You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Where $W$ is the size of a block in bits (e.g. 64 for Blowfish). As long as the initial vector is random for each message
812
+
Where $W$ is the size of a block in bits (e.g. 64 for Blowfish). As long as the initialization vector is random for each message
813
813
encrypted under the same key replay and swap attacks are infeasible. CTR mode may look simple but it is as secure
814
-
as the block cipher is under a chosen plaintext attack (provided the initial vector is unique).
814
+
as the block cipher is under a chosen plaintext attack (provided the initialization vector is unique).
815
815
816
816
\subsubsection{CFB Mode}
817
817
\index{CFB mode}
@@ -822,7 +822,7 @@ \subsubsection{CFB Mode}
822
822
\end{eqnarray}
823
823
Note that in this library the output feedback width is equal to the size of the block cipher. That is this mode is used
824
824
to encrypt whole blocks at a time. However, the library will buffer data allowing the user to encrypt or decrypt partial
825
-
blocks without a delay. When this mode is first setup it will initially encrypt the initial vector as required.
825
+
blocks without a delay. When this mode is first setup it will initially encrypt the initialization vector as required.
826
826
827
827
\subsubsection{OFB Mode}
828
828
\index{OFB mode}
@@ -1012,7 +1012,7 @@ \subsection{Examples}
1012
1012
/* start up CTR mode */
1013
1013
if ((err = ctr_start(
1014
1014
find_cipher("twofish"), /* index of desired cipher */
1015
-
IV, /* the initial vector */
1015
+
IV, /* the initialization vector */
1016
1016
key, /* the secret key */
1017
1017
16, /* length of secret key (16 bytes) */
1018
1018
0, /* 0 == default # of rounds */
@@ -1786,7 +1786,7 @@ \subsection{Initialization}
1786
1786
as \textit{aadlen}.
1787
1787
1788
1788
\subsection{Nonce Vector}
1789
-
After the state has been initialized (or reset) the next step is to add the session (or packet) initial vector. It should be unique per packet encrypted.
1789
+
After the state has been initialized (or reset) the next step is to add the session (or packet) initialization vector. It should be unique per packet encrypted.
1790
1790
1791
1791
\index{ccm\_add\_nonce()}
1792
1792
\begin{verbatim}
@@ -1973,7 +1973,7 @@ \subsection{Example Usage}
1973
1973
however, unlike EAX it cannot accept \textit{additional authentication data} (meta--data) after plaintext has been processed. This mode also only works with
1974
1974
block ciphers with a 16--byte block.
1975
1975
1976
-
A GCM stream is meant to be processed in three modes, one after another. First, the initial vector (per session) data is processed. This should be
1976
+
A GCM stream is meant to be processed in three modes, one after another. First, the initialization vector (per session) data is processed. This should be
1977
1977
unique to every session. Next, the the optional additional authentication data is processed, and finally the plaintext (or ciphertext depending on the direction).
This initializes the GCM state \textit{gcm} for the given cipher indexed by \textit{cipher}, with a secret key \textit{key} of length \textit{keylen} octets. The cipher
1990
1990
chosen must have a 16--byte block size (e.g., AES).
1991
1991
1992
-
\subsection{Initial Vector}
1993
-
After the state has been initialized (or reset) the next step is to add the session (or packet) initial vector. It should be unique per packet encrypted.
1992
+
\subsection{Initialization Vector}
1993
+
After the state has been initialized (or reset) the next step is to add the session (or packet) initialization vector. It should be unique per packet encrypted.
1994
1994
1995
1995
\index{gcm\_add\_iv()}
1996
1996
\begin{verbatim}
1997
1997
int gcm_add_iv( gcm_state *gcm,
1998
1998
const unsigned char *IV,
1999
1999
unsigned long IVlen);
2000
2000
\end{verbatim}
2001
-
This adds the initial vector octets from \textit{IV} of length \textit{IVlen} to the GCM state \textit{gcm}. You can call this function as many times as required
2001
+
This adds the initialization vector octets from \textit{IV} of length \textit{IVlen} to the GCM state \textit{gcm}. You can call this function as many times as required
2002
2002
to process the entire IV.
2003
2003
2004
2004
Note: the GCM protocols provides a \textit{shortcut} for 12--byte IVs where no pre-processing is to be done. If you want to minimize per packet latency it is ideal
These two functions are meant for accelerated CBC encryption. These functions are accessed through the accel\_cbc\_encrypt and accel\_cbc\_decrypt pointers.
7415
-
The \textit{blocks} value is the number of complete blocks to process. The \textit{IV} is the CBC initial vector. It is an input upon calling this function and must be
7415
+
The \textit{blocks} value is the number of complete blocks to process. The \textit{IV} is the CBC initialization vector. It is an input upon calling this function and must be
0 commit comments