What are the potential limitations of Electronic Code Book (ECB)? If one ciphertext block is corrupted during the transmission, all subsequent ciphertext blocks cannot be decrypted unless until corrupted block is successfully retransmitted. Repetitive information contained in the plaintext may show in the ciphertext, if aligned with blocks. If the same message (e.g., an SSN) is encrypted (with the same key) and sent twice, their ciphertexts are the same. It needs an initialization vector to operate.
What are the potential limitations of Electronic Code Book (ECB)? If one ciphertext block is corrupted during the transmission, all subsequent ciphertext blocks cannot be decrypted unless until corrupted block is successfully retransmitted. Repetitive information contained in the plaintext may show in the ciphertext, if aligned with blocks. If the same message (e.g., an SSN) is encrypted (with the same key) and sent twice, their ciphertexts are the same. It needs an initialization vector to operate.
Related questions
Question

Transcribed Image Text:What are the potential limitations of Electronic Code Book (ECB)?
If one ciphertext block is corrupted during the transmission, all subsequent
ciphertext blocks cannot be decrypted unless until corrupted block is
successfully retransmitted.
Repetitive information contained in the plaintext may show in the ciphertext, if
aligned with blocks.
If the same message (e.g., an SSN) is encrypted (with the same key) and sent
twice, their ciphertexts are the same.
It needs an initialization vector to operate.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
