473,396 Members | 2,024 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Help on Symmetric Cryptography algorithm

Hi ,
I need some helpon Symmetric Crptography algorithm. My friend has given a
encrypted message ( encrypted using Symmetric cryptogrraphy algorithm and he
does 't mention on which plat form is used ) . I have to decrypt the the
encrypted message. I tried to decryppt using Symmetric class provided in
..NET library. But it is aksing saltkey,IV information to decrypt. Can't we
do decrpt with out using saltkey,IV....? I want to decrypt the encrypted
message with differenct possible keys.. How can I do this..?
Nov 17 '05 #1
1 1636
kiran <ki********@synergy-infotech.com> wrote:
I need some helpon Symmetric Crptography algorithm. My friend has given a
encrypted message ( encrypted using Symmetric cryptogrraphy algorithm and he
does 't mention on which plat form is used ) . I have to decrypt the the
encrypted message. I tried to decryppt using Symmetric class provided in
.NET library. But it is aksing saltkey,IV information to decrypt. Can't we
do decrpt with out using saltkey,IV....? I want to decrypt the encrypted
message with differenct possible keys.. How can I do this..?


You can only decrypt the message using the same salt, key and IV that
your friend used when encrypting it. If you could decrypt it with any
old key, it wouldn't be much of an encryption algorithm, would it?

--
Jon Skeet - <sk***@pobox.com>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Nov 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
by: Alejandro Castañaza | last post by:
Hi. I'm writing a program, and I need to send confidential data through the network, so I decided to use encryption, using the System.Security.Cryptography namespace. I'm using the sockets...
10
by: Nemok | last post by:
Hi, I am trying to write an additive encryption algorithm in C++ that will encrypt a text by adding a random numer to each character in a string. The code looks similar to this: for(int...
8
by: MuZZy | last post by:
Hi, Why for god sake they change implementation of String.GetHashCode() from ..NET 1 to .NET 2? We were storing some user passwords in hashcode, now we can't upgrade those clients with .NET 2...
7
by: Mark Rae | last post by:
Hi, Picking your collective brains again, this time regarding the storage of the key used in symmetric encryption. Let's say you have a requirement to add encryption to a C# project, so you...
8
by: db2admin | last post by:
Hello all, This is probably not related to db2 but due to fabulous responses i got earlier for my questions, i am convinced that this forum is full of smart people. Here is question: I...
8
by: =?Utf-8?B?RGFuTQ==?= | last post by:
Can someone help with the following problem. I am sending an encrypted SOAP message to a .NET 2.0 + WSE 3.0 web service. When .NET attempts to decrypt the message it cannot read the private key...
0
by: johnlim20088 | last post by:
Hi, Currently I m doing a encryption with Microsoft Enterprise Enterlibrary Configuration. I does generated the encrypt and decrypt single string. I follow all the step, in creating...
4
by: abhishek | last post by:
Hi group, recently my employer asked me too implement encryption/ decryption for secure data transfer over internet. Problem is that the client application is written using C# and the webserver...
3
by: TD | last post by:
I found a freeware dll, md5lib.dll, on the web and am trying to use it in Acess 2003. I entered this in a module in the database: Public Declare Function StringMD5 Lib...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.