|Subject||Computer and Network Security|
|NU Year||Set: 3.(d) Marks: 4 Year: 2014|
Some modes of operation (eg CTR) work in such a way that only known values are ever encrypted, forming a stream of pseudo-random data that is then combined with the plaintext by a keyless reversible operation (often xor) to form the ciphertext.
Other modes (eg CBC) directly encrypt secret (ie plaintext) values, meaning decryption is required to find out what the secret value was.
One of the biggest advantages of a scheme that does not require decryption is that it can be implemented in hardware with reduced footprint (ie it's smaller). Moreover, for block ciphers such as AES it can often be easier to implement efficient encryption than decryption because the internal coefficients have been optimized for this direction.