Daniel A. Nagy wrote:
Right, your description is equivalent, but different from the traditional
view of CFB. I implemented CFB resynchronization based on the description in
Bruce Schneier's "Applied Cryptography", without looking into any
implementations. The result was interoperable at first attempt.
I (reluctantly) dug out my copy of "Applied Cryptography" and I see no
mention of "resynchronisation".
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff