On Fri, 16 Jul 2004, Aleksey Sanin wrote:

> Sorry, I don't see why application might want to specify IV by itself.

To be able to leak sensible bits? Something that looks random is a good
material for this purpose. It has been done in the past, it is still done
today, and I'd bet it'll be done again in the future.

-- 
Erwann ABALEA <[EMAIL PROTECTED]> - RSA PGP Key ID: 0x2D0EABD5
-----
C'est pas avec la censure que tu vas censurer les censeurs.
-+- JL in GNU : Las, censeurs pour l'�chafaud -+-
_______________________________________________
xmlsec mailing list
[EMAIL PROTECTED]
http://www.aleksey.com/mailman/listinfo/xmlsec

Reply via email to