I have a question about encryption. So I have a code sample that has a key size being chosen, something like 32 bits or something, and I am basically either filling the key size buffer with the password and then zeroes, or null bytes, or a word repeated over and over (Supercalafragalisticexpialidocios). Is there something I am missing about key and IV selection or is this the right way to go? I thought I saw something that automatically chooses the remaining bytes but I don't remember the name of the object. The data security book does not go into this problem at all.
MagnusTheRed90 30 Newbie Poster
rproffitt 2,662 "Nothing to see here." Moderator
tinstaafl 1,176 Posting Maven
Rythorian -3 Newbie Poster
JamesCherrill commented: Either this is mad or it’s malevolent -3
JamesCherrill 4,733 Most Valuable Poster Team Colleague Featured Poster
rproffitt commented: Yes, it seems like another form of ransomware. +16
JamesCherrill 4,733 Most Valuable Poster Team Colleague Featured Poster
rproffitt commented: I know folk dislike it but the perp may be lying. +0
adajames 0 Newbie Poster
Be a part of the DaniWeb community
We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.