Re: [cryptopp-users] ECIES with no HMAC

2019-07-01 Thread Mobile Mouse
> I believe I found the issue. > > DL_EncryptionAlgorithm_Xor::GetSymmetricKeyLength changed between 5.6.4 and > 6.0.0: > > size_t GetSymmetricKeyLength(size_t plaintextLength) const > - {return plaintextLength + MAC::DEFAULT_KEYLENGTH;} > +{return plaintextLength +

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Jeffrey Walton
On Mon, Jul 1, 2019 at 7:15 PM Uri Blumenthal wrote: > > Hopefully it will not impact BouncyCastle interoperability. Now - also Botan > interoperability. Yeah, looking at the ECIES tests, it looks like pairwise consistency - generate a key and then round trip some plaintext. I think we should

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Uri Blumenthal
Hopefully it will not impact BouncyCastle interoperability. Now - also Botan interoperability. Sent from my test iPhone > On Jul 1, 2019, at 19:00, Jeffrey Walton wrote: > > > >> On Monday, July 1, 2019 at 6:48:57 PM UTC-4, Mouse wrote: >> If memory serves, ECIES standard required

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Jeffrey Walton
On Monday, July 1, 2019 at 6:48:57 PM UTC-4, Mouse wrote: > > If memory serves, ECIES standard required ^authenticated* encryption. That > means - null hash wasn't allowed. > > Besides, there's Moxy Marlinspike principle: "If you don't enforce > integrity, sooner or later you'll lose

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Uri Blumenthal
If memory serves, ECIES standard required ^authenticated* encryption. That means - null hash wasn't allowed. Besides, there's Moxy Marlinspike principle: "If you don't enforce integrity, sooner or later you'll lose confidentiality as well." Having said that, I don't recall why that particular

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Jeffrey Walton
On Monday, July 1, 2019 at 5:53:45 PM UTC-4, Jeffrey Walton wrote: > > On Mon, Jul 1, 2019 at 5:38 PM Andrew Wason wrote: > > > > On Monday, July 1, 2019 at 2:51:39 PM UTC-4, Jeffrey Walton wrote: > >> > >> > >> I think this may have something to do with >

Re: [cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Jeffrey Walton
On Mon, Jul 1, 2019 at 5:38 PM Andrew Wason wrote: > > On Monday, July 1, 2019 at 2:51:39 PM UTC-4, Jeffrey Walton wrote: >> >> >> I think this may have something to do with >> https://cryptopp.com/wiki/Elliptic_Curve_Integrated_Encryption_Scheme#Bouncy_Castle_Patch >> . That section needs to

[cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Andrew Wason
On Monday, July 1, 2019 at 2:51:39 PM UTC-4, Jeffrey Walton wrote: > > > I think this may have something to do with > https://cryptopp.com/wiki/Elliptic_Curve_Integrated_Encryption_Scheme#Bouncy_Castle_Patch > > . That section needs to clearly state when the change occirs but it does > not.

[cryptopp-users] Re: Failed Travis-CI tests

2019-07-01 Thread Jeffrey Walton
On Monday, July 1, 2019 at 4:35:24 PM UTC-4, Jeffrey Walton wrote: > > > We started catching some failed Autotools test on OS X. My MacBook is down > at the moment so I cannot look at it in detail. > > Other than the Autotools tests things look OK. > This looks like an Autotools problem:

[cryptopp-users] Failed Travis-CI tests

2019-07-01 Thread Jeffrey Walton
Hi Everyone, We started catching some failed Autotools test on OS X. My MacBook is down at the moment so I cannot look at it in detail. Other than the Autotools tests things look OK. Jeff -- You received this message because you are subscribed to "Crypto++ Users". More information about

[cryptopp-users] Re: ECIES with no HMAC

2019-07-01 Thread Jeffrey Walton
On Monday, July 1, 2019 at 2:07:06 PM UTC-4, Andrew Wason wrote: > > We have been using the code below with libcrypto++6 on Ubuntu for years. > It uses a custom NULLHash implementation to reduce the size of the final > ciphertext since we are not concerned with message integrity. > > I

[cryptopp-users] ECIES with no HMAC

2019-07-01 Thread Andrew Wason
We have been using the code below with libcrypto++6 on Ubuntu for years. It uses a custom NULLHash implementation to reduce the size of the final ciphertext since we are not concerned with message integrity. I recently tested this with libcrypto 8.2 and the decrypted text is now partially

Re: [cryptopp-users] RSA failed to decrypt.

2019-07-01 Thread John Paul Hayes II
You'll probably need to share how you are sending the encrypted message. Maybe you simply need to use a base64 encoder to get crazy characters out of the data you send. On Mon, 1 Jul 2019 at 01:54, Romij Uddin wrote: > Hello , > I have used following code to generate key. >

[cryptopp-users] RSA failed to decrypt.

2019-07-01 Thread Romij Uddin
Hello , I have used following code to generate key. CryptoPP::AutoSeededRandomPool rng; CryptoPP::InvertibleRSAFunction parameters; parameters.GenerateRandomWithKeySize( rng, 1024 ); CryptoPP::RSA::PrivateKey privateKey( parameters ); CryptoPP::RSA::PublicKey publicKey(