[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bouncycastle-crypto-dev
Subject:    Re: [dev-crypto] Blocker issue when upgrading BouncyCastle
From:       David Hook <dgh () cryptoworkshop ! com>
Date:       2017-06-13 0:16:40
Message-ID: a6e4fad9-6993-37bb-4f85-5ac6a9e5e74c () cryptoworkshop ! com
[Download RAW message or body]


Not sure. I'd really have to have a look at what was being done.

Regards,

David

On 08/06/17 05:36, Sivaji Adurthy wrote:
> Hi,
>
> Hitting a blocker when moving from 1.46 to 1.56 with symmetric key
> encryption/ decryption
> We are using BouncyCastle 1.46 for Symmetric Key encryption and
> decryption, store the encrypted keys in our database , decrypt them on
> demand and to use it .
>
> When we test for decryption using 1.56 jar  that are encrypted using
> 1.46 its failing only when the encrypted byte size is less than or
> equal to key size.
>
> We are using "AES/CTS/NoPadding" , "BC".
>
> Is there a way to get around this issue. Any Pointers etc...
>
> thanks in advance
>
>


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic