Initialization vector (2024)

In cryptography, an initialization vector (IV) is a block of bits that is required to allow a stream cipher or a block cipher to be executed in any of several modes of operation to produce a unique stream independent from other streams produced by the same encryption key, without having to go through a (usually lengthy) re-keying process.

The size of the IV depends on the encryption algorithm and on the cryptographic protocol in use and is normally as large as the block size of the cipher or as large as the encryption key. The IV must be known to the recipient of the encrypted information to be able to decrypt it. This can be ensured in a number of ways: by transmitting the IV along with the ciphertext, by agreeing on it beforehand during the key exchange or the handshake, by calculating it (usually incrementally), or by measuring such parameters as current time (used in hardware authentication tokens such as RSA SecurID, VASCO Digipass, etc.), IDs such as sender's and/or recipient's address or ID, file ID, the packet, sector or cluster number, etc. A number of variables can be combined or hashed together, depending on the protocol. If the IV is chosen at random, the cryptographer must take into consideration the probability of collisions, and if an incremental IV is used as a nonce, the algorithm's resistance to related-IV attacks must also be considered.

Contents

  • 1 Block Ciphers
  • 2 Stream Ciphers
  • 3 WEP IV
  • 4 See also
  • 5 References

Block Ciphers[]

IVs are implemented differently in block ciphers than in stream ciphers. In straight-forward operation of block ciphers or so-called Electronic Code Book (ECB) mode, encryption of the same plain text with the same key results in the same cipher text, which is a considerable threat to security. Use of an initialization vector linearly added to (XORed with) the first block of plain text or included in front of the plain text prior to encryption solves this problem.

Stream Ciphers[]

In stream ciphers, IVs are loaded into the keyed internal secret state of the cipher, after which a number of cipher rounds is executed prior to releasing the first bit of output. For performance reasons, designers of stream ciphers try to keep that number of rounds as small as possible, but because determining the minimal secure number of rounds for stream ciphers is not a trivial task, and considering other issues such as entropy loss, unique to each cipher construction, related-IVs and other IV-related attacks are a known security issue for stream ciphers, which makes IV loading in stream ciphers a serious concern and a subject of ongoing research.

WEP IV[]

The 802.11 encryption algorithm called WEP (short for Wired Equivalent Privacy) used a short, 24-bit IV, leading to reused IVs with the same key, which led to it being easily cracked.[1] Packet injection allowed for WEP to be cracked in times as short as several seconds. This ultimately led to the deprecation of WEP.

See also[]

References[]

  1. Template:Cite paper
  • B. Schneier, 'Applied Cryptography', Wiley 1996
  • N. Ferguson and B. Schneier, 'Practical Cryptography', Wiley 2003
Cryptography navbox
Block ciphers

de:Initialisierungsvektores:Vector de inicializaciónfr:Vecteur d'initialisationit:Vettore di inizializzazioneja:初期化ベクトルlt:Inicializacijos vektorius

Initialization vector (2024)
Top Articles
Leading and lagging indicators: what you need to know
How to Buy a Business with No Money Down
Artem The Gambler
Food King El Paso Ads
Uti Hvacr
Pangphip Application
Repentance (2 Corinthians 7:10) – West Palm Beach church of Christ
Alan Miller Jewelers Oregon Ohio
Mama's Kitchen Waynesboro Tennessee
Find All Subdomains
Miles City Montana Craigslist
Puretalkusa.com/Amac
Craigslist In Fredericksburg
10000 Divided By 5
Category: Star Wars: Galaxy of Heroes | EA Forums
Missing 2023 Showtimes Near Lucas Cinemas Albertville
Pwc Transparency Report
“In my day, you were butch or you were femme”
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
The Superhuman Guide to Twitter Advanced Search: 23 Hidden Ways to Use Advanced Search for Marketing and Sales
Directions To 401 East Chestnut Street Louisville Kentucky
Michigan cannot fire coach Sherrone Moore for cause for known NCAA violations in sign-stealing case
Axe Throwing Milford Nh
No Hard Feelings - Stream: Jetzt Film online anschauen
Xfinity Outage Map Fredericksburg Va
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
Netwerk van %naam%, analyse van %nb_relaties% relaties
Wku Lpn To Rn
Ullu Coupon Code
Federal Express Drop Off Center Near Me
Package Store Open Near Me Open Now
Laveen Modern Dentistry And Orthodontics Laveen Village Az
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Kaiserhrconnect
Gerber Federal Credit
24 slang words teens and Gen Zers are using in 2020, and what they really mean
2012 Street Glide Blue Book Value
Black Adam Showtimes Near Amc Deptford 8
Afspraak inzien
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
11301 Lakeline Blvd Parkline Plaza Ctr Ste 150
All Characters in Omega Strikers
Smite Builds Season 9
Anthem Bcbs Otc Catalog 2022
Oklahoma City Farm & Garden Craigslist
John Wick: Kapitel 4 (2023)
Gt500 Forums
Samsung 9C8
Lightfoot 247
Mawal Gameroom Download
All Obituaries | Roberts Funeral Home | Logan OH funeral home and cremation
Unity Webgl Extreme Race
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5828

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.