I have a question about encryption. So I have a code sample that has a key size being chosen, something like 32 bits or something, and I am basically either filling the key size buffer with the password and then zeroes, or null bytes, or a word repeated over and over (Supercalafragalisticexpialidocios). Is there something I am missing about key and IV selection or is this the right way to go? I thought I saw something that automatically chooses the remaining bytes but I don't remember the name of the object. The data security book does not go into this problem at all.
MagnusTheRed90 30 Newbie Poster
rproffitt 2,693 https://5calls.org Moderator
tinstaafl 1,176 Posting Maven
Rythorian -3 Newbie Poster
JamesCherrill commented: Either this is mad or it’s malevolent -3
JamesCherrill 4,733 Most Valuable Poster Team Colleague Featured Poster
rproffitt commented: Yes, it seems like another form of ransomware. +16
JamesCherrill 4,733 Most Valuable Poster Team Colleague Featured Poster
rproffitt commented: I know folk dislike it but the perp may be lying. +0
adajames 0 Newbie Poster
Be a part of the DaniWeb community
We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.