Suppose that the ciphertext in equation 3.7 had been encrypted in CBC mode instead
of ECB mode. If Trudy believes ECB mode is used and tries the same cut-and-paste
attack, which blocks decrypt correctly?
equation 3.7 C0,C1,C5,C3,C4,C2

equation 3.6 Pi = D(Ci,K) ⊕ Ci−1 for i = 0, 1, 2, . . . .

Tagged with:

Filed under: crypto and decrypt

Like this post? Subscribe to my RSS feed and get loads more!