Hi, again, thanks for your content! I'm learning a lot.
I thought I remembered learning that IV's should also be kept secret as best practice.
If someone got ahold of the IV and knew the encryption algorithm and mode, they might be able to use an IV to make more informed guesses on the actual secret key through brute forcing.
Hi, again, thanks for your content! I'm learning a lot.
I thought I remembered learning that IV's should also be kept secret as best practice.
If someone got ahold of the IV and knew the encryption algorithm and mode, they might be able to use an IV to make more informed guesses on the actual secret key through brute forcing.
Curious for responses to this. Thanks.