CFB (Cipher FeedBack) as a Stream Cipher

This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.

CFB (Cipher FeedBack) operation mode as a block cipher can be described with notations defined earlier as the following formula and diagram:

C[i] = P[i] XOR E(C[i-1])
C[1] = P[1] XOR E(IV)

       |        -----|        -----| 
      E()     /     E()     /     E()
       |     /       |     /       |
       |    /        |    /        | 
P[1]--XOR  /  P[2]--XOR  /  P[3]--XOR
       |  /          |  /          | 
       | /           | /           | 
     C[1]          C[2]          C[3]

As you can see from the formula and the diagram, in CBC mode, each block of plaintext is XORed with the encrypted version of the previous ciphertext to generate the current ciphertext block. In this way, each ciphertext block is depending on all plaintext blocks up to that point. Note that for the first block, the Initial Vector (IV) is used as the previous ciphertext block.

In order to run the CFB operation mode as a stream cipher, FIPS 81 defines CFB variations where plaintext blocks can have any size less than 64 bits. To describe CFB variations, we need the following additional notations:

k - Representing the size plaintext blocks. k can have a value between 1 and 64.

Fk() - Representing a filter function that take the first k bits of a 64-bit block.

I = I[1], I[2], I[3], ..., I[i], ... - Representing the input block, I, used as input to the DES encryption process.

Sk() - Representing a shifting function that shifts k bits out of the input block from the left side. The missing k bits are taken from the ciphertext block.

With the above notations, a k-bit CFB operation mode variation can be described as:

C[i] = P[i] XOR Fk(E(I[i]))
I[i] = Sk(I[i-1], C[i-1]) 
I[1] = IV

       |       /       |       /       |
      E()     /       E()     /       E()
       |     /         |     /         |
     Fk()   /        Fk()   /        Fk()
       |   /           |   /           | 
P[1]--XOR /     P[2]--XOR /     P[3]--XOR
       | /             | /             | 
     C[1]            C[2]            C[3]

Note that there are some special cases of CFB variations:

Table of Contents

 About This Book

 Cryptography Terminology

 Cryptography Basic Concepts

 Introduction to AES (Advanced Encryption Standard)

 Introduction to DES Algorithm

 DES Algorithm - Illustrated with Java Programs

 DES Algorithm Java Implementation

 DES Algorithm - Java Implementation in JDK JCE

 DES Encryption Operation Modes

DES in Stream Cipher Modes

 Introducting DES Stream Cipher Modes

CFB (Cipher FeedBack) as a Stream Cipher

 OFB (Output FeedBack) as a Stream Cipher

 CFB and OFB Stream Ciphers Implemented in JCE

 JCE DES Stream Ciphers Testing Program

 JCE DES Stream Ciphers Testing Program Result

 PHP Implementation of DES - mcrypt

 Blowfish - 8-Byte Block Cipher

 Secret Key Generation and Management

 Cipher - Secret Key Encryption and Decryption

 Introduction of RSA Algorithm

 RSA Implementation using java.math.BigInteger Class

 Introduction of DSA (Digital Signature Algorithm)

 Java Default Implementation of DSA

 Private key and Public Key Pair Generation

 PKCS#8/X.509 Private/Public Encoding Standards

 Cipher - Public Key Encryption and Decryption

 MD5 Mesasge Digest Algorithm

 SHA1 Mesasge Digest Algorithm

 OpenSSL Introduction and Installation

 OpenSSL Generating and Managing RSA Keys

 OpenSSL Managing Certificates

 OpenSSL Generating and Signing CSR

 OpenSSL Validating Certificate Path

 "keytool" and "keystore" from JDK

 "OpenSSL" Signing CSR Generated by "keytool"

 Migrating Keys from "keystore" to "OpenSSL" Key Files

 Certificate X.509 Standard and DER/PEM Formats

 Migrating Keys from "OpenSSL" Key Files to "keystore"

 Using Certificates in IE (Internet Explorer)

 Using Certificates in Firefox

 Using Certificates in Google Chrome

 Outdated Tutorials


 PDF Printing Version