summaryrefslogtreecommitdiffstats
path: root/doc/krb5-protocol
diff options
context:
space:
mode:
authorRichard Basch <probe@mit.edu>1995-12-12 19:32:45 +0000
committerRichard Basch <probe@mit.edu>1995-12-12 19:32:45 +0000
commit2b08d8c0a9968b46c8b047df43fdb19a1a8fac9d (patch)
treef3a4b3f3380507be4dff4a6dc6458ae624acebf2 /doc/krb5-protocol
parent3479c4562b4f0c5020f9008089dcce9604e6912f (diff)
downloadkrb5-2b08d8c0a9968b46c8b047df43fdb19a1a8fac9d.tar.gz
krb5-2b08d8c0a9968b46c8b047df43fdb19a1a8fac9d.tar.xz
krb5-2b08d8c0a9968b46c8b047df43fdb19a1a8fac9d.zip
* 3-des.txt: Updated to include some of the randomness throughout
the entire key. The second 3-DES CBC encryption of the block should use an ivec of the last cipher block. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7206 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'doc/krb5-protocol')
-rw-r--r--doc/krb5-protocol/3-des.txt10
1 files changed, 6 insertions, 4 deletions
diff --git a/doc/krb5-protocol/3-des.txt b/doc/krb5-protocol/3-des.txt
index 05dc378b56..ce64845470 100644
--- a/doc/krb5-protocol/3-des.txt
+++ b/doc/krb5-protocol/3-des.txt
@@ -26,10 +26,12 @@ produce three DES keys sans parity. The 168 bits are then expanded to
include odd parity, for use within the DES routines. If any of the keys
are weak or semi-weak, they are strengthened by eXclusive-ORing the
questionable key with the constant 00000000000000F0. The three DES keys
-are then used to encrypt themselves in 3-DES CBC mode. This result is
-once again encrypted using the same keys and key schedule, and the
-result is parity adjusted. If the final result yields weak or semi-weak
-keys, they are also strengthened in the same manner as the input keys.
+are then used to encrypt themselves in 3-DES CBC mode with a zero
+initial vector. This result is once again encrypted using the same keys
+and key schedule and an initial vector of the last eight octets. The
+result is then parity adjusted. If the final result yields weak or
+semi-weak keys, they are also strengthened in the same manner as the
+input keys.
The n-fold operation used by the string-to-key algorithm
replicates the input bit array X until its length is the least common