I have a question about encryption. So I have a code sample that has a key size being chosen, something like 32 bits or something, and I am basically either filling the key size buffer with the password and then zeroes, or null bytes, or a word repeated over and over (Supercalafragalisticexpialidocios). Is there something I am missing about key and IV selection or is this the right way to go? I thought I saw something that automatically chooses the remaining bytes but I don't remember the name of the object. The data security book does not go into this problem at all.
MagnusTheRed90
30
Newbie Poster
Recommended Answers
Jump to PostWhat possible reason would any sane person have to encrypt huge swathes of thir hard disk with no way to decrypt them.
Or is this intended as a weapon to cause massive harm to someone else's machine?
Jump to Postrproffitt commented: Yes, it seems like another form of ransomware
Worse than that - it woild be dishonest ransomeware because the perpetrator has admitted to not having the means to decrpt the files.
All 6 Replies
rproffitt
2,565
"Nothing to see here."
Moderator
tinstaafl
1,176
Posting Maven
Rythorian
-3
Newbie Poster
JamesCherrill
commented:
Either this is mad or it’s malevolent
-3
JamesCherrill
4,733
Most Valuable Poster
Team Colleague
Featured Poster
rproffitt
commented:
Yes, it seems like another form of ransomware.
+16
JamesCherrill
4,733
Most Valuable Poster
Team Colleague
Featured Poster
rproffitt
commented:
I know folk dislike it but the perp may be lying.
+0
adajames
0
Newbie Poster
Be a part of the DaniWeb community
We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.