[Cryptography] Question re: Initialization Vector for AES Counter Mode…

Ron Garret ron at flownet.com
Sun Apr 30 12:17:01 EDT 2017


On Apr 29, 2017, at 2:25 AM, Ray Dillinger <bear at sonic.net> wrote:

> A reasonable protection from bitflipping, if you want something that
> works like a counter mode, doubles the work of encryption/decryption.
> That is to separately encrypt the plaintext and the counter, and let the
> ciphertext be the XOR of the result.  To decrypt, one encrypts the
> counter, XORs the result with the ciphertext, then decrypts the result
> to get the plaintext.

Why not just add the counter to the key and then encrypt?

rg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20170430/4aba45b1/attachment.sig>


More information about the cryptography mailing list