Detection of Substitution attack on Block Cipher ECB mode
This is from Christoff Paar’s book on Cryptography
Let’s assume a protocol for wire transfers between banks (Fig. 5.2). There are five
fields which specify a transfer: the sending bank’s ID and account number, the receiving bank’s ID and …