Attacking Network Protocols by James Forshaw
Author:James Forshaw
Language: eng
Format: epub, mobi, azw3
Publisher: Penguin Random House LLC (Publisher Services)
Published: 2018-01-18T05:00:00+00:00
Figure 7-5: ECB encryption of a bitmap image
Cipher Block Chaining
Another common mode of operation is Cipher Block Chaining (CBC), which is more complex than ECB and avoids its pitfalls. In CBC, the encryption of a single plaintext block depends on the encrypted value of the previous block. The previous encrypted block is XORed with the current plaintext block, and then the encryption algorithm is applied to this combined result. Figure 7-6 shows an example of CBC applied to two blocks.
At the top of Figure 7-6 are the original plaintext blocks. At the bottom is the resulting cipher text generated by applying the block-cipher algorithm as well as the CBC mode algorithm. Before each plaintext block is encrypted, the plaintext is XORed with the previous encrypted block. After the blocks have been XORed together, the encryption algorithm is applied. This ensures that the output cipher text is dependent on the plaintext as well as the previous encrypted blocks.
Download
Attacking Network Protocols by James Forshaw.mobi
Attacking Network Protocols by James Forshaw.azw3
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7402)
Grails in Action by Glen Smith Peter Ledbrook(7295)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5957)
Kotlin in Action by Dmitry Jemerov(4637)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3027)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2837)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2600)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2509)
The Art Of Deception by Kevin Mitnick(2297)
Drugs Unlimited by Mike Power(2191)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2098)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2068)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2018)
JavaScript by Example by S Dani Akash(1948)
DarkMarket by Misha Glenny(1846)
Wireless Hacking 101 by Karina Astudillo(1846)
Full-Stack React Projects by Shama Hoque(1771)
Social Selling Mastery by Jamie Shanks(1749)
Hack and HHVM by Owen Yamauchi(1673)