home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!zaphod.mps.ohio-state.edu!magnus.acs.ohio-state.edu!bgsuvax!att!att!dptg!ulysses!ulysses!smb
- From: smb@ulysses.att.com (Steven Bellovin)
- Subject: Re: pseudo one time pad...
- Message-ID: <1992Nov12.021258.15260@ulysses.att.com>
- Date: Thu, 12 Nov 1992 02:12:58 GMT
- References: <1992Nov11.173642.29608@ee.eng.ohio-state.edu> <1992Nov11.193848.10946@rchland.ibm.com>
- Organization: AT&T Bell Laboratories
- Lines: 16
-
- In article <1992Nov11.193848.10946@rchland.ibm.com>, lwloen@rchland.vnet.ibm.com (Larry Loen) writes:
- > I don't know exactly who has done what,
- > but I am sure something like that is out there. I recall, also, the
- > ANSI standard shows one possible way of doing something along this line.
-
- Yup, it's output feedback mode. You generate the pseudo-random key
- as follows:
-
- C[0] = DES(K, IV)
- C[n+1] = DES(K, C[n])
-
- where K is the 56-bit DES key and IV is a 64-bit initial vector.
-
- The different modes of DES have different properties. I suggest
- reading Davies and Price's ``Security for Computer Networks'' for
- an excellent discussion of the topic.
-