Hi Yongce, I ran your previous example (perhaps I had an old example?). It did produce the expected result (sizeof(plainText)=sizeof(cipherText)).
On 8/12/08, Yongce <[EMAIL PROTECTED]> wrote: > > Hi Jeff, > > Here is a sample program using StreamTransformationFilter with CBC- > CTS. > > [SNIP] > > Plaintext (29 bytes): > this is a message for testing > Ciphertext (29 bytes): > 8383CA42A94C7781D0ACA5BECB663F7CFA8DE5CB20080DCB329C96825B > Plaintext recovered (29 bytes): > this is a message for testing > ----------------------------------------------------------------------------------------- > > Note that the length of the plaintext is not multiple of the block > size, > and the length of the ciphertext is the same with it, > which conforms to the definition of CBC-CTS mode, > but the prior example did not behavior like this. > > Yongce > > On 8月12日, 上午1时06分, "Jeffrey Walton" <[EMAIL PROTECTED]> wrote: > > Hi , > > > > Your program results are what I would expect from CBC\CTS mode using > > the StreamTransformationFilter. Though I don't have any test vectors > > handy to really scrutinize Crypto++ in AES\CBC-CTS, I don't expect a > > problem. > > > > This leaves the code where blocking and stealing of the last two > > cipher text blocks is manually fed ito the encryptor. Can you post > > your code? > > > > Jeff > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [EMAIL PROTECTED] More information about Crypto++ and this group is available at http://www.cryptopp.com. -~----------~----~----~----~------~----~------~--~---
