Jump to section:
- What Are Block Cipher Modes?
- ECB Mode (Why It’s Insecure)
- CBC Mode Explained
- CTR Mode Explained
- GCM Mode (Authenticated Encryption)
- CISSP Exam Tips
- Quick Summary
What Are Block Cipher Modes of Operation?
A block cipher such as AES encrypts fixed-size blocks of data (128 bits). On its own, a block cipher can only encrypt a single block. To securely encrypt larger messages, a mode of operation is required.
A block cipher mode defines how encryption is applied across multiple blocks, how randomness is introduced, and whether integrity or authentication is provided. On the CISSP exam, many cryptography questions are really testing your understanding of modes, not algorithms.
ECB Mode (Electronic Codebook)
ECB mode encrypts each block independently using the same key. If two plaintext blocks are identical, the resulting ciphertext blocks will also be identical.
Why ECB Is Insecure
- No randomness
- Patterns in the plaintext are visible
- No integrity or authentication
Because patterns leak directly through the ciphertext, ECB is considered insecure for nearly all real-world use cases.
CISSP takeaway: If ECB appears as an option, it is almost always the wrong answer.
CBC Mode (Cipher Block Chaining)
CBC mode improves on ECB by chaining blocks together. Each plaintext block is XORed with the previous ciphertext block before encryption. An Initialization Vector (IV) randomizes the first block.
Strengths
- Patterns are hidden
- More secure than ECB
Limitations
- No built-in integrity or authentication
- Vulnerable to padding oracle attacks if improperly implemented
CBC is considered a legacy mode. It can still be used safely when paired with a message authentication code (such as HMAC), but it is no longer preferred.
CISSP takeaway: CBC provides confidentiality only. Integrity must be added separately.
CTR Mode (Counter Mode)
CTR mode turns a block cipher into a stream cipher. Instead of encrypting plaintext directly, the cipher encrypts incrementing counter values derived from a nonce. The output is XORed with the plaintext.
Advantages
- Very fast
- Parallelizable
- No padding required
Security Considerations
- No integrity or authentication
- Nonce reuse with the same key completely breaks security
CTR mode is useful when performance matters and confidentiality is the only requirement, but it must be combined with an integrity mechanism for secure communications.
CISSP takeaway: CTR provides encryption only. It does not authenticate data.
GCM Mode (Galois/Counter Mode)
GCM mode combines counter mode encryption with authentication. The name is literal: it uses Counter Mode for encryption and Galois field math to generate an authentication tag.
What GCM Provides
- Confidentiality
- Integrity
- Authentication
GCM is widely used in modern secure protocols, including TLS, HTTPS, IPsec, and WPA3. It is fast, efficient, and designed for modern hardware.
Important Limitation
Nonce reuse with the same key is catastrophic in GCM. Protocols must ensure nonces are never reused.
CISSP takeaway: GCM is the preferred modern mode when both encryption and integrity are required.
CISSP Exam Tips for Cipher Modes
- ECB is insecure and usually the wrong answer
- CBC and CTR do not provide integrity
- Authenticated encryption is superior to encryption alone
- GCM is the most common correct answer in modern scenarios
Many CISSP questions are designed to see whether you notice missing integrity or authentication. Always read the requirement carefully.
Quick Summary
- ECB: Insecure, leaks patterns
- CBC: Confidentiality only, legacy use
- CTR: Fast encryption, no integrity
- GCM: Authenticated encryption, modern standard
If you understand how block cipher modes differ and when each should be used, you are well prepared for cryptography questions on the CISSP exam.
Want to dive deeper? Check out the Advanced Guide
Sponsored: Strengthen your developer account security with a hardware security key. We recommend the YubiKey 5 NFC — it supports FIDO2, OTP, and works across major platforms.

Leave a Reply
You must be logged in to post a comment.