From: [EMAIL PROTECTED]

rival> I would like to ask a simple question :
rival> if I block cipher few times the same string and armor
rival> the result with base64, the output will always look the same,
rival> is there any way of making it like the same plain text string is
rival> different each time you crypt it.
rival> 
rival> An other way than adding some (!= block size) random bytes at
rival> start|end of crypted string before armoring it, because you
rival> still get some fixed part in the crypted-armored string when
rival> you repeat it.

An idea is to have some random bits at the beginning of the
unencrypted message and then encrypt in CBC mode, or something
similar.  That way, the randomness at the beginning will keep on in
the encrypted message. 

rival> Does it require a hack of openssl to includes one(more?) random
rival> byte in each cipher block (block_size bits = first bits is random,
rival> others are datas)

You'll have to do that on your own...

rival> does that make sense or is there a trick ?!

CBC mode or similar together with some randomness at the beginning of
the original message is the only standard thing I can think of right now...

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-733-72 88 11
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, GemPlus:             http://www.gemplus.com/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to