In CBC mode the IV is XORed with the plaintext before encryption.
In CBC mode, the IV is XORed with the plaintext before encryption. Therefore, extracting the IV for the first block (your outputs are both 128 bits) with an empty plaintext is equivalent to decrypting that block with your key. However, your "128 bit key" appears to be 8 bits short, so I was unable to calculate the IV.
I used the following arguments to OpenSSL: echo 'MEUxILm04F/S2qSIlJKdPQ==' | \ openssl enc -d -base64 | \ openssl enc -d -aes-128-ecb -K 'B98AD080D3E30B3F91FFF50107B1E7.
I updated the key above (was missing 7 as the first byte). After studying this, I came to the same conclusion as you so thank you. I used ECB mode to decrypt the cipher text with the key and then xor'd this with a 16 byte array padded with 16 (PKCS7 padding) to get the IV.
– klz Mar 26 at 18:03 The 16 byte array was padded with sixteen 16's to represent the empty string. – klz Mar 26 at 18:10.
I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.