pgpfan:cipherfeedback
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:cipherfeedback [2021/12/17 12:55] – Failed to show what was being made into a TLA. b.walzer | pgpfan:cipherfeedback [2022/05/09 17:05] (current) – Clearer b.walzer | ||
---|---|---|---|
Line 11: | Line 11: | ||
Cipher Feedback (CFB) (the thing that OpenPGP does) is a method that overcomes these shortcomings. Instead of encrypting the block you instead encrypt the last encrypted value, add the block in, and use this as the next encrypted value. Very simple. | Cipher Feedback (CFB) (the thing that OpenPGP does) is a method that overcomes these shortcomings. Instead of encrypting the block you instead encrypt the last encrypted value, add the block in, and use this as the next encrypted value. Very simple. | ||
- | Patterns in the encrypted output are eliminated. Since CFB uses the popular technique of adding in the block to make the encrypted | + | Patterns in the encrypted output are eliminated. Since CFB uses the popular technique of adding in the unencrypted |
+ | |||
+ | {{cfb_damage.svg}} | ||
+ | |||
+ | |||
+ | Attacks must work around | ||
CFB has some desirable secondary characteristics: | CFB has some desirable secondary characteristics: | ||
Line 17: | Line 22: | ||
CFB uses the encryption function for both encryption and decryption(([[wp> | CFB uses the encryption function for both encryption and decryption(([[wp> | ||
- | CFB is self synchronizing. Corrupt or missing blocks will cause the next block to be random garbage but the following and subsequent data will be decrypted properly. This is consistent with the principle that encryption should not destroy | + | CFB is self synchronizing. Corrupt or missing blocks will cause the next block to be random garbage but the following and subsequent data will be decrypted properly. This is consistent with the principle that encryption should not prevent |
CFB requires no extra complication when the data does not completely fill the last block. It just works. | CFB requires no extra complication when the data does not completely fill the last block. It just works. | ||
+ | |||
+ | CFB decryption can be done in parallel. You can take separate sections of an encrypted message/ | ||
The protection provided by CFB is intrinsic. It becomes an essential part of the protocol. If it is implemented incorrectly it will not interoperate with correct implementations. Contrast this with schemes that only check for modification and do nothing to prevent it in the first place((The popular [[wp> | The protection provided by CFB is intrinsic. It becomes an essential part of the protocol. If it is implemented incorrectly it will not interoperate with correct implementations. Contrast this with schemes that only check for modification and do nothing to prevent it in the first place((The popular [[wp> | ||
Line 25: | Line 32: | ||
OpenPGP has multiple implementations in common use. So a user of OpenPGP can be sure of CFB protection. The user of a system that merely checks for modification can not be entirely sure that the check is currently protective. Message modification is very rare. A broken check might not be noticed for a long time. | OpenPGP has multiple implementations in common use. So a user of OpenPGP can be sure of CFB protection. The user of a system that merely checks for modification can not be entirely sure that the check is currently protective. Message modification is very rare. A broken check might not be noticed for a long time. | ||
- | The [[https:// | + | The [[https:// |
pgpfan/cipherfeedback.1639745727.txt.gz · Last modified: 2021/12/17 12:55 by b.walzer