[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CFB description in Schneier



In the illustration on pg 161 of Schneier's Applied Cryptography
(figure 8.5), the regeneration of bytes to XOR with the cyphertext
stream is shown as using decryption.  Doesn't this require ENcryption
in order to produce the same sequence of XOR bytes that was used in
encypherment? 

	--Paul