Home 0P3N Blog S3SS10N Wednesday – Initialization Vectors
Ready to Start Your Career?
Create Free Account
Tatianna s profile image
By: Tatianna
February 24, 2016

S3SS10N Wednesday – Initialization Vectors

By: Tatianna
February 24, 2016
Tatianna s profile image
By: Tatianna
February 24, 2016
[not_logged_in_show]

You must be a Cybrary member to view this S3SS10N. Don't worry, membership is completely free!

Join Now

Login

[/not_logged_in_show][if_logged_in_show]

What is S3SS10N Wednesday?

S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be available for you to view, read, and discuss with others. Make sure to come back weekly and see what's new! [insert_vertical_space the_pixels="10"][clear]
[divider][one_third]

Instructor Bio -

Kelly HanderhanSkilled and certified in CISSP, CASP, and PMP, SME Kelly has taught several courses on Cybrary and is highly praised for her ability to effectively communicate important information in a relate-able and understandable way. You can view her extended (2 minute) bio here.
[clear][/one_third][two_third_last]

Whiteboard Notes

[insert_vertical_space the_pixels="10"] Purpose of this Session: Understand the purpose of initialization vectors, seeds and salts and their application to hashing and passwords. Initialization Vectors - Pseudo-random numbers are made by Pseudo-Random Number Generators Hashing can be a simple process but there are many variables to consider that are used to come up with random initialization vectors. Initialization vectors make the process less predictable and harder to crack encryption – though it is not impossible.Hashing – Passwords can be cracked through the use of lookup tables and Rainbow tables. - This is why it is important to “salt” or add additional information/characters to complicate passwords.- Although many hashing algorithms have been broken, it does not mean they are useless. People need to know how to use them in conjunction with other techniques in order to make them useful and harder to break. Listen to/Download the MP3
[/two_third_last][/if_logged_in_show]
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry