From: [EMAIL PROTECTED] rival> I would like to ask a simple question : rival> if I block cipher few times the same string and armor rival> the result with base64, the output will always look the same, rival> is there any way of making it like the same plain text string is rival> different each time you crypt it. rival> rival> An other way than adding some (!= block size) random bytes at rival> start|end of crypted string before armoring it, because you rival> still get some fixed part in the crypted-armored string when rival> you repeat it.
An idea is to have some random bits at the beginning of the unencrypted message and then encrypt in CBC mode, or something similar. That way, the randomness at the beginning will keep on in the encrypted message. rival> Does it require a hack of openssl to includes one(more?) random rival> byte in each cipher block (block_size bits = first bits is random, rival> others are datas) You'll have to do that on your own... rival> does that make sense or is there a trick ?! CBC mode or similar together with some randomness at the beginning of the original message is the only standard thing I can think of right now... -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] Redakteur@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47 \ SWEDEN \ or +46-733-72 88 11 Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Software Engineer, GemPlus: http://www.gemplus.com/ Unsolicited commercial email is subject to an archival fee of $400. See <http://www.stacken.kth.se/~levitte/mail/> for more info. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]