Hi,
Crypto.Cipher.ChaCha20_Poly1305 (RFC7539) starts at block #1 when
encrypting the payload.
I assume you are not using it and you are rather building the AEAD
yourself, combining ChaCha20 and Poly1305?
In that case, you can take the ChaCha20 cipher and call seek(64): you
will effectively be starting from block #1.
Cheers,
H.E.
>
> Dear PycryptoDome Team,
>
> I am currently trying to decrypt an ssh connection which uses chacha20-poly1305 to encrypt the traffic for my Master Thesis.
> I managed to decrypt the length and to verify the MAC from the packets.
> Unfortunately after https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.chacha20poly1305, for the payload decryption the block counter is set to 1.
> I don't see any option on the pycryptodome documentation to change the block counter, which is probably set to 0 per default.
> Did I miss something or is there no such option currently in the framework.
>
> Best regards
>
> Paul Nikolaus
>
> --
> You received this message because you are subscribed to the Google Groups "PyCryptodome" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to pycryp...@googlegroups.com.