C036 ICC Practical 8
C036 ICC Practical 8
C036 ICC Practical 8
Aditya Agrawal
C036
70472018044
AIM: - Case study and implementation of any one
Symmetric Cryptographic Algorithm
DES
Key Exhaustion
Attribution data
Conclusion
Now, the secret key is generated and if we wish to actually see the
generated key which is an object we can convert it into hexbinary format
using DatatypeConverter.
Output :
Encryption and Decryption using the symmetric key: The following steps
can be followed in order to perform the encryption and decryption.
doFinal(byte[] input)