Hi Dimitrij, > Is there a bug within the RC2 implementation or do i sth. wrong? I don't see a mode specified other than some specialized CBC. See http://www.ietf.org/rfc/rfc2268.txt.
Perhaps you could drop the external mode object, and use RC2 dircetly. See http://www.cryptopp.com/fom-serve/cache/30.html. Jeff On 12/19/07, Dimitrij Drus <[EMAIL PROTECTED]> wrote: > > > Hello everybody. > I've the following problem: > > the RFC2268 (A Description of the RC2(r) Encryption Algorithm) defines some > testvectors. One of them is: > > Key length (bytes) = 8 > Effective key length (bits) = 63 > Key = 00 00 00 00 00 00 00 00 > Plaintext = 00 00 00 00 00 00 00 00 > Ciphertext = eb b7 73 f9 93 27 8e ff > > if I use the provided RC2 implementation the following way I do not get the > expected ciphertext. > > byte key[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; > byte plain[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; > byte cipher[8]; > CryptoPP::ECB_Mode<CryptoPP::RC2>::Encryption encryption(key, sizeof(key)); > encryption.ProcessData(cipher, plain, sizeof(plain)); > > the result is: cf a1 8f 47 ea 73 bd 79 and not the expected eb b7 73 f9 93 > 27 8e ff > > Is there a bug within the RC2 implementation or do i sth. wrong? > > greetings > Dimitrij --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [EMAIL PROTECTED] More information about Crypto++ and this group is available at http://www.cryptopp.com. -~----------~----~----~----~------~----~------~--~---
