CFB description in Schneier

Paul J. Ste. Marie pstemari at bismark.cbis.com
Tue Aug 30 13:12:43 PDT 1994


In the illustration on pg 161 of Schneier's Applied Cryptography
(figure 8.5), the regeneration of bytes to XOR with the cyphertext
stream is shown as using decryption.  Doesn't this require ENcryption
in order to produce the same sequence of XOR bytes that was used in
encypherment? 

	--Paul






More information about the cypherpunks-legacy mailing list