From: pstemari@bismark.cbis.com (Paul J. Ste. Marie)
To: cypherpunks@toad.com
Message Hash: c496ef04864d3b3a6e96effee2067d5b82727c775b2b55daa6b44558961c6178
Message ID: <9408302012.AA05838@focis.sda.cbis.COM>
Reply To: N/A
UTC Datetime: 1994-08-30 20:12:43 UTC
Raw Date: Tue, 30 Aug 94 13:12:43 PDT
From: pstemari@bismark.cbis.com (Paul J. Ste. Marie)
Date: Tue, 30 Aug 94 13:12:43 PDT
To: cypherpunks@toad.com
Subject: CFB description in Schneier
Message-ID: <9408302012.AA05838@focis.sda.cbis.COM>
MIME-Version: 1.0
Content-Type: text/plain
In the illustration on pg 161 of Schneier's Applied Cryptography
(figure 8.5), the regeneration of bytes to XOR with the cyphertext
stream is shown as using decryption. Doesn't this require ENcryption
in order to produce the same sequence of XOR bytes that was used in
encypherment?
--Paul
Return to August 1994
Return to “pstemari@bismark.cbis.com (Paul J. Ste. Marie)”