-
Notifications
You must be signed in to change notification settings - Fork 485
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AES CBC mismatch after decryption. #154
Comments
If you use MODE_ECB instead of MODE_CBC it works. I have several other examples here:
|
@jeevanbmanoj: you missed the random IV, as noted before. Guys, why aren't you using AEAD modes here? You get:
On the downside, you need to handle nonce and mac in the process.
nonce and mac are always 16 byte values in these schemes, hence they can be combined with the ciphertext easily. Please read and understand: BTW, using AEAD, the weakest part is the key, where a KDF like Argon2 could improve the situation significantly. Here's an example, where these components are used together in action: |
Hi,
Please help with the following issue I'm facing. Looking forward to your inputs
https://stackoverflow.com/questions/49767968/pycryprodome-aes-cbc-mismatch-after-decryption-in-python
The text was updated successfully, but these errors were encountered: