Solved

8- byte array Intialization Vector

Posted on 2009-05-20
4
804 Views
Last Modified: 2013-11-25
removed by Tiefightermod (which is sensitive and proprietary information. )
I'm working on Triple DES encryption with parameters in JAVA 5: 
 
Key Size :32 bytes 
Key : <key_phrase>
CipherMode : CBC (Cipher Block Chaining) 
Padding Mode : PKCS7 
 
How do I create an 8- byte array initialization vector with the following values in it, { 1, 2, 3, 4, 5, 6, 7, 8} in java. 
 
Equivalent C++ code is 
 
// The Initialization Vector for the DES encryption routine 
private readonly byte[] vector = new byte[16] { 1, 2, 3, 4, 5, 6, 7, 8}; 
 
[- Edited by SouthMod 10/01/09]

Open in new window

0
Comment
Question by:hameeds
  • 3
4 Comments
 
LVL 86

Expert Comment

by:CEHJ
ID: 24436214
Exactly the same apart from

a. the readonly - closest thing in Java is 'final'
b. numeric integral literals are treated as int, so you'll need to cast if the byte value exceeds Byte.MAX_VALUE (127 [ byte is signed - as are all other numeric types apart from char])
0
 

Author Comment

by:hameeds
ID: 24436325
Please check.. if this is ok..
	byte[] iv = new byte[8];		
		int[] array = {1, 2, 3, 4, 5, 6, 7, 8};
		for (int i = 0; i < 7; i++) {
			int offset = (iv.length - 1 - i) * 8;
			iv[i] = (byte) ((array[i] >>> offset) & 0xFF);			
		}

Open in new window

0
 
LVL 86

Accepted Solution

by:
CEHJ earned 50 total points
ID: 24436526
You've already got it right (in the other Java code you posted elsewhere)
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 24442288
Good - progress :-)
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In our personal lives, we have well-designed consumer apps to delight us and make even the most complex transactions simple. Many enterprise applications, however, are a bit behind the times. For an enterprise app to be successful in today's tech wo…
Read about the ways of improving workplace communication.
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question