cbc

SSL connection failing for Java 7

匿名 (未验证) 提交于 2019-12-03 02:06:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I am attempting to create an SSL connection to a remote server using Java 7 and I'm receiving the following exception: javax . net . ssl . SSLHandshakeException : Remote host closed connection during handshake at sun . security . ssl . SSLSocketImpl . readRecord ( SSLSocketImpl . java : 946 ) at sun . security . ssl . SSLSocketImpl . performInitialHandshake ( SSLSocketImpl . java : 1312 ) at sun . security . ssl . SSLSocketImpl . writeRecord ( SSLSocketImpl . java : 702 ) at sun . security . ssl . AppOutputStream . write (

AES 128 encryption in Java Decryption in PHP

匿名 (未验证) 提交于 2019-12-03 02:05:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I have been trying to decrypt a string using AES-128 CBC which was originally crypted using JAVA AES encryption. In java PKCS7 padding is used. And I have tried to encrypt and decrypt using similar PHP code. But I am getting different result. My Java code import java . security . MessageDigest ; import java . security . spec . AlgorithmParameterSpec ; import javax . crypto . Cipher ; import javax . crypto . spec . IvParameterSpec ; import javax . crypto . spec . SecretKeySpec ; import android . util . Base64 ; /** * @author vipin

How to disable the SSLv3 protocol in Jetty to prevent Poodle Attack

匿名 (未验证) 提交于 2019-12-03 01:57:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: Is there any specific exclusion list available which disables only SSLv3 ciphers are not TLSv1/2. I have jetty 8, and upgrading to 9 is not an option now. My current jetty-ssl.xml looks as follows ......... SSL_RSA_WITH_NULL_MD5 SSL_RSA_WITH_NULL_SHA SSL_RSA_EXPORT_WITH_RC4_40_MD5 SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_RC4_128_SHA SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 SSL_RSA_WITH_IDEA_CBC_SHA SSL_RSA_EXPORT_WITH_DES40_CBC_SHA SSL_RSA_WITH_DES_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA SSL_DH_DSS_WITH

OpenSSL AES 256 CBC via EVP api in C

匿名 (未验证) 提交于 2019-12-03 01:54:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: What I am trying to do: Write a program in C that opens a file of arbitrary size and reads its contents. Once The contents are read it will encrypt them in AES 256 CBC and save the ciphertext to a file called ciphertext. Once this is saved it will close both files. Then will open the cipher text from the file that was just saved and decrypt the cipher text and save it to a file called decrypted. My Problem: It seems to never decrypt my cipher text. I get garbage, I have no idea what I am doing wrong. Please help. #include #include #include

AES 256 CBC encryption in Laravel and Decryption in android

匿名 (未验证) 提交于 2019-12-03 01:40:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: So my problem is this: i have a password that i'm encrypting in Laravel 5.6 with AES-256-CBC and send it to an android device, problem is i can't find a way to decrypt it knowing that i found a way to extract the IV and the encrypted value and the key is available on the android device ! I'm successfully decrypting the value if i use AES-128-CBC using this code on the android device, but failing the AES-256-CBC cypher and i don't understand where the problem is ! The code : public static String decrypt(byte[] keyValue, String ivValue, String

php mcrypt CBC mode encryption/decryption problem

匿名 (未验证) 提交于 2019-12-03 01:38:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I have a problem with CBC mode when I try to encrypt/decrypt some text using php's mcrypt extension. I've created a class to perform this operations, it works fine with other modes but CBC. The problem is as follow: I use the clear text Even in cryptography, silence is golden . I do the encryption part, no problem till this point. But each time I try to decrypt, I get something like this: . As you can see, the first 8 characters of the text are wrong. I don't know what may be causing this behavior. The parts of my class which

How to config local Jetty ssl to avoid weak phermeral DH key error?

匿名 (未验证) 提交于 2019-12-03 01:34:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I'm using keytool to generate a keystore to config a local development jetty to run ssl keytool . exe - keystore jetty . keystore - alias jetty - genkey - keyalg RSA - sigalg SHA256withRSA Jetty config: <Call name = "addConnector" > <Arg> <New class = "org.eclipse.jetty.server.ssl.SslSelectChannelConnector" > <Arg> <New class = "org.eclipse.jetty.http.ssl.SslContextFactory" > <Set name = "keyStore" > jetty/jetty.keystore </Set> <Set name = "keyStorePassword" > jetty6 </Set> <Set name = "keyManagerPassword" > jetty6 </Set> <Set name

perl CBC DES equivalent in java

匿名 (未验证) 提交于 2019-12-03 01:33:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: We are migrating some code from perl to java/scala and we hit a roadblock. We're trying to figure out how to do this in Java/scala: I tried a few things in scala but didn't really get it right, for example something like this: val secretKey = new SecretKeySpec("some key".getBytes("UTF-8"), "DES") val encipher = Cipher.getInstance("DES/CBC/PKCS5Padding"); encipher.init(Cipher.ENCRYPT_MODE, secretKey) val encrypted = encipher.doFinal(bytes) println("BYTES:" + bytes) println("ENCRYPTED!!!!!!: " + encrypted) println(toString(encrypted)) Any help

256bit AES/CBC/PKCS5Padding with Bouncy Castle

匿名 (未验证) 提交于 2019-12-03 01:29:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I am having trouble mapping the following JDK JCE encryption code to Bouncy Castles Light-weight API: public String dec(String password, String salt, String encString) throws Throwable { // AES algorithm with CBC cipher and PKCS5 padding Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding", "BC"); // Construct AES key from salt and 50 iterations PBEKeySpec pbeEKeySpec = new PBEKeySpec(password.toCharArray(), toByte(salt), 50, 256); SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("PBEWithSHA256And256BitAES-CBC-BC");

POODLE vulnerability, JBoss and IE

匿名 (未验证) 提交于 2019-12-03 01:23:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: So, I have JBoss 5.1.0 GA, and I read about how I need to disable SSLv3 here: https://access.redhat.com/solutions/1232233 What was not mentioned here was that I also need to get rid of all ciphers that support falling back to SSLv3. When I did that, I got a "green checkmark" on this website https://www.tinfoilsecurity.com/poodle which is basically a confirmation that I've secured my server and SSLv3 is not supported anymore, but now I cannot access my website using IE (all versions of IE). Since I only had 4 ciphers in my cipher