Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q1663550> ?p ?o }
Showing triples 1 to 48 of
48
with 100 triples per page.
- Q1663550 subject Q7483194.
- Q1663550 abstract "In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom. Randomization is crucial for encryption schemes to achieve semantic security, a property whereby repeated usage of the scheme under the same key does not allow an attacker to infer relationships between segments of the encrypted message. For block ciphers, the use of an IV is described by so-called modes of operation. Randomization is also required for other primitives, such as universal hash functions and message authentication codes based thereof.Some cryptographic primitives require the IV only to be non-repeating, and the required randomness is derived internally. In this case, the IV is commonly called a nonce (number used once), and the primitives are described as stateful as opposed to randomized. This is because the IV need not be explicitly forwarded to a recipient but may be derived from a common state updated at both sender and receiver side. (In practice, a short nonce is still transmitted along with the message to consider message loss.) An example of stateful encryption schemes is the counter mode of operation, which uses a sequence number as a nonce.The size of the IV is dependent on the cryptographic primitive used; for block ciphers, it is generally the cipher's block size. Ideally, for encryption schemes, the unpredictable part of the IV has the same size as the key to compensate time/memory/data tradeoff attacks. When the IV is chosen at random, the probability of collisions due to the birthday problem must be taken into account. Traditional stream ciphers such as RC4 do not support an explicit IV as input, and a custom solution for incorporating an IV into the cipher's key or internal state is needed. Some designs realized in practice are known to be insecure; the WEP protocol is a notable example, and is prone to related-IV attacks.".
- Q1663550 thumbnail Tux_ecb.jpg?width=300.
- Q1663550 wikiPageWikiLink Q1052621.
- Q1663550 wikiPageWikiLink Q1053357.
- Q1663550 wikiPageWikiLink Q1162538.
- Q1663550 wikiPageWikiLink Q131133.
- Q1663550 wikiPageWikiLink Q1363085.
- Q1663550 wikiPageWikiLink Q141090.
- Q1663550 wikiPageWikiLink Q1500258.
- Q1663550 wikiPageWikiLink Q1509884.
- Q1663550 wikiPageWikiLink Q15263584.
- Q1663550 wikiPageWikiLink Q154021.
- Q1663550 wikiPageWikiLink Q1589480.
- Q1663550 wikiPageWikiLink Q1749235.
- Q1663550 wikiPageWikiLink Q1766279.
- Q1663550 wikiPageWikiLink Q176640.
- Q1663550 wikiPageWikiLink Q176691.
- Q1663550 wikiPageWikiLink Q18394427.
- Q1663550 wikiPageWikiLink Q1886131.
- Q1663550 wikiPageWikiLink Q190746.
- Q1663550 wikiPageWikiLink Q193228.
- Q1663550 wikiPageWikiLink Q204570.
- Q1663550 wikiPageWikiLink Q206494.
- Q1663550 wikiPageWikiLink Q2115856.
- Q1663550 wikiPageWikiLink Q212108.
- Q1663550 wikiPageWikiLink Q2333581.
- Q1663550 wikiPageWikiLink Q246593.
- Q1663550 wikiPageWikiLink Q273673.
- Q1663550 wikiPageWikiLink Q2825412.
- Q1663550 wikiPageWikiLink Q2981730.
- Q1663550 wikiPageWikiLink Q339000.
- Q1663550 wikiPageWikiLink Q3495443.
- Q1663550 wikiPageWikiLink Q471771.
- Q1663550 wikiPageWikiLink Q5121263.
- Q1663550 wikiPageWikiLink Q515265.
- Q1663550 wikiPageWikiLink Q543151.
- Q1663550 wikiPageWikiLink Q7483194.
- Q1663550 wikiPageWikiLink Q8366.
- Q1663550 wikiPageWikiLink Q846912.
- Q1663550 wikiPageWikiLink Q846955.
- Q1663550 wikiPageWikiLink Q864718.
- Q1663550 wikiPageWikiLink Q8789.
- Q1663550 wikiPageWikiLink Q8803.
- Q1663550 wikiPageWikiLink Q917824.
- Q1663550 comment "In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom. Randomization is crucial for encryption schemes to achieve semantic security, a property whereby repeated usage of the scheme under the same key does not allow an attacker to infer relationships between segments of the encrypted message.".
- Q1663550 label "Initialization vector".
- Q1663550 depiction Tux_ecb.jpg.