Hi Dimitrij,

> Is there a bug within the RC2 implementation or do i sth. wrong?
I don't see a mode specified other than some specialized CBC. See
http://www.ietf.org/rfc/rfc2268.txt.

Perhaps you could drop the external mode object, and use RC2 dircetly.
See http://www.cryptopp.com/fom-serve/cache/30.html.

Jeff

On 12/19/07, Dimitrij Drus <[EMAIL PROTECTED]> wrote:
>
>
> Hello everybody.
> I've the following problem:
>
> the RFC2268 (A Description of the RC2(r) Encryption Algorithm) defines some
> testvectors. One of them is:
>
> Key length (bytes) = 8
> Effective key length (bits) = 63
> Key = 00 00 00 00 00 00 00 00
> Plaintext = 00 00 00 00 00 00 00 00
> Ciphertext = eb b7 73 f9 93 27 8e ff
>
> if I use the provided RC2 implementation the following way I do not get the
> expected ciphertext.
>
> byte key[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
> byte plain[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
> byte cipher[8];
> CryptoPP::ECB_Mode<CryptoPP::RC2>::Encryption encryption(key, sizeof(key));
> encryption.ProcessData(cipher, plain, sizeof(plain));
>
> the result is: cf a1 8f 47 ea 73 bd 79 and not the expected  eb b7 73 f9 93
> 27 8e ff
>
> Is there a bug within the RC2 implementation or do i sth. wrong?
>
> greetings
> Dimitrij

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [EMAIL PROTECTED]
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
-~----------~----~----~----~------~----~------~--~---

Reply via email to