Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:Modes

181 you have to update the associated support code as well.  In LibTomCrypt the associated code (\textit{chaining modes in this case})
404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode,
405 or use one of the provided chaining modes. All of the ciphers are written as ECB interfaces since it allows the rest of
764 \mysection{Symmetric Modes of Operations}
766 A typical symmetric block cipher can be used in chaining modes to effectively encrypt messages larger than the block
768 $P$ under the key $k$ as $E_k(P)$. In some modes there exists an initial vector denoted as $C_{-1}$.
824 \item No short cycles which is possible in the OFB and CFB modes.
832 block of memory with either of the three modes.
834 The ECB and CBC modes process blocks of the same size as the cipher at a time. Therefore, they are less flexible than the
835 other modes.
908 In all cases, \textit{len} is the size of the buffer (as number of octets) to encrypt or decrypt. The CTR, OFB and CFB modes are order sensitive but not
911 five of the modes will return {\bf CRYPT\_OK} on success from the encrypt or decrypt functions.
1086 These will get or set the 16--octet IV. Note that setting the IV is the same as \textit{seeking} and unlike other modes is not a free operation. It requires
1156 \mysection{Encrypt and Authenticate Modes}
1171 sized message block to send to the recipient as ciphertext. This makes the EAX mode especially suited for streaming modes
1546 A GCM stream is meant to be processed in three modes, one after another. First, the initial vector (per session) data is processed. This should be
5285 When defined the library is configured to build fewer algorithms and modes. Mostly it sticks to NIST and ANSI approved algorithms. See