In one embodiment, an authentication method features the generation of an initialization
vector at a first electronic device and the determination at the first electronic
device whether the initialization vector falls within a first group of initialization
vectors. The first group includes a plurality of initialization vectors solely
used in connection with an authentication sequence. Information is encrypted using
in part the initialization vector for return to a second electronic device if the
initialization vector falls within the first group.