text. Thus an intruder could try and guess the cipher text. This is known as electronic code book. For example if we use 3DES to encrypt the word…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

⚜MetaSwap⚜ Safe, fast , decentralized The easiest way to swap your assets in a blink of an eye with…

Gallery Vault Hide Pictures & Videos (Pro) 3.19.31 Apk + Mod

Gallery Vault Hide Pictures & Videos (Pro) 3.19.31 Apk + Mod

MicroChains V2 Beta Testing Whitelist Batch #2

Who Do You Need For Your SOC 2 Audit? (Part 3 of 6)

iBG Finance

Don’t Pull a Tesla

JbossMiner Mining Malware analysis

You have encryption — How are cybercriminals still stealing data?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

From Smooth to Dot-to-Dot … Meet The Curve That Protects Your Online Security Like No Other

The Rise and Rise of Encrypted Attacks, Ransomware, and … Watch Out for Rebate, Claim and Debt

The League Table of Post Quantum Cryptography (PQC)

Proxy Re-Encryption — Allowing Alice To Share Her Protect Secret Key With Bob