Cryptography Tutorials - Herong's Tutorial Examples - v5.42, by Herong Yang
CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
CFB (Cipher FeedBack) operation mode as a block cipher can be described with notations defined earlier as the following formula and diagram:
C[i] = P[i] XOR E(C[i-1]) C[1] = P[1] XOR E(IV) IV | -----| -----| E() / E() / E() | / | / | | / | / | P[1]--XOR / P[2]--XOR / P[3]--XOR | / | / | | / | / | C[1] C[2] C[3]
As you can see from the formula and the diagram, in CBC mode, each block of plaintext is XORed with the encrypted version of the previous ciphertext to generate the current ciphertext block. In this way, each ciphertext block is depending on all plaintext blocks up to that point. Note that for the first block, the Initial Vector (IV) is used as the previous ciphertext block.
In order to run the CFB operation mode as a stream cipher, FIPS 81 defines CFB variations where plaintext blocks can have any size less than 64 bits. To describe CFB variations, we need the following additional notations:
k - Representing the size plaintext blocks. k can have a value between 1 and 64.
Fk() - Representing a filter function that take the first k bits of a 64-bit block.
I = I[1], I[2], I[3], ..., I[i], ... - Representing the input block, I, used as input to the DES encryption process.
Sk() - Representing a shifting function that shifts k bits out of the input block from the left side. The missing k bits are taken from the ciphertext block.
With the above notations, a k-bit CFB operation mode variation can be described as:
C[i] = P[i] XOR Fk(E(I[i])) I[i] = Sk(I[i-1], C[i-1]) I[1] = IV IV | I[1]------Sk()--I[2]------Sk()--I[3] | / | / | E() / E() / E() | / | / | Fk() / Fk() / Fk() | / | / | P[1]--XOR / P[2]--XOR / P[3]--XOR | / | / | C[1] C[2] C[3]
Note that there are some special cases of CFB variations:
Table of Contents
Introduction to AES (Advanced Encryption Standard)
DES Algorithm - Illustrated with Java Programs
DES Algorithm Java Implementation
DES Algorithm - Java Implementation in JDK JCE
DES Encryption Operation Modes
Introducting DES Stream Cipher Modes
►CFB (Cipher FeedBack) as a Stream Cipher
OFB (Output FeedBack) as a Stream Cipher
CFB and OFB Stream Ciphers Implemented in JCE
JCE DES Stream Ciphers Testing Program
JCE DES Stream Ciphers Testing Program Result
PHP Implementation of DES - mcrypt
Blowfish - 8-Byte Block Cipher
Secret Key Generation and Management
Cipher - Secret Key Encryption and Decryption
RSA Implementation using java.math.BigInteger Class
Introduction of DSA (Digital Signature Algorithm)
Java Default Implementation of DSA
Private key and Public Key Pair Generation
PKCS#8/X.509 Private/Public Encoding Standards
Cipher - Public Key Encryption and Decryption
OpenSSL Introduction and Installation
OpenSSL Generating and Managing RSA Keys
OpenSSL Generating and Signing CSR
OpenSSL Validating Certificate Path
"keytool" and "keystore" from JDK
"OpenSSL" Signing CSR Generated by "keytool"
Migrating Keys from "keystore" to "OpenSSL" Key Files
Certificate X.509 Standard and DER/PEM Formats
Migrating Keys from "OpenSSL" Key Files to "keystore"