Re: [PATCH] crypto: add key wrapping block chaining mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am Mittwoch, 22. April 2015, 14:23:04 schrieb Stephan Mueller:

Hi,

> Am Mittwoch, 22. April 2015, 14:13:54 schrieb Herbert Xu:
> 
> Hi Herbert,
> 
> > On Wed, Apr 22, 2015 at 01:53:24PM +0800, Herbert Xu wrote:
> > > On Wed, Apr 22, 2015 at 06:36:59AM +0200, Stephan Mueller wrote:
> > > > The key wrapping is an authenticated encryption operation without
> > > > associated data. Therefore, setting of AAD is permissible, but that
> > > > data
> > > > is not used by the cipher implementation.
> > > 
> > > In that case you should return an error if AAD is provided rather
> > > than silently discarding them since by definition AEAD must include
> > > the AAD in the integrity value.
> > 
> > In fact drop the AEAD altogether and just use ablkcipher.  The
> > integrity value is then simply the output IV.
> 
> Initially I was playing with ablkcipher. But then I moved to AEAD because
> the ciphertext is longer than the plaintext.
> 
> Isn't it a basic assumption to ablkcipher is that the ciphertext is equal in
> size as the plaintext?

One more issue to consider: the key wrapping is an authenticated encryption / 
decryption. Thus, decryption can return EBADMSG, a feature a normal blkcipher 
does not do.

Key wrap is more than a blkcipher, but less than an AEAD. Thus, I would 
consider the key wrapping as a speciality of AEAD where the "AD" part is 
simply NULL (a valid use case of the "regular" AEAD ciphers).


-- 
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux