Hi ,

Your program results are what I would expect from CBC\CTS mode using
the StreamTransformationFilter. Though I don't have any test vectors
handy to really scrutinize Crypto++ in AES\CBC-CTS, I don't expect a
problem.

This leaves the code where blocking and stealing of the last two
cipher text blocks is manually fed ito the encryptor. Can you post
your code?

Jeff

On 8/8/08, Yongce <[EMAIL PROTECTED]> wrote:
>
> Hi Jeff,
>
> Here is a sample program.
>
> [SNIP]
>
> result  (VC9 + Crypto++5.5.1):
> -----------------------------------------------------------------------------------------
> Plaintext (29 bytes):
>        this is a message for testing
> Assertion failed: length % s == 0, file .\modes.cpp, line 101
> -----------------------------------------------------------------------------------------
>
> Yongce
>
> On 8月8日, 上午5时55分, "Jeffrey Walton" <[EMAIL PROTECTED]> wrote:
> > Hi Yongce,
> >
> > I have not encountered the issue. Can you send me a sample which
> > demonstrates the issue. I'll see if anything jumps out at me.
> >
> > Jeff
> >
> > > On 8/6/08, Yongce <[EMAIL PROTECTED]> wrote:
> >
> > > > Hi All,
> >
> > > > I found that using CBC_CTS_Mode directly can only process
> > > > data with length of multiple block size.
> > > > And result of using CBC_CTS_Mode directly was different from that of
> > > > using
> > > > StreamTransformationFilter wapping CBC_CTS_Mode.
> >
> > > > I thought that CBC_CTS_Mode could process data with arbitrary length
> > > > and result of the two using of CBC_CTS_Mode should be the same.
> > > > What's wrong?
> >
> > > > Regards,
> > > > Yongce
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [EMAIL PROTECTED]
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
-~----------~----~----~----~------~----~------~--~---

Reply via email to