Wikipedia Article of the Day
Randomly selected articles from my personal browsing history
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block. Most modes require a unique binary sequence, often called an initialization vector (IV), for each encryption operation. The IV must be non-repeating, and for some modes must also be random. The initialization vector is used to ensure that distinct ciphertexts are produced even when the same plaintext is encrypted multiple times independently with the same key. Block ciphers may be capable of operating on more than one block size, but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the final data fragment be padded to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a stream cipher. Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded integrity protection as an entirely separate cryptographic goal. Some modern modes of operation combine confidentiality and authenticity in an efficient way, and are known as authenticated encryption modes.
History
Sep 7
KHive
Sep 6
Interplanetary Internet
Sep 5
KHive
Sep 4
The Memory Police
Sep 3
Disjoint-set data structure
Sep 2
Systems engineering
Sep 1
12ft
Aug 31
Speculative fiction
Aug 30
Lace card
Aug 29
40 Eridani
Aug 28
Weird fiction
Aug 27
Dark forest hypothesis
Aug 26
Pointing and calling
Aug 25
The Maybe Man
Aug 24
Sean Astin
Aug 23
Planet of the Apes
Aug 22
Shamir's secret sharing
Aug 21
Application binary interface
Aug 20
Key encapsulation mechanism
Aug 19
Graupel
Aug 18
List of Internet top-level domains
Aug 17
Twenty One Pilots
Aug 16
The Garden of Earthly Delights
Aug 15
Curve25519
Aug 14
John Hinckley Jr.
Aug 13
Mona Lisa (Nat King Cole song)
Aug 12
2024 CrowdStrike incident
Aug 11
Tony Hoare
Aug 10
Reactor pattern
Aug 9
ElGamal encryption