In the illustration on pg 161 of Schneier's Applied Cryptography (figure 8.5), the regeneration of bytes to XOR with the cyphertext stream is shown as using decryption. Doesn't this require ENcryption in order to produce the same sequence of XOR bytes that was used in encypherment? --Paul