AES-128-CFB ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

The AES-128-CFB (Advanced Encryption Standard with 128-bit key in Cipher Feedback mode) is a symmetric key encryption method designed to provide confidentiality of data through a combination of block cipher operations and feedback mechanisms. AES operates on fixed-size blocks of 128 bits, applying a series of transformations to transform plaintext into ciphertext using a secret key of 128 bits.

Key Components

  • Key Schedule: AES-128 generates a round key for each encryption round from the original 128-bit key using a key expansion algorithm. The schedule ensures that each round uses a unique subkey derived from the master key.
  • SubBytes: A non-linear substitution step where each byte of the state matrix is replaced with a corresponding value from the S-box, providing confusion.
  • ShiftRows: A transposition step where rows of the state are cyclically shifted to the left by different offsets, increasing diffusion across the block.
  • MixColumns: A linear transformation that combines bytes within each column of the state using Galois field multiplication, further enhancing diffusion. In CFB mode, this step is not applied to plaintext but affects the keystream generation.
  • AddRoundKey: Each byte of the state is combined with the round key using bitwise XOR, integrating key material into the block.

Cipher Feedback Mode (CFB)

CFB transforms a block cipher into a self-synchronizing stream cipher. It encrypts an initialization vector (IV) with AES and then XORs the output with the plaintext to produce ciphertext. For subsequent blocks, the previous ciphertext segment is used as input to the AES encryption function. This allows encryption of data in units smaller than the block size and provides error propagation only over a limited number of blocks.

Encryption Process

  1. The 128-bit key and an initialization vector (IV) are provided as inputs.
  2. The IV is encrypted using the AES-128 block cipher.
  3. The output of AES encryption is XORed with the first plaintext segment to produce ciphertext.
  4. The ciphertext segment is then fed back as the input for encrypting the next plaintext segment.
  5. This process continues iteratively for the entire message, ensuring that the ciphertext depends on both the key and all previous plaintext segments.

Security Features

  • Maintains confidentiality using a 128-bit key resistant to brute-force attacks.
  • Provides self-synchronizing error handling, allowing recovery after partial data corruption.
  • Supports variable-length plaintext encryption while preserving the block cipher structure.