Hello, this is not necessarily CryptoPP question, so sorry for that.

I have a message, that was encrypted with AES key (this key is not known to 
me) using ECB-mode (so no initialization vector needed). The program that 
encrypted this message used CryptoPP however. I know that the AES key is 
128-bit of size, of which only first 16-bits are "occupied", last 112-bits 
are all 0 (zeroes). Any suggestions, how to approach this problem?

If this will help, this is how the key was generated. I don't know the seed 
used for std::rand, so I can't reconstruct it with that.

byte key[ 16 ];
int i;
memset( key, 0x00, 16);
        
for(i=0;i<=sizeof(*key);i++){
    key[i]=(byte)(std::rand() % 256);
}


The "byte" is typedef of unsigned char.
Notice the pointer in sizeof(), this will return 1, so I then know that 
only key[0] and key[1] are occupied (don't mentioning the zeroes on 
positions 2 to 15 of course).

Thank you in advance. :)

-- 
You received this message because you are subscribed to "Crypto++ Users". More 
information about Crypto++ and this group is available at 
http://www.cryptopp.com and 
http://groups.google.com/forum/#!forum/cryptopp-users.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to