At 05:17 PM 3/24/00 -0500, Marcel Popescu wrote: >Ok, I am using a different implementation now. Using Blowfish, with the key >"key", a 64-bit counter equal to 0x0, in CFB mode, with a nil initialization >vector, CFB doesn't matter, as you've used 0 as your IV... >gives me the result: 7DF219349C08D041. Incrementing the counter to >0x1, and encrypting it - with nothing else changed - gives me >7DF219349C08D040 (and it properly decrypts). Definately something wrong. Forget the CBC logic for now.. you're getting the same result. Download scramdisk. Use the About | Cipher Verifier function to generate ECB test cases. You will see that changing a bit in either the key, or the plaintext, changes about half the bits of the ciphertext.
