Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

8- byte array Intialization Vector

Posted on 2009-05-20
4
Medium Priority
?
839 Views
Last Modified: 2013-11-25
removed by Tiefightermod (which is sensitive and proprietary information. )
I'm working on Triple DES encryption with parameters in JAVA 5: 
 
Key Size :32 bytes 
Key : <key_phrase>
CipherMode : CBC (Cipher Block Chaining) 
Padding Mode : PKCS7 
 
How do I create an 8- byte array initialization vector with the following values in it, { 1, 2, 3, 4, 5, 6, 7, 8} in java. 
 
Equivalent C++ code is 
 
// The Initialization Vector for the DES encryption routine 
private readonly byte[] vector = new byte[16] { 1, 2, 3, 4, 5, 6, 7, 8}; 
 
[- Edited by SouthMod 10/01/09]

Open in new window

0
Comment
Question by:hameeds
  • 3
4 Comments
 
LVL 86

Expert Comment

by:CEHJ
ID: 24436214
Exactly the same apart from

a. the readonly - closest thing in Java is 'final'
b. numeric integral literals are treated as int, so you'll need to cast if the byte value exceeds Byte.MAX_VALUE (127 [ byte is signed - as are all other numeric types apart from char])
0
 

Author Comment

by:hameeds
ID: 24436325
Please check.. if this is ok..
	byte[] iv = new byte[8];		
		int[] array = {1, 2, 3, 4, 5, 6, 7, 8};
		for (int i = 0; i < 7; i++) {
			int offset = (iv.length - 1 - i) * 8;
			iv[i] = (byte) ((array[i] >>> offset) & 0xFF);			
		}

Open in new window

0
 
LVL 86

Accepted Solution

by:
CEHJ earned 150 total points
ID: 24436526
You've already got it right (in the other Java code you posted elsewhere)
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 24442288
Good - progress :-)
0

Featured Post

Receive 1:1 tech help

Solve your biggest tech problems alongside global tech experts with 1:1 help.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
When you discover the power of the R programming language, you are going to wonder how you ever lived without it! Learn why the language merits a place in your programming arsenal.
Introduction to Processes
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question