Re: aes-cbc-256 mode descryption without an IV

2019-03-25 Thread Tim Webber
Good fine Marian. Thx for all your help. On Mon, Mar 25, 2019 at 9:24 AM Marian Beermann wrote: > As it just so happens here is a gist implementing EVP_BytesToKey in Python: > https://gist.github.com/tly1980/b6c2cc10bb35cb4446fb6ccf5ee5efbc > > -Marian > > Am 25.03.19 um 17:14 schrieb Tim Webbe

Re: aes-cbc-256 mode descryption without an IV

2019-03-25 Thread Marian Beermann
As it just so happens here is a gist implementing EVP_BytesToKey in Python: https://gist.github.com/tly1980/b6c2cc10bb35cb4446fb6ccf5ee5efbc -Marian Am 25.03.19 um 17:14 schrieb Tim Webber: > Thanks Marian.  i did read the man pages for enc .  not sure how that > gets you to the  EVP_BytesToKey a

Re: aes-cbc-256 mode descryption without an IV

2019-03-25 Thread Marian Beermann
Well let's just read the man pages, shall we? >-kfile filename > Read the password to derive the key from the first line of filename. Then >-md digest > Use the specified digest to create the key from the passphrase. > The default algorithm is sha-256. And > -iv IV > ...

aes-cbc-256 mode descryption without an IV

2019-03-24 Thread Tim Webber
I just posted a message which i have copied below to a python forum. It might be better asked here. The coles notes version of my question is this: I have received an encrypted data file (mydata.encrypted) and a key (plain text for now) and the following command to decrypt it: openssl enc -d -a