Home | History | Annotate | Download | only in libtomcrypt

Lines Matching defs:Plaintext

445 the same buffer.  For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and 
509 /* ... load a block of plaintext in pt ... */
533 /* now we have decrypted ct to the original plaintext in pt */
767 size of the cipher. Given a key $k$, a plaintext $P$ and a cipher $E$ we shall denote the encryption of the block
798 as the block cipher is under a chosen plaintext attack (provided the initial vector is unique).
825 \item Provably as secure as the block cipher being used under a chosen plaintext attack.
827 \item Allows random access to the plaintext.
840 by encrypting the last ciphertext block in ECB mode, and XOR'ing the output against the last partial block of plaintext. LibTomCrypt does not
877 length as the block size\footnote{In other words the size of a block of plaintext for the cipher, e.g. 8 for DES, 16 for AES, etc.}
988 if ((err = ctr_encrypt( buffer, /* plaintext */
990 sizeof(buffer), /* length of plaintext pt */
1009 buffer, /* plaintext */
1010 sizeof(buffer), /* length of plaintext */
1071 These will encrypt (or decrypt) the plaintext to the ciphertext buffer (or vice versa). The length is specified by \textit{len} in octets but must be a multiple
1099 against the plaintext to encrypt. F8 mode comes with the additional twist that the counter value is secret, encrypted by a \textit{salt key}. We
1169 The mode can then process plaintext producing ciphertext as well as compute a partial checksum. The actual checksum
1275 pt, /* plaintext (source) */
1277 sizeof(pt) /* size of plaintext */
1382 This will terminate an encrypt stream \textit{ocb}. If you have trailing bytes of plaintext that will not complete a block
1468 The plaintext is stored in \textit{pt}, and the ciphertext in \textit{ct}. The length of both are expected to be equal and is passed in as \textit{ptlen}. It is
1472 As implemented, this version of CCM cannot handle header or plaintext data longer than $2^{32} - 1$ octets long.
1510 pt, 32, /* 32-byte plaintext */
1528 pt, /* plaintext */
1535 /* now pt[0..31] should hold the original plaintext,
1543 however, unlike EAX it cannot accept \textit{additional authentication data} (meta--data) after plaintext has been processed. This mode also only works with
1547 unique to every session. Next, the the optional additional authentication data is processed, and finally the plaintext (or ciphertext depending on the direction).
1590 \subsubsection{Plaintext Processing}
1591 After the AAD has been processed, the plaintext (or ciphertext depending on the direction) can be processed.
1601 This processes message data where \textit{pt} is the plaintext and \textit{ct} is the ciphertext. The length of both are equal and stored in \textit{ptlen}. Depending on
1602 the mode \textit{pt} is the input and \textit{ct} is the output (or vice versa). When \textit{direction} equals \textbf{GCM\_ENCRYPT} the plaintext is read,
1680 /* process the plaintext */
3235 A person who wants to encrypt with your public key simply forms an integer (the plaintext) $M$ such that
3243 the plaintext to be encrypted than it is possible that $M^3 < N$ in which case finding the cube-root would be trivial.
3548 pt2, /* where to put plaintext */
3549 &l2, /* plaintext length */
3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant
3868 plaintext in the array pointed to by \textit{in} of length \textit{inlen} octets. It uses the public ECC key pointed to by \textit{key}, and
3869 hash algorithm indexed by \textit{hash} to construct a shared secret which may be XOR'ed against the plaintext. The ciphertext is stored in
3896 skey OCTET STRING -- xor of plaintext and
4107 a shared key is computed, and the hash of the shared key XOR'ed against the plaintext forms the ciphertext. The format used is functional port of
5259 call ctr\_encrypt() with an odd amount of plaintext then call it again the CTR pad (the IV) will be partially used. This will
5260 cause the ctr routine to first use up the remaining pad bytes. Then if there are enough plaintext bytes left it will use
5397 @param pt The plaintext
5408 @param pt [out] The plaintext
5436 @param pt Plaintext
5448 @param pt Plaintext
5460 @param pt Plaintext
5474 @param pt Plaintext
5488 @param pt Plaintext
5504 @param pt Plaintext
5521 @param pt Plaintext
5543 @param pt [out] The plaintext
5544 @param ptlen The length of the plaintext (octets)
5569 @param pt The plaintext
5570 @param ptlen The length of the plaintext/ciphertext
5645 The size of the ciphers plaintext or ciphertext is \textit{block\_length} and is measured in octets.
5659 To process a single block in ECB mode the ecb\_encrypt() and ecb\_decrypt() functions were provided. The plaintext and ciphertext buffers are allowed to overlap so you
5691 This function (and the way it's called) differs from the other two since ctr\_encrypt() allows any size input plaintext. The accelerator will only be