At 05:17 PM 3/24/00 -0500, Marcel Popescu wrote:


>Ok, I am using a different implementation now. Using Blowfish, with the key
>"key", a 64-bit counter equal to 0x0, in CFB mode, with a nil initialization
>vector, 

CFB doesn't matter, as you've used 0 as your IV...

>gives me the result: 7DF219349C08D041. Incrementing the counter to
>0x1, and encrypting it - with nothing else changed - gives me
>7DF219349C08D040 (and it properly decrypts). 

Definately something wrong.  Forget the CBC logic for now.. 
you're getting the same result.  

Download scramdisk.  Use the About | Cipher Verifier
function to generate ECB test cases.  You will see that
changing a bit in either the key, or the plaintext, changes
about half the bits of the ciphertext.










  





Reply via email to