Solved

Rijndael Initialization Vector

Posted on 2007-12-05
4
915 Views
Last Modified: 2008-02-01
I have some flash actionscript code supposedly used to encrypt/decrypt using rijndael-128. If i were to use this code to encrypt something, what would the initialization vectors be?

## deleted by modus_operandi at Asker's request

Open in new window

0
Comment
Question by:bolaseal
  • 2
4 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 20416628
You want to use the same random initialization vector for encrypting and decrypting
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 20416638
           
           
4.2. Rijndael Initialization Vector

           
               It is up to the entity in question how to obtain/compute
               the 32-bit IV. On Unix operating systems one can use
               reasonably   secure   random   number   sources   such   as
               /dev/random.
           
               IV should satisfy the following requirements:
                    .Unique (non-repeating from one packet to another);
                    .Varying "rapidly" (considerable amount of bits change
                      from one IV to another).
           
               It  is  preferable  but  not  required,  that  IV  is
               unpredictable.
           
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20615367
Forced accept.

Computer101
EE Admin
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The goal of the tutorial is to teach the user what frame rate is, how to control it and what effect it has on the video.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question