Improve company productivity with a Business Account.Sign Up

x
?
Solved

8- byte array Intialization Vector

Posted on 2009-05-20
4
Medium Priority
?
841 Views
Last Modified: 2013-11-25
removed by Tiefightermod (which is sensitive and proprietary information. )
I'm working on Triple DES encryption with parameters in JAVA 5: 
 
Key Size :32 bytes 
Key : <key_phrase>
CipherMode : CBC (Cipher Block Chaining) 
Padding Mode : PKCS7 
 
How do I create an 8- byte array initialization vector with the following values in it, { 1, 2, 3, 4, 5, 6, 7, 8} in java. 
 
Equivalent C++ code is 
 
// The Initialization Vector for the DES encryption routine 
private readonly byte[] vector = new byte[16] { 1, 2, 3, 4, 5, 6, 7, 8}; 
 
[- Edited by SouthMod 10/01/09]

Open in new window

0
Comment
Question by:hameeds
  • 3
4 Comments
 
LVL 86

Expert Comment

by:CEHJ
ID: 24436214
Exactly the same apart from

a. the readonly - closest thing in Java is 'final'
b. numeric integral literals are treated as int, so you'll need to cast if the byte value exceeds Byte.MAX_VALUE (127 [ byte is signed - as are all other numeric types apart from char])
0
 

Author Comment

by:hameeds
ID: 24436325
Please check.. if this is ok..
	byte[] iv = new byte[8];		
		int[] array = {1, 2, 3, 4, 5, 6, 7, 8};
		for (int i = 0; i < 7; i++) {
			int offset = (iv.length - 1 - i) * 8;
			iv[i] = (byte) ((array[i] >>> offset) & 0xFF);			
		}

Open in new window

0
 
LVL 86

Accepted Solution

by:
CEHJ earned 150 total points
ID: 24436526
You've already got it right (in the other Java code you posted elsewhere)
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 24442288
Good - progress :-)
0

Featured Post

Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The narrative of smartphone revolution is incomplete without the mention of apps, for the latter is being used today for a variety of purposes. From booking hotel (or plane) tickets to ordering food to even conducting small businesses, mobiles apps …
Formatted your external or internal hard drive, and lost entire data. Now searching for a trusted solution to recover lost data from a formatted hard drive. So, read this article & perform steps to recover photos (images), documents, videos, files e…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question