On 2013-02-16 18:16, Bram Moolenaar wrote:
>
> Ulrik Sverdrup wrote:
>
>>>> The blowfish encryption mode is vulnerable (not to revelation of the
>>>> plaintext), but the encryption is not checked for integrity or
>>>> authenticity. This means
On 2013-02-15 16:34, MacDonald, Stuart wrote:
> From: Ulrik
>> Sent: February-14-13 1:00 PM
>> The blowfish encryption mode is vulnerable (not to revelation of the
>> plaintext), but the encryption is not checked for integrity or
>
> I suspect the real problem is a
Hi,
On 2013-02-15 03:05, Mosh wrote:
> Ulrik,
>
> Any one random bit flip will cause to one block (8 bytes) to be
> corrupted at that point,
This is my experience too.
> and then all bytes thereafter will be corrupted.
But not this!
> Not just 1 bit
> corruption in encr
On 2013-02-14 22:08, Bram Moolenaar wrote:
>
> Ulrik Sverdrup wrote:
>
>> The blowfish encryption mode is vulnerable (not to revelation of the
>> plaintext), but the encryption is not checked for integrity or
>> authenticity. This means that someone might corrupt the
etect that the wrong password was entered. Security
practise says that Vim must fail with an error if the MAC does not match.
HTH,
ulrik
--
--
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more informa