On Sat, 24 Jul 2010, Rob Withers wrote:
Hans-Martin Mosner, if you have your ears on, I could use some help figuring out the algorithm. Anyone else for that matter.
Here is the spec: http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
The key is cooked for encryption or decryption The data block is submitted for encryption (or decryption, depending on the cooked key)
- first the data block is permuted using the Initial Permutation
- result of the permutation step is encrypted using the cooked key
- result of the encryption step is permuted using the inverse of the
Initial Permutation
I do not know if the problem is with the key cooking or the encryption transformation.
Thanks for any help!
Do the tests in the Cryptography package pass for you?
Levente
Rob _______________________________________________ Cryptography mailing list Cryptography@lists.squeakfoundation.org http://lists.squeakfoundation.org/cgi-bin/mailman/listinfo/cryptography