AES-256 CBC - hitting assert at line 197 in secblock.h

2011-02-21 Thread User56784
Hi, I’m hitting an assert at line 197 in secblock.h when using AES-CBC encryption with 256 bit key. It started with occasional failure when generating random keys and I could not find out what’s causing the problem, because I needed many attempts to get repro. Later on when I had a few keys

Re: AES-256 CBC - hitting assert at line 197 in secblock.h

2011-02-21 Thread User56784
I forgot - I'm using CryptoPP 5.6.1 On Feb 21, 4:43 pm, User56784 r.ja...@comcast.net wrote: Hi, I’m hitting an assert at line 197 in secblock.h when using AES-CBC encryption with 256 bit key. It started with occasional failure when generating random keys and I could not find out what’s

Re: AES-256 CBC - hitting assert at line 197 in secblock.h

2011-02-25 Thread User56784
I have tried with CRYPTOPP_BOOL_ALIGN16_ENABLED 0, but encryption/ decryption stopped working completely. Perhaps this flag can be used only on big-endians to make bytes ordered correctly. But thanks for info, it definitely must be some issue with allocator/ deallocator, because in deallocator

Re: AES decryption with different IV

2011-02-25 Thread User56784
You are absolutely right that using random IV during encryption and then another random IV during decryption will lead to garbage. What you have to do is to send your random IV along with encrypted text. Usually you put IV at the beginning. For example: IV = 60ca cipher = f576ab you send

Re: AES decryption with different IV

2011-03-01 Thread User56784
to determine length of the password for brute force attack. If you have XML file around 50 kB in size, the length for encryption will be anywhere from 49152 B - 53248 B (multiple of 4096). On Feb 26, 6:12 am, Robert Bielik robert.bie...@modularstreams.com wrote: On 26 Feb, 04:17, User56784 r.ja