Hi everyone. @lemony-cricket here. Let's learn about block ciphers and modes of operation! We're nearing the end of our introduction to encryption, but don't be sad! I'm really excited to get into digital signatures and hashes and everything else cryptography has to offer! <hr /> <center><img src="https://lemony.cricket/wp-content/uploads/2018/07/cryptography101.png" /> <sup>Rocket graphic extracted from <a href="https://pixabay.com/en/planet-rocket-space-stars-1297860">this CC0 image</a> from <a href="https://pixabay.com/en/users/OpenClipart-Vectors-30363/">OpenClipart-Vectors on Pixabay</a>.</sup></center> <hr /> <h1>Retrospective</h1> <strong>It's been almost a month since the <a href="https://steemit.com/steemstem/@lemony-cricket/introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol">last installment of Introduction to Cryptography</a>.</strong> Unfortunately, nobody actually completed the activity last time, which gives us not a lot to talk about in this retrospective section! An honourable mention goes to @procrastilearner, who contributed <a href="https://steemit.com/steemstem/@procrastilearner/re-lemony-cricket-introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol-20180621t013505634z">a good question to which I thoroughly enjoyed responding.</a> <strong>Last time we learned about stream ciphers. </strong>That was our first introduction to the marvelous world of modern encryption. That stuff is actually in our web servers and browsers making 'em tick! Neat, eh? <strong>Stream ciphers are simple and convenient.</strong> They tend to have extremely fast hardware implementations. They don't require padding (we'll define that later). They have one mode of operation; they generate a keystream, which is then used as if it were a <a href="https://steemit.com/steemstem/@lemony-cricket/introductiontocryptographyiencryptionpt2one-timepadsandstreamcipherintro-no463jdqw7">one-time pad</a>. For better or for worse, that's all they can do. <h1>Block ciphers and their modes of operation</h1><sup>the most versatile form of symmetic-key encryption</sup> <strong>Block cipher</strong><strong>s, on the other hand,</strong> are a bit more powerful, but a bit more complicated as well. For example, in most modes, block ciphers operate directly upon the plaintext rather than generating a keystream. They also require proper <em><strong>padding</strong></em><sup><sup>d1</sup></sup> at the end of the plaintext unless it exactly matches up with the block size. <strong>It's also not enough to know which <em>cipher </em>you're using;</strong> you also need to choose a <em><strong>mode of</strong> <strong>operation</strong></em><sup><sup>d2</sup></sup>. These modes of operation are public and widely standardised and work with <em>any</em> block cipher available. Let's take a look at some of these modes. <h2>Electronic codebook (ECB)</h2> <hr /> <center><img src="https://lemony.cricket/wp-content/uploads/2018/07/ecb.png" /> <sup>By WhiteTimberwolf on <a href="https://commons.wikimedia.org/w/index.php?curid=26434116">Wikimedia Commons</a>. Public domain.</sup></center> <hr /> <strong>The diagram above </strong>illustrates the <strong>electronic codebook</strong>, or <strong>ECB</strong>, mode of operation. It's called "electronic codebook" because it is actually a really large substitution cipher, like the <a href="https://steemit.com/steemstem/@lemony-cricket/introduction-to-cryptography-i-encryption-pt-1-the-caesar-cipher">Caesar shift</a>. The differences are that it's more of a "scramble" than a "shift," and it has a much, <em>much</em> larger alphabet, with each possible <em><strong>permutation</strong></em><sup><sup>d3</sup></sup> of the block size representing a different "letter." <strong>In this most basic mode of operation,</strong> the same key is used to encrypt every block of plaintext. That means that if any of the blocks are exactly the same, those blocks in the ciphertext will <em>also</em> be exactly the same. Now, if you're starting to get a bad vibe about this, <em>good</em>. You're learning! <strong>It's true that ECB has some severe flaws,</strong> and for this reason, it is almost <em>never</em> used except as an example of how block ciphers work, since it's really the most bare-bones mode available. You might already have an idea about what the flaws are, but we'll save that discussion for later. <h2>Cipher block chaining (CBC)</h2> <hr /> <center><img src="https://lemony.cricket/wp-content/uploads/2018/07/cbc.png" /> <sup>By WhiteTimberwolf on <a href="https://commons.wikimedia.org/w/index.php?curid=26434096">Wikimedia Commons</a>. Public domain.</sup></center> <hr /> <strong>No, not "blockchaining." </strong>Actually, there is a slight similarity here! Blockchains are so-called because each new <em>block</em> includes a mathematically indisputable link to the previous block. Similarly, while encrypting in CBC mode, we <strong>combine</strong> the ciphertext from the <em>previous</em> block with the <em>plaintext</em> of the current block before the encryption operation, using a bitwise exclusive-or (XOR) operation. <strong>CBC thereby solves the problem with ECB</strong> since each block depends not only on the key, but also on the previous ciphertext. This effectively breaks the ability to observe patterns in the ciphertext and serves to increase a desirable property we call <strong><em>diffusion</em></strong><sup><sup>d4</sup></sup>. <strong>But what's that "<em>initialisation vector</em><sup><sup>d5</sup></sup>" all about?</strong> Well, since there <em>is</em> no previous ciphertext to combine with the plaintext for the first block, a random value must be used instead. The <em>random</em> part is actually pretty important; the IV doesn't have to stay <em>secret</em>, but it cannot be <em>predictable</em> or else it opens the door for certain attacks. <strong>An interesting quirk of CBC </strong>is that even though the IV doesn't <em>have</em> <em>to </em>stay secret, it's actually not even necessary to tell the decrypting party what it is. All you have to do is pad the first block with arbitrary, disposable data before you encrypt it... then just <em>throw it away</em> on the other side. This works because the subsequent blocks rely only upon the <em>ciphertext</em>, not the <em>plaintext</em>. So, decrypting with the wrong IV will result in the first block being mangled, but every block after it will be fine! This trick is actually widely accepted and used in at least one prominent encryption standard, <a href="http://www.ietf.org/rfc/rfc4346.txt">TLS 1.1</a>, where it was deployed to fix a prior vulnerability. <h2>Counter (CTR)</h2> <hr /> <center><img src="https://lemony.cricket/wp-content/uploads/2018/07/ctr.png" /> <sup>By WhiteTimberwolf on <a href="https://commons.wikimedia.org/w/index.php?curid=26434109">Wikimedia Commons</a>. Public domain.</sup></center> <hr /> <strong>The counter mode takes a different</strong> <strong>approach</strong>. Instead of taking the <em>plaintext</em> as input like the other modes we've seen so far, it splits the input between a nonce and a counter. The counter is incremented with each block number, but the nonce stays the same for the entire session and should never be used again with the same key. Once the output is generated, it's combined with the plaintext with a XOR operation... <strong>Hey! Haven't we seen this before?!</strong> Yes! One of the coolest things about cryptography is that since most of the algorithms are built around similar principles and have similar properties, they can often be safely used to construct substitutes for one another. An algorithm built for use as a stream cipher is often perfectly suitable for use as a <strong><em>CSPRNG</em></strong><sup><sup>d6</sup></sup>. As @procrastilearner found out in <a href="https://steemit.com/steemstem/@lemony-cricket/re-procrastilearner-re-lemony-cricket-introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol-20180621t021358213z">my reply to his question</a>, we can even use a hashing algorithm to generate a secure (if rather slow) stream cipher. It's not unheard of for certain implementations to re-use existing <em><strong>primitives</strong></em><sup><sup>d7</sup></sup> in these sorts of ways, especially in <em><strong>embedded</strong> <strong>systems</strong></em><sup><sup>d8</sup></sup> where there may be extremely restrictive space and/or memory constraints. <strong>Counter mode</strong> <strong>is a way to turn a block cipher into a stream cipher</strong><strong>. </strong>There are other modes like this too, like cipher feedback (CFB) and output feedback (OFB), and others which do more advanced things, but I think we've reached a sufficiently advanced point and this is an <em>introduction</em> to cryptography series, after all. <h1>Interactive exercise</h1> <strong>Below are two images; </strong>the one on the right is an encrypted version of the one on the left. <hr /> <center><img src="https://lemony.cricket/wp-content/uploads/2018/07/lemony-ecb-1.png" /> <sup>My continuous undying thanks to @saywha, who made this monster for me!</sup></center> <hr /> <strong>Woah! That doesn't seem right.</strong> Take your best guess at what went wrong here and explain how you came to that conclusion. <strong>100% upvotes await all thoughful answers!</strong> <h1>Definitions</h1><sup>From my personal knowledge and experience unless otherwise noted.</sup> <ol> <li><strong>padding</strong>: extra data which must be used to "fill up" the last block when using a mode of operation which operates directly upon blocks of plaintext.</li> <li><strong>mode of operation</strong>: the combination of inputs, outputs, and intermediate steps used with a block cipher to allow it to operate on data sets larger than the block size.</li> <li><strong>permutation</strong>: a distinct arrangement of a set of items. For example, the following sequence contains all permutations of the first three positive integers: [123, 132, 213, 231, 312, 321]</li> <li><strong>diffusion</strong>: a desirable property of cryptography which states that any single change to the plaintext should affect all bits of the ciphertext with equal probability. ECB has poor diffusion because changes to the plaintext affect only the current block.</li> <li><strong>initialisation vector</strong>: a nonce, specifically one used as (or which modifies) the input to the initial block.</li> <li><strong>CSPRNG</strong>: In cryptography, there is often a need to generate "random-looking" numbers in a deterministic (and therefore reproducible) fashion. An algorithm used for this purpose is called a CSPRNG: cryptographically secure pseudorandom number generator.</li> <li><strong>primitives</strong>: <em>"well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions." </em><sup><a href="https://en.wikipedia.org/wiki/Cryptographic_primitive">source</a></sup></li> <li><strong>embedded systems</strong>: computer systems which exist as part of an appliance or other purpose-built hardware. The computer inside your car is an embedded system, for instance, and so is the one inside your microwave.</li> </ol> <h1>References</h1> <ul> <li>https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation</li> <li>http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf</li> <li>https://github.com/dancodery/electronic-codebook-image-demonstration</li> <li>https://en.wikipedia.org/wiki/Cryptographic_primitive</li> </ul> <h1>Additional thoughts</h1> <strong>If you enjoy my work, please leave a comment. </strong>Even if you don't feel like doing the activity (which I may stop doing soon or at least not every time), don't hesitate to add something else to the discussion. Is there something I could have explained better? Got a question you think is dumb? Ask it! <em>(It isn't. This stuff is hard.) </em> <strong>You'll get an upvote from me,</strong> my undying appreciation, and y'know... <em>someday</em> when I am rich and famous, I'll remember you as I shoo away the onslaught of <a href="https://www.wordnik.com/words/sycophant">elephants</a>. 🍋 <br /><center><hr/> <em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://lemony.cricket/2018/07/16/introduction-to-cryptography-i-encryption-pt-4-block-ciphers-modes-of-operation/</em><hr/></center>
author | lemony-cricket | ||||||
---|---|---|---|---|---|---|---|
permlink | introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns | ||||||
category | steemstem | ||||||
json_metadata | {"community":"steempress","app":"steemit/0.1","image":["https://lemony.cricket/wp-content/uploads/2018/07/cryptography101.png","https://lemony.cricket/wp-content/uploads/2018/07/ecb.png","https://lemony.cricket/wp-content/uploads/2018/07/cbc.png","https://lemony.cricket/wp-content/uploads/2018/07/ctr.png","https://lemony.cricket/wp-content/uploads/2018/07/lemony-ecb-1.png"],"tags":["steemstem","technology","cryptography","crypto","education"],"original_link":"https://lemony.cricket/2018/07/16/introduction-to-cryptography-i-encryption-pt-4-block-ciphers-modes-of-operation/","users":["lemony-cricket","procrastilearner","saywha"],"links":["https://pixabay.com/en/planet-rocket-space-stars-1297860","https://pixabay.com/en/users/OpenClipart-Vectors-30363/","https://steemit.com/steemstem/@lemony-cricket/introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol","https://steemit.com/steemstem/@procrastilearner/re-lemony-cricket-introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol-20180621t013505634z","https://steemit.com/steemstem/@lemony-cricket/introductiontocryptographyiencryptionpt2one-timepadsandstreamcipherintro-no463jdqw7","https://commons.wikimedia.org/w/index.php?curid=26434116","https://steemit.com/steemstem/@lemony-cricket/introduction-to-cryptography-i-encryption-pt-1-the-caesar-cipher","https://commons.wikimedia.org/w/index.php?curid=26434096","http://www.ietf.org/rfc/rfc4346.txt","https://commons.wikimedia.org/w/index.php?curid=26434109","https://steemit.com/steemstem/@lemony-cricket/re-procrastilearner-re-lemony-cricket-introductiontocryptographyiencryptionsalsa20streamcipher-62e89vfmol-20180621t021358213z","https://en.wikipedia.org/wiki/Cryptographic_primitive","https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation","http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf","https://github.com/dancodery/electronic-codebook-image-demonstration","https://www.wordnik.com/words/sycophant","https://wordpress.org/plugins/steempress/","https://lemony.cricket/2018/07/16/introduction-to-cryptography-i-encryption-pt-4-block-ciphers-modes-of-operation/"],"format":"markdown"} | ||||||
created | 2018-07-16 10:51:03 | ||||||
last_update | 2018-07-16 10:52:54 | ||||||
depth | 0 | ||||||
children | 17 | ||||||
last_payout | 2018-07-23 10:51:03 | ||||||
cashout_time | 1969-12-31 23:59:59 | ||||||
total_payout_value | 72.214 HBD | ||||||
curator_payout_value | 26.006 HBD | ||||||
pending_payout_value | 0.000 HBD | ||||||
promoted | 0.000 HBD | ||||||
body_length | 12,622 | ||||||
author_reputation | 15,797,102,626,770 | ||||||
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" | ||||||
beneficiaries |
| ||||||
max_accepted_payout | 1,000,000.000 HBD | ||||||
percent_hbd | 10,000 | ||||||
post_id | 64,855,015 | ||||||
net_rshares | 51,529,514,005,375 | ||||||
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
wackou | 0 | 283,922,480,644 | 3.51% | ||
lafona-miner | 0 | 2,328,874,338,048 | 65% | ||
hr1 | 0 | 53,016,227,355 | 0.02% | ||
tombstone | 0 | 887,659,097,785 | 3.9% | ||
boy | 0 | 51,053,086 | 100% | ||
bue | 0 | 28,328,116,287 | 100% | ||
simba | 0 | 7,501,959,672 | 5.85% | ||
lola-carola | 0 | 171,964,024 | 0.35% | ||
kevinwong | 0 | 655,637,029,117 | 9.75% | ||
justtryme90 | 0 | 1,311,068,129,433 | 65% | ||
eric-boucher | 0 | 19,940,604,890 | 5.85% | ||
anwenbaumeister | 0 | 106,284,311,635 | 11.7% | ||
roelandp | 0 | 139,907,173,063 | 5.85% | ||
mrwang | 0 | 275,493,875 | 4.87% | ||
raymondspeaks | 0 | 778,700,460 | 5.85% | ||
coininstant | 0 | 596,231,428 | 0% | ||
arconite | 0 | 3,018,141,079 | 4.87% | ||
joshglen | 0 | 162,925,713 | 11.7% | ||
kryptik | 0 | 18,708,469,126 | 100% | ||
kdtkaren | 0 | 1,018,466,060 | 0% | ||
lemouth | 0 | 289,816,371,122 | 65% | ||
rjbauer85 | 0 | 4,084,062,837 | 65% | ||
anarchyhasnogods | 0 | 91,554,853,879 | 26% | ||
charlie777pt | 0 | 1,805,939,132 | 1.17% | ||
lamouthe | 0 | 18,885,465,881 | 65% | ||
lk666 | 0 | 835,143,774 | 3.51% | ||
whoib | 0 | 231,067,652 | 5.85% | ||
curie | 0 | 509,482,282,729 | 11.7% | ||
landria | 0 | 139,975,159 | 5.85% | ||
hendrikdegrote | 0 | 5,484,910,822,758 | 11.7% | ||
vact | 0 | 219,212,504,016 | 11.7% | ||
nonameslefttouse | 0 | 395,614,194,883 | 51% | ||
steemstem | 0 | 2,705,927,672,139 | 65% | ||
jamzed | 0 | 30,889,094,702 | 100% | ||
sethroot | 0 | 293,655,523 | 1.17% | ||
j3dy | 0 | 108,848,110 | 0.35% | ||
foundation | 0 | 9,006,489,696 | 65% | ||
the-devil | 0 | 6,223,569,221 | 65% | ||
thevenusproject | 0 | 36,837,075,240 | 65% | ||
dna-replication | 0 | 18,303,740,029 | 65% | ||
aware007 | 0 | 182,911,649 | 8.19% | ||
honusurf | 0 | 12,476,146,794 | 0% | ||
lenin-mccarthy | 0 | 311,576,751 | 5.85% | ||
resteemer | 0 | 408,885,957 | 5.85% | ||
markkujantunen | 0 | 13,522,119,576 | 17% | ||
dyancuex | 0 | 127,921,758 | 5.85% | ||
pacokam8 | 0 | 874,317,213 | 4.68% | ||
borislavzlatanov | 0 | 5,734,729,492 | 65% | ||
kkbaardsen | 0 | 88,569,415 | 11.7% | ||
michelios | 0 | 1,298,750,531 | 1.75% | ||
awesomianist | 0 | 991,314,807 | 2.34% | ||
moksamol | 0 | 1,480,708,893 | 5.85% | ||
getrichordie | 0 | 493,590,005 | 5.85% | ||
thatsweeneyguy | 0 | 651,212,377 | 5.85% | ||
szokerobert | 0 | 460,558,480 | 2.34% | ||
devi1714 | 0 | 174,971,845 | 5.85% | ||
jacalf | 0 | 84,290,121 | 11.7% | ||
foways | 0 | 215,921,097 | 5.85% | ||
eurogee | 0 | 888,041,325 | 6.5% | ||
yeaho | 0 | 828,824,478 | 29.25% | ||
followbtcnews | 0 | 116,811,446,363 | 11.7% | ||
kryzsec | 0 | 39,803,994,650 | 65% | ||
upheaver | 0 | 1,304,607,325 | 6% | ||
mblain | 0 | 134,617,749 | 29.25% | ||
fredrikaa | 0 | 191,202,504,596 | 65% | ||
odic3o1 | 0 | 68,496,270 | 6.5% | ||
soundwavesphoton | 0 | 68,311,658,292 | 100% | ||
lrsm13 | 0 | 102,845,069 | 3.51% | ||
tantawi | 0 | 517,331,786 | 11.7% | ||
samminator | 0 | 32,519,263,767 | 65% | ||
minhnguyen1994 | 0 | 449,331,623 | 100% | ||
enjar | 0 | 14,092,681,188 | 48% | ||
locikll | 0 | 4,704,131,553 | 23.4% | ||
dber | 0 | 42,692,266,858 | 65% | ||
mahdiyari | 0 | 44,132,383,547 | 32.5% | ||
crimsonclad | 0 | 17,340,337,428 | 10% | ||
fanstaf | 0 | 844,268,033 | 9.94% | ||
kerriknox | 0 | 14,233,681,616 | 65% | ||
alexander.alexis | 0 | 8,884,347,117 | 26% | ||
howtostartablog | 0 | 674,395,543 | 1.17% | ||
cobloc | 0 | 220,040,908 | 5.85% | ||
jayna | 0 | 676,942,889 | 1.75% | ||
blessing97 | 0 | 2,548,099,983 | 65% | ||
orcheva | 0 | 850,307,407 | 5.85% | ||
suesa | 0 | 318,387,087,304 | 100% | ||
saunter | 0 | 14,370,109,559 | 65% | ||
rival | 0 | 2,075,930,498 | 1% | ||
reseller | 0 | 303,466,059 | 0.5% | ||
rockeynayak | 0 | 395,942,416 | 65% | ||
ertwro | 0 | 26,976,408,692 | 65% | ||
saywha | 0 | 70,353,067,398 | 100% | ||
ludmila.kyriakou | 0 | 666,781,403 | 19.5% | ||
juanjdiaz89 | 0 | 141,874,254 | 65% | ||
nitesh9 | 0 | 16,345,112,994 | 65% | ||
discordiant | 0 | 3,381,700,853 | 10% | ||
fancybrothers | 0 | 11,727,273,975 | 19.5% | ||
marcovanhassel | 0 | 2,663,318,768 | 25% | ||
nolasco | 0 | 242,805,755 | 0.58% | ||
churchboy | 0 | 11,756,044,611 | 65% | ||
jpederson96 | 0 | 205,067,791 | 1.62% | ||
howo | 0 | 75,953,167,184 | 32.5% | ||
himal | 0 | 5,010,870,872 | 65% | ||
nitego | 0 | 635,411,657 | 3.51% | ||
sweetdreams | 0 | 93,807,391 | 5.85% | ||
bachuslib | 0 | 19,583,469,687 | 100% | ||
neumannsalva | 0 | 1,082,458,985 | 5.85% | ||
abigail-dantes | 0 | 1,039,637,724,678 | 65% | ||
esteemguy | 0 | 500,334,117 | 65% | ||
suravsingh | 0 | 861,843,415 | 65% | ||
joe.nobel | 0 | 5,607,323,044 | 32.5% | ||
misterakpan | 0 | 177,224,933 | 0.58% | ||
kofspades | 0 | 87,919,043 | 5.85% | ||
g0nr0gue | 0 | 327,476,250 | 5.85% | ||
planetenamek | 0 | 3,114,180,849 | 10% | ||
onethousandwords | 0 | 210,482,465 | 5.85% | ||
alexzicky | 0 | 7,405,025,402 | 16.25% | ||
mountain.phil28 | 0 | 3,617,879,026 | 25% | ||
akeelsingh | 0 | 2,722,465,870 | 65% | ||
mountainwashere | 0 | 28,820,307,529 | 65% | ||
sanderdieryck | 0 | 97,063,012 | 5.85% | ||
sharelovenothate | 0 | 407,955,873 | 29.25% | ||
metmuseum | 0 | 164,789,197,125 | 65% | ||
muliadi | 0 | 145,571,743 | 5.85% | ||
tanyaschutte | 0 | 339,754,285 | 6.5% | ||
emekasegun | 0 | 1,367,453,990 | 65% | ||
zest | 0 | 18,196,761,242 | 45.5% | ||
felixrodriguez | 0 | 1,956,961,814 | 32.5% | ||
sublimenonsense | 0 | 89,837,448 | 5.85% | ||
shippou95 | 0 | 98,812,001 | 5.85% | ||
gabox | 0 | 384,852,889 | 0.58% | ||
masterwriter | 0 | 3,619,546,406 | 65% | ||
runningman | 0 | 112,883,456 | 5.85% | ||
honeysara | 0 | 535,099,639 | 2.92% | ||
vadimlasca | 0 | 740,757,124 | 11.7% | ||
massivevibration | 0 | 2,642,958,999 | 5% | ||
nurhayati | 0 | 583,345,171 | 4.87% | ||
jefpatat | 0 | 570,750,316 | 0.58% | ||
nako1337 | 0 | 137,395,842 | 29.25% | ||
capx | 0 | 137,557,198 | 29.25% | ||
cooknbake | 0 | 218,610,039 | 2.34% | ||
laylahsophia | 0 | 17,740,308,059 | 65% | ||
jhanmervz | 0 | 72,947,649 | 5.85% | ||
anna-mi | 0 | 471,560,914 | 5.85% | ||
clweeks | 0 | 563,500,429 | 5.85% | ||
maxruebensal | 0 | 87,165,224 | 5.85% | ||
celestal | 0 | 40,615,822,548 | 100% | ||
pingcess | 0 | 484,818,494 | 5.85% | ||
jamesbarraclough | 0 | 85,495,490 | 11.7% | ||
smafey | 0 | 83,125,345 | 5.85% | ||
paddygsound | 0 | 144,979,121 | 5.85% | ||
marialefleitas | 0 | 158,670,803 | 5.85% | ||
damzxyno | 0 | 143,938,790 | 3.51% | ||
takeru255 | 0 | 101,606,996 | 3.51% | ||
derekvonzarovich | 0 | 152,531,112 | 5.85% | ||
gotgame | 0 | 87,037,290 | 5.85% | ||
birgitt | 0 | 378,058,844 | 11.7% | ||
mayowadavid | 0 | 2,392,210,788 | 32.5% | ||
poodai | 0 | 511,629,694 | 5.85% | ||
imamalkimas | 0 | 244,424,239 | 11.7% | ||
zeeshan003 | 0 | 334,995,002 | 65% | ||
emdesan | 0 | 489,952,411 | 10% | ||
erodedthoughts | 0 | 9,442,814,561 | 15% | ||
nationall | 0 | 119,019,250 | 5.85% | ||
peaceandwar | 0 | 1,625,271,338 | 5.85% | ||
enzor | 0 | 1,025,941,858 | 32.5% | ||
jose27117 | 0 | 71,484,999 | 3.51% | ||
macmaniac77 | 0 | 721,248,076 | 5.85% | ||
anonymous13 | 0 | 73,117,153 | 11.7% | ||
joendegz | 0 | 237,665,002 | 5.85% | ||
pratik27 | 0 | 2,405,236,687 | 32.5% | ||
digitalpnut | 0 | 183,945,628 | 5.85% | ||
kimchi-king | 0 | 162,147,710 | 5.85% | ||
carloserp-2000 | 0 | 16,811,973,302 | 65% | ||
zulfan88 | 0 | 78,400,362 | 11.7% | ||
rachelsmantra | 0 | 2,789,268,070 | 65% | ||
gra | 0 | 22,851,663,377 | 65% | ||
utopian-io | 0 | 29,760,837,967,903 | 19.5% | ||
wandersells | 0 | 78,286,008 | 5.85% | ||
syalla | 0 | 591,018,331 | 100% | ||
eonwarped | 0 | 47,014,121,561 | 37% | ||
tfcoates | 0 | 1,519,130,267 | 16.25% | ||
sci-guy | 0 | 210,848,267 | 65% | ||
kerry234 | 0 | 141,220,487 | 11.7% | ||
kimaben | 0 | 62,917,496 | 2.92% | ||
katerinaramm | 0 | 28,214,987,074 | 60% | ||
youtake | 0 | 1,235,452,671 | 10% | ||
canhoch | 0 | 137,042,617 | 29.25% | ||
janine-ariane | 0 | 487,783,024 | 5% | ||
delph-in-holland | 0 | 126,562,773 | 5.85% | ||
spectrums | 0 | 112,126,255 | 11.7% | ||
drmake | 0 | 6,941,277,465 | 5.85% | ||
eleonardo | 0 | 220,732,610 | 6.5% | ||
aehiguese | 0 | 67,464,005 | 11.7% | ||
saby | 0 | 136,046,417 | 10% | ||
vinxy | 0 | 352,998,713 | 65% | ||
sireh | 0 | 549,356,708 | 1.17% | ||
one-person | 0 | 760,152,786 | 1.46% | ||
physics.benjamin | 0 | 848,891,952 | 65% | ||
kenadis | 0 | 18,414,646,075 | 65% | ||
amavi | 0 | 10,151,170,989 | 13% | ||
florae | 0 | 3,591,320,493 | 65% | ||
robotics101 | 0 | 3,329,116,106 | 52% | ||
tristan-muller | 0 | 422,672,373 | 65% | ||
jaeydallah | 0 | 68,256,601 | 11.7% | ||
mactro | 0 | 1,698,799,877 | 100% | ||
sohailahmed | 0 | 906,053,963 | 5.85% | ||
crescendoofpeace | 0 | 205,873,967 | 2.92% | ||
fejiro | 0 | 859,110,310 | 32.5% | ||
contribution | 0 | 166,507,010 | 10% | ||
aamin | 0 | 1,267,330,560 | 32.5% | ||
trishy | 0 | 65,270,788 | 5% | ||
akumar | 0 | 149,406,611 | 5.85% | ||
sco | 0 | 7,449,391,049 | 13% | ||
adetola | 0 | 5,426,539,022 | 65% | ||
anikekirsten | 0 | 2,846,506,762 | 11.7% | ||
steemgreen | 0 | 842,487,029 | 100% | ||
evernew | 0 | 65,952,965 | 5.85% | ||
rharphelle | 0 | 1,930,929,963 | 25% | ||
dysfunctional | 0 | 3,825,947,475 | 32.5% | ||
rasamuel | 0 | 250,420,783 | 5.85% | ||
stahlberg | 0 | 1,985,359,442 | 5.85% | ||
cerventus | 0 | 87,737,884 | 5.85% | ||
monie | 0 | 489,941,591 | 100% | ||
creatrixity | 0 | 170,650,323 | 5.85% | ||
speaklife | 0 | 154,569,873 | 11.7% | ||
shoganaii | 0 | 2,585,088,679 | 32.5% | ||
hetty-rowan | 0 | 2,805,105,482 | 25% | ||
mkmk | 0 | 68,153,897 | 5.85% | ||
jesusjacr | 0 | 2,567,461,818 | 26% | ||
highonthehog | 0 | 11,812,180,142 | 100% | ||
sneikder | 0 | 94,033,957 | 11.7% | ||
laritheghost | 0 | 443,635,424 | 5.85% | ||
mathowl | 0 | 17,190,021,764 | 100% | ||
bimijay | 0 | 73,294,531 | 11.7% | ||
anarchojeweler | 0 | 77,128,221 | 2.92% | ||
whileponderin | 0 | 4,647,129,590 | 65% | ||
dolphinscute | 0 | 162,097,432 | 5.85% | ||
jlmol7 | 0 | 233,515,902 | 65% | ||
hadji | 0 | 1,872,839,884 | 65% | ||
sakura1012 | 0 | 2,638,573,204 | 65% | ||
zorto | 0 | 126,288,684 | 5.85% | ||
mrxplicit | 0 | 150,009,711 | 11.7% | ||
fidelpoet | 0 | 136,636,565 | 11.7% | ||
terrylovejoy | 0 | 11,190,970,145 | 26% | ||
saunter-pl | 0 | 1,245,176,278 | 65% | ||
olajidekehinde | 0 | 1,267,024,363 | 32.5% | ||
real2josh | 0 | 660,191,839 | 32.5% | ||
soufiani | 0 | 378,263,215 | 0.23% | ||
iamfo | 0 | 188,505,191 | 5.85% | ||
strings | 0 | 109,374,123 | 5.85% | ||
steepup | 0 | 1,067,641,478 | 26% | ||
mrday | 0 | 964,486,523 | 5.85% | ||
aaronteng | 0 | 90,079,782 | 5.85% | ||
debbietiyan | 0 | 276,095,425 | 5.85% | ||
matytan | 0 | 20,811,635,499 | 50% | ||
rionpistorius | 0 | 83,051,514 | 32.5% | ||
steem-hikers | 0 | 1,224,826,353 | 65% | ||
randomwanderings | 0 | 211,532,211 | 5.85% | ||
themanwithnoname | 0 | 118,310,669 | 1.17% | ||
heajin | 0 | 78,437,158 | 16.25% | ||
kingabesh | 0 | 2,780,662,158 | 32.5% | ||
didic | 0 | 1,820,527,846 | 5.85% | ||
kimmejucken | 0 | 142,773,074 | 100% | ||
svemirac | 0 | 60,729,727,781 | 100% | ||
operahoser | 0 | 704,506,694 | 2.92% | ||
yuniraziati | 0 | 73,278,541 | 11.7% | ||
asonintrigue | 0 | 99,236,885 | 5.85% | ||
kelos | 0 | 370,802,075 | 10% | ||
jpmkikoy | 0 | 112,053,364 | 5.85% | ||
caitycat | 0 | 178,149,343 | 5.85% | ||
escapist | 0 | 23,212,135,958 | 100% | ||
dexterdev | 0 | 6,660,913,514 | 65% | ||
gio6 | 0 | 117,725,985 | 5.85% | ||
ugonma | 0 | 3,025,336,448 | 65% | ||
bearded-benjamin | 0 | 13,472,896,746 | 50% | ||
juandvg | 0 | 73,420,067 | 11.7% | ||
ajpacheco1610 | 0 | 1,173,746,517 | 32.5% | ||
vegan.niinja | 0 | 211,039,746 | 5.85% | ||
flugschwein | 0 | 10,815,784,727 | 55.25% | ||
woodzi | 0 | 149,131,903 | 25% | ||
benleemusic | 0 | 4,683,998,935 | 1.17% | ||
lianaakobian | 0 | 13,267,910,948 | 52% | ||
ivan-g | 0 | 175,750,023 | 11.7% | ||
rubencress | 0 | 11,868,107,875 | 100% | ||
chimtivers96 | 0 | 620,071,957 | 11.7% | ||
jerscoguth | 0 | 73,261,113 | 11.7% | ||
sissyjill | 0 | 106,845,957 | 7% | ||
amirdesaingrafis | 0 | 262,573,091 | 5.85% | ||
wrpx | 0 | 90,664,855 | 5.85% | ||
mi7osz | 0 | 479,156,462 | 100% | ||
joelagbo | 0 | 2,773,418,319 | 65% | ||
morbyjohn | 0 | 176,136,158 | 7% | ||
fikar22 | 0 | 63,928,686 | 2.92% | ||
anyes2013 | 0 | 907,164,056 | 32.5% | ||
jaycem | 0 | 143,602,757 | 23.4% | ||
akkighanate2018 | 0 | 84,018,878 | 11.7% | ||
the-doubled | 0 | 61,061,918 | 11.7% | ||
e-troubled | 0 | 64,158,059 | 11.7% | ||
phaazer1 | 0 | 187,445,018 | 5.85% | ||
dedesuryani | 0 | 78,726,614 | 32.5% | ||
theunlimited | 0 | 67,905,648 | 10% | ||
cryptoitaly | 0 | 4,637,740,813 | 32.5% | ||
forestplane | 0 | 356,481,260 | 58.5% | ||
chillingotter | 0 | 208,229,950 | 5.85% | ||
laurentiu.negrea | 0 | 153,677,484 | 5.85% | ||
effofex | 0 | 3,235,723,158 | 32.5% | ||
wisata | 0 | 73,251,732 | 11.7% | ||
mrbreeziewrites | 0 | 5,217,514,739 | 65% | ||
count-antonio | 0 | 188,720,837 | 32.5% | ||
de-stem | 0 | 28,900,451,002 | 58.5% | ||
ikeror | 0 | 89,542,040 | 10.53% | ||
serylt | 0 | 9,865,553,593 | 52% | ||
bavi | 0 | 164,593,059 | 5.85% | ||
hiddenblade | 0 | 86,760,568 | 5.85% | ||
yann85 | 0 | 413,914,893 | 12% | ||
ari16 | 0 | 496,649,184 | 32.5% | ||
steempress-io | 0 | 2,868,682,020,264 | 7% | ||
qurator-tier-0 | 0 | 3,486,034,293 | 1% | ||
event-horizon | 0 | 656,724,593 | 65% | ||
technotroll | 0 | 118,795,263 | 5.85% | ||
xposed | 0 | 2,571,241,843 | 50% | ||
tuwore | 0 | 1,289,628,674 | 25% | ||
michaelwrites | 0 | 753,860,113 | 32.5% | ||
sigmund | 0 | 71,152,140 | 5.85% | ||
kex | 0 | 21,176,498,949 | 100% | ||
apteacher | 0 | 252,672,100 | 2.34% | ||
chloroform | 0 | 12,050,237,258 | 65% | ||
i-have-tested | 0 | 64,314,443 | 11.7% | ||
tasjun | 0 | 95,719,329 | 11.7% | ||
vanessahampton | 0 | 3,925,295,533 | 32.5% | ||
jembee | 0 | 146,096,808 | 5.85% | ||
thesteemmustflow | 0 | 346,662,395 | 2.34% | ||
temitayo-pelumi | 0 | 4,315,463,258 | 65% | ||
qberryfarms | 0 | 292,426,597 | 5.85% | ||
the-tourist | 0 | 67,257,891 | 11.7% | ||
shookriya | 0 | 276,625,129 | 2.34% | ||
doctor-cog-diss | 0 | 369,763,624 | 100% | ||
vigna | 0 | 349,346,677 | 0.58% | ||
onethousandpics | 0 | 185,441,074 | 5.85% | ||
toby-l | 0 | 73,475,815 | 11.7% | ||
synick | 0 | 128,336,714 | 13% | ||
kyanzieuno | 0 | 78,319,277 | 5.85% | ||
niouton | 0 | 649,792,273 | 2.34% | ||
beautyinscience | 0 | 199,066,463 | 32.5% | ||
star-vc | 0 | 2,789,242,599 | 65% | ||
sergiusgreat | 0 | 566,171,208 | 100% | ||
enrag | 0 | 563,743,703 | 100% | ||
chrstnv | 0 | 297,920,777 | 11.7% | ||
klaudiuszkrl | 0 | 564,941,150 | 100% | ||
radomim | 0 | 564,501,922 | 100% | ||
eroticabian | 0 | 97,615,119 | 2.34% | ||
krathos | 0 | 73,059,153 | 11.7% | ||
sthephany | 0 | 73,045,111 | 11.7% | ||
richardgreen | 0 | 173,203,575 | 5.85% | ||
sbi6 | 0 | 8,957,661,429 | 11% | ||
techupdate | 0 | 312,824,470 | 5.85% | ||
biomimi | 0 | 238,622,672 | 40% | ||
ibk-gabriel | 0 | 557,598,366 | 32.5% | ||
drsensor | 0 | 751,671,367 | 19.5% | ||
mirzantorres | 0 | 73,234,854 | 11.7% | ||
fischkopp | 0 | 244,432,574 | 11.7% | ||
rocoduran | 0 | 692,270,281 | 100% | ||
funster | 0 | 139,375,015 | 58.5% | ||
conficker | 0 | 4,371,519,738 | 65% | ||
alldutchcreation | 0 | 373,455,943 | 50% | ||
thoughtfulonion | 0 | 505,179,825 | 100% | ||
mahmudulhassan | 0 | 309,238,796 | 5.85% | ||
angelzam | 0 | 73,390,445 | 11.7% | ||
patapa | 0 | 73,402,898 | 11.7% | ||
purelyscience | 0 | 434,231,428 | 32.5% | ||
derg | 0 | 73,382,611 | 11.7% | ||
capsule-corp | 0 | 165,862,504 | 10% | ||
lagrangemit | 0 | 73,361,125 | 11.7% | ||
riemman-stielmit | 0 | 73,355,610 | 11.7% | ||
schlunior | 0 | 5,062,603,358 | 29.25% | ||
filkreserved | 0 | 563,632,655 | 100% | ||
nikola.kalabic | 0 | 73,077,801 | 11.7% | ||
trigconic | 0 | 563,629,777 | 100% | ||
kind-sir | 0 | 64,925,602 | 2% | ||
actualping | 0 | 563,635,855 | 100% | ||
bitson | 0 | 66,363,116 | 5.85% | ||
call-me-howie | 0 | 2,546,847,352 | 5.85% | ||
sergiotorres | 0 | 73,321,903 | 11.7% | ||
tropicalgrey | 0 | 73,321,222 | 11.7% | ||
cryptoisfun | 0 | 104,605,916 | 5.85% | ||
robchen | 0 | 72,785,542 | 11.7% | ||
hansmast | 0 | 1,011,326,514 | 5.85% | ||
cynicalcake | 0 | 76,491,010 | 5.85% | ||
dman-dmania | 0 | 100,784,955 | 32.5% | ||
jireneye | 0 | 73,280,359 | 11.7% | ||
maikolp | 0 | 73,280,359 | 11.7% | ||
carlosvls | 0 | 73,279,993 | 11.7% | ||
amelisfer | 0 | 73,279,993 | 11.7% | ||
drmoises | 0 | 91,461,177 | 32.5% | ||
osariemen | 0 | 839,256,846 | 32.5% | ||
gatis-photo | 0 | 109,656,803 | 2% | ||
testomilian | 0 | 214,227,887 | 35.1% | ||
sciencebox | 0 | 73,271,866 | 11.7% | ||
scienceboard | 0 | 73,271,866 | 11.7% | ||
jasb | 0 | 73,078,369 | 11.7% | ||
juanchop | 0 | 73,271,866 | 11.7% | ||
olegperytov | 0 | 563,629,777 | 100% | ||
dkapitonov | 0 | 563,632,655 | 100% | ||
allhailfish | 0 | 69,402,337 | 26% | ||
steemingnaija | 0 | 140,303,614 | 2.92% | ||
m03kr1 | 0 | 69,979,655 | 11.7% | ||
mr-hades | 0 | 602,843,908 | 100% | ||
ogsenti | 0 | 61,207,387 | 100% | ||
vzlauniversity | 0 | 73,224,136 | 11.7% | ||
karlab | 0 | 73,224,535 | 11.7% | ||
masterkey1 | 0 | 73,224,535 | 11.7% | ||
michaelto | 0 | 73,224,535 | 11.7% | ||
spoke | 0 | 1,542,256,735 | 11.7% | ||
solardude | 0 | 600,140,480 | 100% | ||
theythundery | 0 | 563,629,777 | 100% | ||
supposer | 0 | 190,017,757 | 58.5% | ||
brinasette | 0 | 552,087,668 | 100% | ||
mrunderstood | 0 | 209,578,841 | 5.85% | ||
emperorhassy | 0 | 599,476,277 | 100% | ||
synthtology | 0 | 343,910,833 | 5.85% | ||
techkajadi | 0 | 395,567,027 | 65% | ||
changevictory | 0 | 73,166,011 | 11.7% | ||
matrixbinary | 0 | 73,166,011 | 11.7% | ||
fclosamigos | 0 | 73,166,011 | 11.7% | ||
plumesteemit | 0 | 73,166,011 | 11.7% | ||
brandsteemit | 0 | 73,166,011 | 11.7% | ||
parchazar | 0 | 73,166,011 | 11.7% | ||
trickgame | 0 | 73,166,011 | 11.7% | ||
swapsteem | 0 | 190,598,911 | 32.5% | ||
stem-espanol | 0 | 5,807,728,220 | 65% | ||
up-quark | 0 | 14,457,652,740 | 65% | ||
soofluffy | 0 | 1,638,314,886 | 100% | ||
gautambnod | 0 | 54,832,308 | 100% | ||
bloguable | 0 | 811,108,576 | 10% | ||
jjsegovia | 0 | 73,104,243 | 11.7% | ||
truelovemom | 0 | 73,102,844 | 11.7% | ||
tecnosc | 0 | 73,102,844 | 11.7% | ||
purplepaper | 0 | 73,102,844 | 11.7% | ||
wonderfulfood | 0 | 73,102,844 | 11.7% | ||
upbeaver | 0 | 101,218,364 | 1% | ||
jacquiw | 0 | 599,973,818 | 100% | ||
alpha-today | 0 | 65,667,535 | 5.85% | ||
steem.racing | 0 | 718,522,179 | 5.85% | ||
dna-polymerase | 0 | 402,125,272 | 65% | ||
dna-ligase | 0 | 402,125,270 | 65% | ||
dna-helicase | 0 | 402,125,267 | 65% | ||
dna-primase | 0 | 402,125,265 | 65% | ||
sliding-clamp | 0 | 402,125,263 | 65% | ||
clamp-loader | 0 | 402,125,262 | 65% | ||
dna-gyrase | 0 | 402,125,260 | 65% | ||
rna-polymerase | 0 | 402,125,259 | 65% | ||
ribosome | 0 | 402,125,257 | 65% |
> Interactive exercise > Below are two images; the one on the right is an encrypted version of the one on the left. Woah! That doesn't seem right. Take your best guess at what went wrong here and explain how you came to that conclusion. It seems like you have done a *Substitution cipher*. And it is easy to break.
author | dexterdev |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t072703584z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 07:29:12 |
last_update | 2018-07-18 07:29:12 |
depth | 1 |
children | 1 |
last_payout | 2018-07-25 07:29:12 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.107 HBD |
curator_payout_value | 0.034 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 316 |
author_reputation | 17,771,704,061,240 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,084,894 |
net_rshares | 67,631,870,655 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
mathowl | 0 | 8,468,028,574 | 51% | ||
lemony-cricket | 0 | 59,163,842,081 | 100% |
You're the closest person here. Very close. Extremely close. Watch out for next post's retrospective.
author | lemony-cricket |
---|---|
permlink | re-dexterdev-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t094417671z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 09:44:21 |
last_update | 2018-07-18 09:44:21 |
depth | 2 |
children | 0 |
last_payout | 2018-07-25 09:44:21 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 101 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,096,256 |
net_rshares | 8,656,989,250 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
dexterdev | 0 | 8,656,989,250 | 100% |
@lemony-cricket, this is a great piece of work. I really commend u cos I know it's not easy researching and putting down something meaningful as this. But, I'd like to start the series from part 1, if you can be so chanced to send me the link I'd be very happy. Thanks. >Interactive exercise >Below are two images; the one on the right is an encrypted version of the one on the left. >Woah! That doesn't seem right. Take your best guess at what went wrong here and explain how you came to that conclusion. I don't know what went wrong. Lol. But I guess the encrypted picture looks blurred and doesn't look sharper at the edges compared to the original picture. Thanks.
author | emperorhassy |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180716t201231553z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"users":["lemony-cricket"],"app":"steemit/0.1"} |
created | 2018-07-16 20:12:36 |
last_update | 2018-07-16 20:12:36 |
depth | 1 |
children | 1 |
last_payout | 2018-07-23 20:12:36 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.063 HBD |
curator_payout_value | 0.019 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 678 |
author_reputation | 47,168,587,998,209 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 64,910,327 |
net_rshares | 40,068,633,790 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 40,068,633,790 | 70% |
Hi there @emperorhassy! **Thank you for your kind words.** You can start the series here: https://steemit.com/steemstem/@lemony-cricket/introduction-to-cryptography-i-encryption-pt-1-the-caesar-cipher I missed a link between the 3rd and 4th posts. For ease of navigation, you may access the entire series at https://lemony.cricket as well! > But I guess the encrypted picture looks blurred and doesn't look sharper at the edges compared to the original picture. Hmm... not quite. Remember that the reason that we encrypt things is to make them completely *invisible* to others. Does the picture on the right look completely random? Or can you sorta tell what's in the picture? That should help you along. The full explanation will be in the retrospective on the next post!
author | lemony-cricket |
---|---|
permlink | re-emperorhassy-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t094740105z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"users":["emperorhassy"],"links":["https://steemit.com/steemstem/@lemony-cricket/introduction-to-cryptography-i-encryption-pt-1-the-caesar-cipher","https://lemony.cricket"],"app":"steemit/0.1"} |
created | 2018-07-18 09:47:45 |
last_update | 2018-07-18 09:47:45 |
depth | 2 |
children | 0 |
last_payout | 2018-07-25 09:47:45 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 779 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,096,544 |
net_rshares | 0 |
Well, I'm thinking it's a CBC... with the property that with constant input, the cipher text is 2-periodic, assuming the cipher is applied along the rows of the image. k(c+v), k(c + k(c+v)), k(c + k(c + k(c + v))... if k(x) were your block encryption. k(c+v) = k(c + k(c + k(c + v)) Without any other info, this could happen if your key was x-or'd too... in which case it would flip between k+c+v and v. Problem with this theory is that it doesn't explain why the stripes would be flat (single colors), unless the same was true of the key and initial vector. And it also doesn't explain why the color would be restored after going through some edges. I don't know, maybe it's just a plain old ECB? No that's not it, because the same background color in the middle has a different color. I think I'll just wait for you to tell me then.
author | eonwarped |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180717t015000728z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-17 01:50:00 |
last_update | 2018-07-17 01:50:00 |
depth | 1 |
children | 2 |
last_payout | 2018-07-24 01:50:00 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.209 HBD |
curator_payout_value | 0.066 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 845 |
author_reputation | 88,102,208,706,615 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 64,934,599 |
net_rshares | 131,829,828,126 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
soundwavesphoton | 0 | 66,980,911,702 | 100% | ||
lemony-cricket | 0 | 56,346,516,268 | 100% | ||
dexterdev | 0 | 8,502,400,156 | 100% |
I know I already said @dexterdev was the closest, but I may have lied. I think you're tied, because his answer is too _undercomplicated_, and yours is too _overcomplicated_. You're on the right track there at the end; we'll talk about it in the retrospective next post.
author | lemony-cricket |
---|---|
permlink | re-eonwarped-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095019648z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"users":["dexterdev"],"app":"steemit/0.1"} |
created | 2018-07-18 09:50:24 |
last_update | 2018-07-21 20:56:09 |
depth | 2 |
children | 1 |
last_payout | 2018-07-25 09:50:24 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 269 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,096,741 |
net_rshares | 0 |
I think @eonwarped did better. Because my answer can even come without reading the article. Just by plain observation, you can answer like mine. @eonwarped has read it properly and knows the stuff I think.
author | dexterdev |
---|---|
permlink | re-lemony-cricket-re-eonwarped-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095157731z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"users":["eonwarped"],"app":"steemit/0.1"} |
created | 2018-07-18 09:54:06 |
last_update | 2018-07-18 09:54:06 |
depth | 3 |
children | 0 |
last_payout | 2018-07-25 09:54:06 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 205 |
author_reputation | 17,771,704,061,240 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,097,054 |
net_rshares | 0 |
BINEX.TRADE is the next promising upcoming crypto exchange, which will daily payout 70% of their trading commission proportionally among the BEX token holders. Grab 3 free BEX tokens (5 Dollars) just for pre-registering: [BINEX.trade get free Token](https://binex.trade/?code=SUMKT)
author | kimmejucken |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180717t161402440z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"links":["https://binex.trade/?code=SUMKT"],"app":"steemit/0.1"} |
created | 2018-07-17 16:14:03 |
last_update | 2018-07-17 16:14:03 |
depth | 1 |
children | 1 |
last_payout | 2018-07-24 16:14:03 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 283 |
author_reputation | 19,909,148,902 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,009,860 |
net_rshares | 139,973,602 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
kimmejucken | 0 | 139,973,602 | 100% |
You've got to be kidding me.
author | lemony-cricket |
---|---|
permlink | re-kimmejucken-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095848247z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 09:58:51 |
last_update | 2018-07-18 09:58:51 |
depth | 2 |
children | 0 |
last_payout | 2018-07-25 09:58:51 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 28 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,097,479 |
net_rshares | 0 |
I am guessing that you didn't pad the first block with arbitrary data for the image :)
author | mathowl |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180716t133950050z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-16 13:39:51 |
last_update | 2018-07-16 13:40:48 |
depth | 1 |
children | 1 |
last_payout | 2018-07-23 13:39:51 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.065 HBD |
curator_payout_value | 0.021 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 86 |
author_reputation | 44,993,635,814,620 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 64,871,239 |
net_rshares | 40,694,706,193 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 40,694,706,193 | 70% |
Not quite! That can be a problem with CBC if you're using the intitialisation vector "hack"... but only the first block would be affected! Hint: it's a big image, and the blocks are _really_ small... watch for next post's retrospective for the full explanation :)
author | lemony-cricket |
---|---|
permlink | re-mathowl-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t094614309z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 09:46:18 |
last_update | 2018-07-18 09:46:18 |
depth | 2 |
children | 0 |
last_payout | 2018-07-25 09:46:18 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.020 HBD |
curator_payout_value | 0.004 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 263 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,096,430 |
net_rshares | 12,446,981,760 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
mathowl | 0 | 12,446,981,760 | 76% |
I once heard about _Quantum Cryptography_ (can't remember where though), but I want to ask; does it have any direct/indirect relationship with any of the cipher methods you listed in the post? If yes, which of them? PS: That image on the right (in the exercise you gave) looks like it had some hidden Steganographic codes in it - I mean; like some text codes are being hidden in it. I might be wrong though. Nice post there
author | samminator |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t072312905z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 07:13:51 |
last_update | 2018-07-18 07:13:51 |
depth | 1 |
children | 2 |
last_payout | 2018-07-25 07:13:51 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.060 HBD |
curator_payout_value | 0.019 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 425 |
author_reputation | 669,737,081,630,307 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,083,697 |
net_rshares | 38,816,488,984 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 38,816,488,984 | 70% |
Quantum cryptography actually has much stronger ties to information theory than the cryptography we're talking about here. There's also _quantum-resistant cryptography_, which aims to re-create the existing systems we have in ways that are resistant to quantum computers. The algorithms most endangered by the ever-looming threat of generalised quantum computing are actually our most popular _public key cryptography_ schemes. Symmetric cryptography (where the key is the same on both sides; the block ciphers and stream ciphers we've been learning about) is actually mostly safe from that stuff. It's not steganography, but if I can fit it in, I'd love to do a post on steganography! Maybe I'll do it as a separate post. If I do I'll credit you for giving me the idea!
author | lemony-cricket |
---|---|
permlink | re-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095824599z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 09:58:27 |
last_update | 2018-07-19 00:48:36 |
depth | 2 |
children | 1 |
last_payout | 2018-07-25 09:58:27 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 773 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,097,441 |
net_rshares | 0 |
Thanks a lot. I would be honoured
author | samminator |
---|---|
permlink | re-lemony-cricket-re-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t235033772z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 23:41:21 |
last_update | 2018-07-18 23:41:21 |
depth | 3 |
children | 0 |
last_payout | 2018-07-25 23:41:21 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 33 |
author_reputation | 669,737,081,630,307 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,173,274 |
net_rshares | 0 |
Congratulations @lemony-cricket! You have completed the following achievement on Steemit and have been rewarded with new badge(s) : [](http://steemitboard.com/@lemony-cricket) Award for the number of upvotes received <sub>_Click on the badge to view your Board of Honor._</sub> <sub>_If you no longer want to receive notifications, reply to this comment with the word_ `STOP`</sub> **Do not miss the last post from @steemitboard:** [SteemitBoard World Cup Contest - The results, the winners and the prizes](https://steemit.com/steemitboard/@steemitboard/steemitboard-world-cup-contest-the-results-and-prizes) > Do you like [SteemitBoard's project](https://steemit.com/@steemitboard)? Then **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!
author | steemitboard |
---|---|
permlink | steemitboard-notify-lemony-cricket-20180717t115614000z |
category | steemstem |
json_metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
created | 2018-07-17 11:56:12 |
last_update | 2018-07-17 11:56:12 |
depth | 1 |
children | 0 |
last_payout | 2018-07-24 11:56:12 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 919 |
author_reputation | 38,975,615,169,260 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 64,982,621 |
net_rshares | 0 |
<center> https://cdn.discordapp.com/attachments/354723995037466624/463380522928963599/steemSTEM.png</center> <br><br> This post has been voted on by the steemstem curation team and voting trail. <br> <br>There is more to SteemSTEM than just writing posts, check <a href="https://steemit.com/steemstem/@steemstem/being-a-member-of-the-steemstem-community">here</a> for some more tips on being a community member. You can also join our discord <a href="https://discord.gg/BPARaqn">here</a> to get to know the rest of the community!
author | steemstem |
---|---|
permlink | re-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180716t194138 |
category | steemstem |
json_metadata | "" |
created | 2018-07-16 19:41:39 |
last_update | 2018-07-16 19:41:39 |
depth | 1 |
children | 0 |
last_payout | 2018-07-23 19:41:39 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.019 HBD |
curator_payout_value | 0.005 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 530 |
author_reputation | 262,017,435,115,313 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 64,907,689 |
net_rshares | 12,208,411,858 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 12,208,411,858 | 22% |
#### Hi @lemony-cricket! Your post was upvoted by utopian.io in cooperation with steemstem - supporting knowledge, innovation and technological advancement on the Steem Blockchain. #### Contribute to Open Source with utopian.io Learn how to contribute on <a href="https://join.utopian.io">our website</a> and join the new open source economy. **Want to chat? Join the Utopian Community on Discord https://discord.gg/h52nFrV**
author | utopian-io |
---|---|
permlink | 20180718t041525843z |
category | steemstem |
json_metadata | {"tags":["utopian.tip"],"app":"utopian-io"} |
created | 2018-07-18 04:15:48 |
last_update | 2018-07-18 04:15:48 |
depth | 1 |
children | 0 |
last_payout | 2018-07-25 04:15:48 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.020 HBD |
curator_payout_value | 0.004 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 428 |
author_reputation | 152,955,367,999,756 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,069,335 |
net_rshares | 12,307,070,798 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 12,208,411,858 | 22% | ||
lemcriq | 0 | 98,658,940 | 22% |