[Cryptography Team] block-based cipher padding

Ron Teitelbaum Ron at USMedRec.com
Mon Jul 10 23:02:40 UTC 2006


Hi Chris,

 

I've finally figured out what was going wrong with some of my CBC tests.  I
have some more questions about padding.

 

The test: 

 

            Case #3: Encrypting 48 bytes (3 blocks) using AES-CBC with
128-bit key

            Key : 0x6c3ea0477630ce21a2ce334aa746c2cd

            IV : 0xc782dc4c098c66cbd9cd27d825682c81

            Plaintext : This is a 48-byte message (exactly 3 AES blocks)

            Ciphertext: 0xd0a02b3836451753d493665d33f0e886

            2dea54cdb293abc7506939276772f8d5

            021c19216bad525c8579695d83ba2684

 

Is returning the value:
'D0A02B3836451753D493665D33F0E8862DEA54CDB293ABC7506939276772F8D5021C19216BA
D525C8579695D83BA2684D248B3E0F2388C137102846EB06272FF'  which is correct
except for the padding.  Since we are using the padding and it will be
removed in our system should this be considered a passing test?

 

My guess is yes but if we send these encrypted values to other systems will
they know how to un-pad and decrypt the cipherText?  In other words, how
widely adopted is Schneier's and Ferguson's padding suggestion?  Should we
enable a switch to allow developers to turn this off? 

 

Ron Teitelbaum

President / Principal Software Developer

US Medical Record Specialists

Ron at USMedRec.com 

Squeak Cryptography Team Leader

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.squeakfoundation.org/pipermail/cryptography/attachments/20060710/8c0a0664/attachment.htm


More information about the Cryptography mailing list