Hello Again,
Sorry, I should have explained myself better. I am using AES-256 in
CBC mode. I am getting a string as a password, and using
PKCS5_PBKDF2_HMAC_SHA1 function to generate 256 bit key and 128 bit
IV. I was wondering if generating and IV like this is necessary, or
can I just use a
Classic requirement is that IV is unique per key.
As theoretical crypto evolved, and attacks like Chosen Ciphertext Attack (you
can make the victim to encrypt any plaintext of your choice (aka CPA), *and*
*decrypt* any ciphertext of your choice) were developed, CBC could not hold
against such
> For AES-256 encryption, should IV be random? I am already using a random
> salt, so I was wondering if IV should be random too.
It should be non-repeating. It can just be a counter.
(Yes, I know OP didn't ask about AESGCM. But if they're coming here for advice
... )
--
openssl-users
On 27/04/2017 14:00, Yaşar Arabacı wrote:
Hi,
For AES-256 encryption, should IV be random? I am already using a
random salt, so I was wondering if IV should be random too.
Thanks in advance
AES itself takes neither an IV nor a salt.
AES in CBC mode takes a 128 bit IV for the CBC mode, it is
On Thu, 27 Apr 2017 15:00:37 +0300
Yaşar Arabacı wrote:
> For AES-256 encryption, should IV be random? I am already using a
> random salt, so I was wondering if IV should be random too.
An IV is part of a cipher mode. AES-256 is just a block cipher. You
can't use it on its
Hi,
For AES-256 encryption, should IV be random? I am already using a
random salt, so I was wondering if IV should be random too.
Thanks in advance
--
http://ysar.net/
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users