Sponsored Content
Operating Systems AIX Problem with the Characters!!! Post 302217651 by bakunin on Wednesday 23rd of July 2008 08:59:31 AM
Old 07-23-2008
Probably different character maps? Did you write the encryption algorithm yourself or do you rely on some sort of library? If the latter is the case maybe the algorithms are different or just use a different "seed" to come to different results.

A good encryption algorithm gives to different results even with the same input - this way you have no way to get the input from the result without knowing the algorithm and knowing the secret information. An algorithm which gives, for instance, a "B" for every "A" is more likely to be compromised than one which gives a "B" first and a "C" for the next pass and an "X" for the next aso..

I hope this helps.

bakunin
 

10 More Discussions You Might Find Interesting

1. AIX

problem with Unicode characters insertion

hi, I have a problem with unicode chars ( chinese, japanese etc ) insertion using sqlplus prompt. When i wrote a proc program for it i am able to create records. But when i fore the same query on sql prompt it stores reverse ????? ..some junk. widechar columns are mapped with NVARCHAR datatype.... (0 Replies)
Discussion started by: suman_jakkula
0 Replies

2. HP-UX

utf-8, problem with special characters

Hi all, We are facing the following problem in our HP-UX machine: software that manipulates utf-8 encoded strings (e.g. during string cut), fails to correctly manipulate strings (all containing Greek characters) that contain special characters like @, &, # etc. Actually, in different... (3 Replies)
Discussion started by: alina
3 Replies

3. Shell Programming and Scripting

special characters giving problem

Hi All, I have a CSV file in which some fields contains special character for ex:- my file is file 1 cat file1 abcd,bgfht,ngbht,abvc **** hdlld,hsgdt,bhfy,knht **** whenever i am trying to put a 4th feild in a variable its giving me list of all the files i have in current... (6 Replies)
Discussion started by: sam25
6 Replies

4. Shell Programming and Scripting

Problem with reading characters

Hello, if I try this (in bash): #!/bin/bash cat leercaracter.sh | while read linea do # read character by character echo $linea | while read -n 1 caracter do echo $caracter done done New lines, spaces, tabs aren't showed by echo. How can I 'echo' those characters?... (7 Replies)
Discussion started by: albertogarcia
7 Replies

5. Shell Programming and Scripting

Problem with Sed when repeating characters

Hi all, I'm learning sed (and regular expressions) - My first little program is to replace 3 numbers in a row with 'XXX' This is what I am trying: echo '511' | sed 's/{3}/XXX/' Here is the output: defunct-macbook-pro:~ defunct$ echo '511' | sed 's/{3}/XXX/' 511For some reason, it doesnt... (2 Replies)
Discussion started by: Defunct
2 Replies

6. Solaris

Chinese / Global characters problem

Hello, I have large xml files with chinese characters on a windows box and they need to be FTP'd to UNIX box. When I ftp the file, the chinese text converts to junk characters. I tried changing my setting on putty to UTF-8, but still cannot view the correct text. Is there something I need to... (4 Replies)
Discussion started by: tokool420
4 Replies

7. Shell Programming and Scripting

Problem with Output of escape characters

I'm trying to figure out a problem. I echo a colored block character with this code: echo -e '\E It works. But the challenge is echoing two different blocks with two different colors. I tried everything. Heres what i tried: echo -e '\E Doesn't work. It only echoes the first block.... (2 Replies)
Discussion started by: tinman47
2 Replies

8. Shell Programming and Scripting

Problem with Special characters in file

Hi, I am facing a below problem. Inorder to mak sure the below file is fixed width i am using the following command awk '{printf("%-375s\n", $0) } so as to add trailing spaces at the end for records of length less than 375. Input file > inp.txt 1©1234 1234 123©1 The output file is... (1 Reply)
Discussion started by: marcus_kosaman
1 Replies

9. Shell Programming and Scripting

Problem with special characters....

grep -i "$line,$opline" COMBO_JUNK|awk -F, ' { C4+=$4 } { } END { print C4 } ' OFS=,` when i run this command in the script.... it o/p all the value as 0 if $line contains any special parameters..... but the same script if i run in command prompt... it shows... (4 Replies)
Discussion started by: nikhil jain
4 Replies

10. Shell Programming and Scripting

Control characters -weird problem

I am using Korn shell on Linux 2.6x platform , and I am suing the following code to capture the lines which contain CONTROL CHARACTERS in my file : awk '/]/ {print NR}' EROLLMENT_INPUT.txt The problem is that this code shows the file has control characters when the file is in folder A ,... (2 Replies)
Discussion started by: kumarjt
2 Replies
des_crypt(3)						     Library Functions Manual						      des_crypt(3)

NAME
des_crypt, des_string_to_key, des_is_weak_key, des_key_sched, des_quad_cksum - Data Encryption Standard (DES) encryption library routines (Auth) SYNOPSIS
#include <des.h> int des_string_to_key( char *str, C_Block *key); int des_is_weak_key ( C_Block key); unsigned long des_quad_cksum( unsigned char *input, unsigned long *output, long length, int iterations, C_Block *seed); int des_key_sched( C_Block key, Key_schedule schedule); PARAMETERS
key For key is a pointer to a of 8-byte length. For and key is a pointer to a DES key. str A string that is converted to an 8-byte DES key. input Pointer to a block of data to which a quadratic checksum algorithm is applied. output Pointer to a pre-allocated buffer that will contain the complete output from the quadratic checksum algorithm. For each iteration of the quadratic checksum applied to the input, eight bytes (two longwords) of data are generated. length Length of the data to which the quadratic checksum algorithm will be applied. If input contains more than length bytes of data, then the quadratic checksum will only be applied to length bytes of input. iterations The number of iterations of the algorithm to apply to input. If output is NULL, then one iteration of the algorithm will be applied to input, no matter what the value of iterations is. The maximum number of iterations is four. seed An 8-byte quantity used as a seed to the input of the algorithm. schedule A representation of a DES key in a form more easily used with encryption algorithms. It is used as input to the routines. DESCRIPTION
The routines are designed to provide the cryptographic routines which are used to support authentication. Specifically, and are designed to be used with the DES key which is shared between one Kerberos principal and its authenticated peer to provide an easy authentication method after the initial Kerberos authentication pass. and are designed to enable the input and inspection of a key by a user before that key is used with the Kerberos authentication routines. The routines are not designed for general encryption. The library makes extensive use of the locally defined data types and The struct is an 8-byte block used by the various routines of the library as the fundamental unit for DES data and keys. ROUTINES string_to_key Converts a null-terminated string of arbitrary length to an 8-byte, odd-byte-parity DES key. The str argument is a pointer to the character string to be converted and key points to a C_Block supplied by the caller to receive the generated key. The one-way func- tion used to convert the string to a key makes it very difficult for anyone to reconstruct the string from the key. No meaningful value is returned. des_is_weak_key checks a new key input by a user to determine if it belongs to the well known set of DES keys which do not provide good crypto- graphic behavior. If a key passes the inspection of then it can be used with the routine. The input is a DES key and the output is equal to 1 if the key is not a safe key to use; it is equal to 0 if it is safe to use. des_quad_cksum Produces a checksum by chaining quadratic operations on cleartext data. can be used to produce a normal quadratic checksum and, if used with the DES key shared between two authenticated Kerberos principals, it can also provide for the integrity and authentication protection of data sent from one principal to another. Input of length bytes are run through the routine iterations times to produce output. If output is NULL, one iteration is performed and output is not affected. If output is not NULL, the quadratic checksum algorithm will be performed iterations times on input, placing eight bytes (two longwords) of result in output for each iteration. At all times, the low-order bits of the last quadratic checksum algorithm pass are returned by The quadratic checksum algorithm performs a checksum on a few bytes of data and feeds the result into the algorithm as an addition input to the checksum on the next few bytes. The seed serves as the additional input for the first checksum operation and, there- fore, the final checksum that results depends upon the seed input into the algorithm. If the DES key shared between two Kerberos principals is used as the initial seed, then since the checksum that results depends upon the seed, the ability to produce the checksum proves identity and authentication. Also, since the message cannot be altered without knowledge of the seed, it also pro- vides for data integrity. des_key_sched is used to convert the key input into a new format that can be used readily with encryption functions. The result, schedule, can be used with the functions to enable mutual authentication of two Kerberos principals. A 0 is returned from if successful. A -1 is returned if the each byte of the key does not have odd parity. A -2 is returned if the key is a weak key as defined by delim off des_crypt(3)
All times are GMT -4. The time now is 09:54 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy