Why IV Setup for Stream Ciphers is Difficult

Erik Zenner (Invited author)

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearch


    In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.
    Original languageEnglish
    Title of host publicationProc. Dagstuhl Seminar on Symmetric Cryptography
    EditorsEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen
    Place of PublicationSchloss Dagstuhl, Germany
    PublisherInternationales Begegnungs- und Forschungszentrum fuer Informatik
    Publication date2007
    Publication statusPublished - 2007
    EventDagstuhl Seminar on Symmetric Cryptography - Wadern, Germany
    Duration: 7 Jan 200712 Jan 2007


    ConferenceDagstuhl Seminar on Symmetric Cryptography
    SeriesDagstuhl Seminar Proceedings


    Dive into the research topics of 'Why IV Setup for Stream Ciphers is Difficult'. Together they form a unique fingerprint.

    Cite this