Hello, this is not necessarily CryptoPP question, so sorry for that.
I have a message, that was encrypted with AES key (this key is not known to
me) using ECB-mode (so no initialization vector needed). The program that
encrypted this message used CryptoPP however. I know that the AES key is
128-bit of size, of which only first 16-bits are "occupied", last 112-bits
are all 0 (zeroes). Any suggestions, how to approach this problem?
If this will help, this is how the key was generated. I don't know the seed
used for std::rand, so I can't reconstruct it with that.
byte key[ 16 ];
int i;
memset( key, 0x00, 16);
for(i=0;i<=sizeof(*key);i++){
key[i]=(byte)(std::rand() % 256);
}
The "byte" is typedef of unsigned char.
Notice the pointer in sizeof(), this will return 1, so I then know that
only key[0] and key[1] are occupied (don't mentioning the zeroes on
positions 2 to 15 of course).
Thank you in advance. :)
--
You received this message because you are subscribed to "Crypto++ Users". More
information about Crypto++ and this group is available at
http://www.cryptopp.com and
http://groups.google.com/forum/#!forum/cryptopp-users.
---
You received this message because you are subscribed to the Google Groups
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.