Solved

Rijndael Initialization Vector

Posted on 2007-12-05
4
909 Views
Last Modified: 2008-02-01
I have some flash actionscript code supposedly used to encrypt/decrypt using rijndael-128. If i were to use this code to encrypt something, what would the initialization vectors be?

## deleted by modus_operandi at Asker's request

Open in new window

0
Comment
Question by:bolaseal
  • 2
4 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 20416628
You want to use the same random initialization vector for encrypting and decrypting
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 20416638
           
           
4.2. Rijndael Initialization Vector

           
               It is up to the entity in question how to obtain/compute
               the 32-bit IV. On Unix operating systems one can use
               reasonably   secure   random   number   sources   such   as
               /dev/random.
           
               IV should satisfy the following requirements:
                    .Unique (non-repeating from one packet to another);
                    .Varying "rapidly" (considerable amount of bits change
                      from one IV to another).
           
               It  is  preferable  but  not  required,  that  IV  is
               unpredictable.
           
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20615367
Forced accept.

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
The goal of the tutorial is to teach the user how to use the auto adjust feature and what the different options do. When your video is not working right you can choose the auto adjust feature to help choose your settings.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now