AES Encryption: What's the difference between the IV and Key? Why do we need an IV?

  Рет қаралды 25,308

Matthew Ventures

Matthew Ventures

2 жыл бұрын

Пікірлер: 56
@benarroyo
@benarroyo 2 жыл бұрын
Thanks! This helped a lot. I had an idea of what IV was, but I needed an example to solidify my learning.
@azoz1433alamodi
@azoz1433alamodi Жыл бұрын
that was amazing ! thank you for the great service
@iftak01
@iftak01 2 жыл бұрын
Great video Bud explained it well
@rajib7278
@rajib7278 4 ай бұрын
Thanks. Your explanation really helped. Great job 👍🏽
@breachbase
@breachbase Жыл бұрын
This was super useful, thanks
@digitaldistancerecords736
@digitaldistancerecords736 3 ай бұрын
Thanks man, I was going over WPA for my CCNA and I had no idea what the hell an Initialization vector was, and they did not care to explain it.
@jozefsoucik3115
@jozefsoucik3115 9 ай бұрын
critical mind explanation...thanx a lot
@amolsutar9247
@amolsutar9247 9 ай бұрын
Thank you. This helped a lot.
@imaxu8914
@imaxu8914 Жыл бұрын
Amazing!! Thanks!!
@boazmatzliah1528
@boazmatzliah1528 Жыл бұрын
Great explain
@frankdell
@frankdell 16 күн бұрын
Amazing video, thanks a lot
@ChungLeeVN
@ChungLeeVN 2 жыл бұрын
Good Man, it easy understand
@mamun001
@mamun001 Жыл бұрын
Thanks!
@schen2024
@schen2024 2 жыл бұрын
thats a pretty interesting menu bar
@sammunta1543
@sammunta1543 Жыл бұрын
thanks a lot but what are similarities between DES and AES plz
@emmanuelobileye5643
@emmanuelobileye5643 Жыл бұрын
Thanks
@VladP117
@VladP117 2 жыл бұрын
Thank you! The only question I have - how receiving part will know IV? Do we send IV with message itself every time? Is IV visible for "everyone" or encrypted as well. :)? What is best practice? Thanks a lot.
@matthewventures
@matthewventures 2 жыл бұрын
Yes you have to send it with the message itself. And it is not encrypted. You can put it at the Fron of the message. You can just put it at the front. Even if they know what bytes are the iv they won't be able to determine the secret key
@thedarkknight1865
@thedarkknight1865 Жыл бұрын
nice example
@Victor_Gerfalov
@Victor_Gerfalov 7 ай бұрын
Awesome
@pontv9005
@pontv9005 Жыл бұрын
supposed that i capture the encrypted message 500 with IV of 3 then resend it back to the server then I would still win the game. I just have to capture the encrypted message every time I win, it does not matter if the message is different every time I win, i just resend that encrypted message and still win. Is the IV sent along with the encrypted message? Is the IV one time use only?
@matthewventures
@matthewventures Жыл бұрын
yes iv is one time use only. a new one is created for each message and sent with the message.
@cimbot
@cimbot 2 жыл бұрын
Thanks for the video! In this example, it means that the IV will also always be sent between client-server right? Besides the encrypted message
@cimbot
@cimbot 2 жыл бұрын
But the hacker won't know that the transmitted IV is important to decrypt the data, because they doesn't know that it's an IV Am I correct?
@matthewventures
@matthewventures 2 жыл бұрын
@@cimbot yes that's correct, and how you send the iv is secret. So it could be appended to the back, or it could be put at the front, or he could do something crazy like every other character is the iv
@cimbot
@cimbot 2 жыл бұрын
@@matthewventures I see, thank you very much Matthew!
@youtubecopyrights
@youtubecopyrights 2 жыл бұрын
How does the receiving end of the encrypted data know what IV was used to decrypt?
@matthewventures
@matthewventures 2 жыл бұрын
You send the iv with the message. It is a known size, so how you send it is up to you. You could send it as the first x amount of characters in your message. Or the last x characters. Or maybe every other character for the first 2x characters is part of the iv.
@samartajshaikh2601
@samartajshaikh2601 Жыл бұрын
@@matthewventures ok, so we do not send IV separately, we mix it up in final encrypted message. And server-end knows how to extract IV from encrypted message also, it must also have information about the key and the algorithm to decrypt the message using both IV and key.
@Ainigma
@Ainigma Жыл бұрын
but you still need to send the IV with the encrypted message (because no one else would be able to decrypt it), right?
@matthewventures
@matthewventures Жыл бұрын
Yes you send the iv, that's right.
@chaitanyakunda8583
@chaitanyakunda8583 Ай бұрын
then how does the server decrypting know this IV to be able to decrypt?
@matthewventures
@matthewventures Ай бұрын
You don't encrypt the IV. You just deliver it. You're like, "here is the encrypted message: 4747477438 and here is the IV: 54".
@scaryaddress
@scaryaddress Жыл бұрын
what does IV stand for ?? please PS: great video
@matthewventures
@matthewventures Жыл бұрын
Initialization vector
@samartajshaikh2601
@samartajshaikh2601 Жыл бұрын
Thanks. It is very informative. I have a few doubts though - 1. if we are generating IV on client-end then how will the server decrypt the message correctly ? 2. if we be generating a new IV each time we have to send a new message. Then how will we keep track of those IVs on both client-side and server-side ?
@matthewventures
@matthewventures Жыл бұрын
The iv is like a public key basically. So we simply tell the server what that key is, each message will have its own IV. You send the IV with the message, it's part of the same payload
@jemmalitaha4658
@jemmalitaha4658 Жыл бұрын
But he must also send the iv so that the server can decrypt, right?
@matthewventures
@matthewventures Жыл бұрын
Yes you have to send the iv. From my understanding the standard practice is that you don't even encrypt the iv. So I think it is sufficient to just send it in the front of your payload. But it's basically like a public password if you want to think of it that way, as if you have a public password and a private password
@samartajshaikh2601
@samartajshaikh2601 Жыл бұрын
@@matthewventures so if IV is the 'public password' and encrypted message is the 'private password' then, is the algorithm used to achieve the encryption the hidden link which hackers need to decode ? and what about key. Does server know the key in this case ?
@fisyr
@fisyr Жыл бұрын
​@@samartajshaikh2601The algorithm is known to everyone. What's secret is the key that the both parties share and don't send to each other. They only send the iv. Also hi, I'm currently trying to write an encrypted chat program from scratch for fun and I randomly stumbled on this video while learning about these things.
@HossamTK
@HossamTK 2 жыл бұрын
Hello bro
@brianseagers2620
@brianseagers2620 2 жыл бұрын
NO WAY! It's Kevin McCallister from Home Alone! From protecting homes to protecting Networks. Love to see it 😁😁
@RineezAhmed
@RineezAhmed Жыл бұрын
Definitely looks like the Home alone boy Macaulay Culkin 😁
@freedomforever2026
@freedomforever2026 9 ай бұрын
блядь, а как расшифровывать-то????
@okmm2807
@okmm2807 9 ай бұрын
You should all be asking why now: Why not only rely on a random seed? IV+Key is just one password. You can remove key and only use a random IV and will end up with the same result. Key would just be there if you don't want to generate larger random numbers at the expense of security.
@demonetiz3d
@demonetiz3d 7 ай бұрын
How would you decrypt data then?
@okmm2807
@okmm2807 7 ай бұрын
It you need a certain amount of information e.g. 512 bits and you want to use 256 bits as a static key e.g. 32 letters you can use one half of the 512 bits as the static key which means the second half must be random. You see? Having two parts makes no sense, its stupid. Just forget about the static key and use 512 random bits which you can use to feed two algorithms. Having a static key which you reuse is just one more point of failure if you use not enough random bits of cause. Also handling the information of the static part is another unnessary problem.
@user-lf3po1nz6b
@user-lf3po1nz6b 2 ай бұрын
Why not use random key then? Basically you just used pair (IV, Key) as new Key, and it is as random as IV, so what is the point of keeping one part fixed, when you always use it in bundle with random part?
@matthewventures
@matthewventures 2 ай бұрын
The receiver needs to know the key in order to decrypt the message. If you used a random key then it would just be another IV. The key is randomized, it's just not randomized every message. The whole point is that the key is something special that the receiver needs and that we can hopefully give to them in a way that someone who is reading all of the messages in between us will not have access to. For example, we might bundle the key in the source code of the program rather than having to send a key over the network. So that even if they can see all of the internet packets, we are passing back and forth which will include the IV and the message itself. It will not include the key. They would have to hack the client to to get the key.
@user-lf3po1nz6b
@user-lf3po1nz6b 2 ай бұрын
@@matthewventures Okay, I see, thanks
@user-jo4ko7si6s
@user-jo4ko7si6s 2 ай бұрын
i thought iv was four lol
@d_cb
@d_cb Жыл бұрын
Bro do you actually use that much softwares ??? Clean that task bar it makes me stressful
@vuralmecbur9958
@vuralmecbur9958 9 ай бұрын
If IV is public then the player can guess the key again: 1. IV=4, Message=600 2. IV=3, Message=500 It is very clear that each increment in IV results in 100 increment in message.
@matthewventures
@matthewventures 9 ай бұрын
That's only because my algorithm is simple. You'd have to decrypt the dull aes process which they cannot do.
@vuralmecbur9958
@vuralmecbur9958 9 ай бұрын
Thanks@@matthewventures
How does AES encryption work? Advanced Encryption Standard
12:50
Programming w/ Professor Sluiter
Рет қаралды 109 М.
Smart Sigma Kid #funny #sigma #comedy
00:40
CRAZY GREAPA
Рет қаралды 9 МЛН
No empty
00:35
Mamasoboliha
Рет қаралды 8 МЛН
A little girl was shy at her first ballet lesson #shorts
00:35
Fabiosa Animated
Рет қаралды 14 МЛН
How secure is 256 bit security?
5:06
3Blue1Brown
Рет қаралды 3,2 МЛН
128 Bit or 256 Bit Encryption? - Computerphile
8:45
Computerphile
Рет қаралды 331 М.
AES Explained (Advanced Encryption Standard) - Computerphile
14:14
Computerphile
Рет қаралды 1,2 МЛН
AES CBC bit flipping attack
9:30
MemoryCorruption
Рет қаралды 855
Smart Sigma Kid #funny #sigma #comedy
00:40
CRAZY GREAPA
Рет қаралды 9 МЛН