Wikipedia Article of the Day
Randomly selected articles from my personal browsing history
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block. Most modes require a unique binary sequence, often called an initialization vector (IV), for each encryption operation. The IV must be non-repeating, and for some modes must also be random. The initialization vector is used to ensure that distinct ciphertexts are produced even when the same plaintext is encrypted multiple times independently with the same key. Block ciphers may be capable of operating on more than one block size, but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the final data fragment be padded to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a stream cipher. Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded integrity protection as an entirely separate cryptographic goal. Some modern modes of operation combine confidentiality and authenticity in an efficient way, and are known as authenticated encryption modes.
History
Dec 26
Undertow (water waves)
Dec 25
F-distribution
Dec 24
Cumulative distribution function
Dec 23
Probability mass function
Dec 22
Book cipher
Dec 21
Poisson point process
Dec 20
Generic top-level domain
Dec 19
Beale ciphers
Dec 18
Heavyweight (podcast)
Dec 17
MurmurHash
Dec 16
Attempted assassination of Ronald Reagan
Dec 15
Mnemonic major system
Dec 14
Peter M. Lenkov
Dec 13
Lagrange polynomial
Dec 12
Polynomial interpolation
Dec 11
Newton polynomial
Dec 10
Quantile function
Dec 9
Static site generator
Dec 8
Flag Day (United States)
Dec 7
Seven-segment display character representations
Dec 6
Tori Kelly
Dec 5
Lynn Conway
Dec 4
G7
Dec 3
Nostr
Dec 2
Negative binomial distribution
Dec 1
Toledo War
Nov 30
Laurent series
Nov 29
Interface control document
Nov 28
ANT (network)
Nov 27
Functional analysis