Electronic Codebook (ECB) mode
E845072
Electronic Codebook (ECB) mode is a basic block cipher operation mode that encrypts each block of data independently, resulting in identical ciphertext blocks for identical plaintext blocks and making it generally unsuitable for securing structured or repetitive data.
Observed surface forms (1)
| Surface form | Occurrences |
|---|---|
| Electronic Codebook mode | 0 |
Statements (47)
| Predicate | Object |
|---|---|
| instanceOf |
block cipher mode of operation
ⓘ
encryption mode ⓘ |
| abbreviation | ECB ⓘ |
| advantage |
simple implementation
ⓘ
supports parallel encryption of blocks ⓘ supports random access to encrypted blocks ⓘ |
| blockIndex | i denotes the block number ⓘ |
| category | symmetric-key cryptography ⓘ |
| considered | cryptographically weak for most applications ⓘ |
| contrastedWith |
Cipher Block Chaining mode
ⓘ
Cipher Feedback mode ⓘ Counter mode ⓘ Output Feedback mode ⓘ |
| decryptionFormula | P_i = D_K(C_i) ⓘ |
| definedIn | ISO/IEC 10116 NERFINISHED ⓘ |
| designGoal | simple block-by-block encryption without chaining ⓘ |
| disadvantage |
no diffusion across blocks
ⓘ
reveals patterns in plaintext ⓘ susceptible to block rearrangement ⓘ |
| doesNotUse |
feedback between blocks
ⓘ
initialization vector ⓘ |
| encryptionFormula | C_i = E_K(P_i) ⓘ |
| hasAlternativeName | ECB mode ⓘ |
| historicallyUsedIn | early DES-based systems ⓘ |
| insecureFor |
database field encryption with repeated values
ⓘ
file system encryption ⓘ image encryption ⓘ |
| notRecommendedBy | NIST for general data encryption ⓘ |
| notRecommendedFor |
large volumes of data
ⓘ
repetitive data ⓘ structured data ⓘ |
| operatesOn | fixed-size blocks ⓘ |
| property |
encrypts each block independently
ⓘ
identical plaintext blocks produce identical ciphertext blocks ⓘ stateless encryption per block ⓘ |
| requires | secret key ⓘ |
| securityDependsOn | underlying block cipher strength ⓘ |
| standardizedIn | NIST SP 800-38A NERFINISHED ⓘ |
| suitableFor |
encrypting short random values
ⓘ
key wrapping in some legacy systems ⓘ random access encryption of small, independent blocks ⓘ |
| usedWith |
AES
NERFINISHED
ⓘ
DES NERFINISHED ⓘ |
| uses | block cipher ⓘ |
| vulnerableTo |
block replay attacks
ⓘ
known-plaintext analysis ⓘ pattern leakage ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.