All,
I checked previous posts, but I couldn't find the answer to this question. If it's there, my apologies. I'm looking for some direction on how to properly decrypt a message using a public key without any padding. Our application uses a challenge response algorithm between a client and server. Simply, the challenge is issued, and the client proves it has possession of the private key by signed the issued challenge. Since the challenge is designed to be the same length as the key, our Java-server signs the challenge with NO padding. However, when I look through crypto++, all I find are the OAEP and PKCS padding schemes. As neither seem to work, how to I setup crypto++ to decrypt these non-padded messages? Thanks for all your help in advance. Best, John --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [EMAIL PROTECTED] More information about Crypto++ and this group is available at http://www.cryptopp.com. -~----------~----~----~----~------~----~------~--~---
