CFB description in Schneier
17 Dec
2003
17 Dec
'03
5:17 p.m.
In the illustration on pg 161 of Schneier's Applied Cryptography (figure 8.5), the regeneration of bytes to XOR with the cyphertext stream is shown as using decryption. Doesn't this require ENcryption in order to produce the same sequence of XOR bytes that was used in encypherment? --Paul
17 Dec
17 Dec
5:17 p.m.
The first text paragraph on p.161 has the correct description. The picture seems to be in error. Eric
8168
Age (days ago)
8168
Last active (days ago)
1 comments
2 participants
participants (2)
-
hughes@ah.com -
pstemari@bismark.cbis.com