Why IV Setup for Stream Ciphers is Difficult

Erik Zenner (Invited author)

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearch

    Abstract

    In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.
    Original languageEnglish
    Title of host publicationProc. Dagstuhl Seminar on Symmetric Cryptography
    EditorsEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen
    Place of PublicationSchloss Dagstuhl, Germany
    PublisherInternationales Begegnungs- und Forschungszentrum fuer Informatik
    Publication date2007
    Publication statusPublished - 2007
    EventDagstuhl Seminar on Symmetric Cryptography - Wadern, Germany
    Duration: 7 Jan 200712 Jan 2007

    Conference

    ConferenceDagstuhl Seminar on Symmetric Cryptography
    Country/TerritoryGermany
    CityWadern
    Period07/01/200712/01/2007
    SeriesDagstuhl Seminar Proceedings
    Number07021

    Fingerprint

    Dive into the research topics of 'Why IV Setup for Stream Ciphers is Difficult'. Together they form a unique fingerprint.

    Cite this