Solved

Rijndael Initialization Vector

Posted on 2007-12-05
4
935 Views
Last Modified: 2008-02-01
I have some flash actionscript code supposedly used to encrypt/decrypt using rijndael-128. If i were to use this code to encrypt something, what would the initialization vectors be?

## deleted by modus_operandi at Asker's request

Open in new window

0
Comment
Question by:bolaseal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 20416628
You want to use the same random initialization vector for encrypting and decrypting
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 20416638
           
           
4.2. Rijndael Initialization Vector

           
               It is up to the entity in question how to obtain/compute
               the 32-bit IV. On Unix operating systems one can use
               reasonably   secure   random   number   sources   such   as
               /dev/random.
           
               IV should satisfy the following requirements:
                    .Unique (non-repeating from one packet to another);
                    .Varying "rapidly" (considerable amount of bits change
                      from one IV to another).
           
               It  is  preferable  but  not  required,  that  IV  is
               unpredictable.
           
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20615367
Forced accept.

Computer101
EE Admin
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video teaches users how to migrate an existing Wordpress website to a new domain.
The goal of the tutorial is to teach the user how to how to load their YouTube profile onto Flash Media Live Encoder.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question