Computer Security Resource Center   nistlogo
Home Library Services Events Advisories Contact Site Map  
SEARCH


advanced search

Cryptographic Toolkit
 Guidance
 Encryption
 Modes of Operation
 Digital Signatures
 Secure Hashing
 Key Management
 RNG
 Message Authentication
 Entity Authentication

 Passwords

Project Sites
CMVP
PKI
Common Criteria
NIAP
Security Practices

Publications
 
 

Cryptographic Toolkit Header

Modes of Operation

Currently, there are five confidentiality modes of operation that can be used with NIST's current encryption algorithms. NIST is considering developing a variety of symmetric key block cipher modes of operation for use with any current and future approved block cipher algorithms.

Current Modes of Operation

FIPS 81, DES Modes of Operation, December 1980.

FIPS 81 specifies four confidentiality modes of operation for DES (ECB, CBC, CFB, OFB), which are used by the Triple DES, DES, and Skipjack algorithms.

SP 800-38A 2001 ED, Recommendation for Block Cipher Modes of Operation, December 2001.

In SP 800-38A, five confidentiality modes are specified: the CTR mode and updated versions of the four DES modes. The modes are approved for use with any approved block cipher, such as the AES algorithm.

Development of New Modes of Operation

NIST will specify additional modes in the SP 800-38 series of special publications.

NIST expects to publish a 2002 edition of SP 800-38A in which the domain of the CBC mode is extended (to include plaintexts whose bit lengths are not a multiple of the block size).

A draft of SP 800-38B, the second document of the series, is available for public comment. The draft specifies the RMAC authentication mode, an improved variant of the CBC-MAC algorithm, for use with any approved block cipher. Comments on the draft may be submitted to EncryptionModes@nist.gov until December 2, 2002.

NIST is considering whether to specify other modes. Several proposals for modes have been submitted to NIST, including modes for authentication, authenticated encryption, hashing, and random bit generation.

Details are available at the Modes of Operation Home Page.

Testing / Products

Modes of operation are not tested per se. Testing is performed according to an encryption algorithm being operated in a specific mode (e.g., Triple DES using TCBC mode).

Cryptographic Toolkit Return to crypto toolkit page