RE: AES in ECB mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> I am aware that ECB mode is insecure and not recommended but I still want
> to use it for internal test purposes.

> Is there any way I can use AES in ECB mode in any of these below ciphers
> (Anonymous ciphers):

> ADH-AES256-GCM-SHA384   TLSv1.2 Kx=DH Au=None Enc=AESGCM(256) Mac=AEAD
> ADH-AES128-GCM-SHA256   TLSv1.2 Kx=DH Au=None Enc=AESGCM(128) Mac=AEAD
> ADH-AES256-SHA256       TLSv1.2 Kx=DH Au=None Enc=AES(256)  Mac=SHA256
> ADH-CAMELLIA256-SHA256  TLSv1.2 Kx=DH Au=None Enc=Camellia(256) Mac=SHA256
> ADH-AES128-SHA256       TLSv1.2 Kx=DH Au=None Enc=AES(128)  Mac=SHA256
> ADH-CAMELLIA128-SHA256  TLSv1.2 Kx=DH Au=None Enc=Camellia(128) Mac=SHA256

I'm afraid not.  These are ciphers defined as part of the TLS standard,
and were all intended to be secure at the time they were defined.
If you want an insecure cipher, there is the NULL cipher.

The GCM ones obviously can't do ECB because GCM is a different mode to ECB.

The non-GCM ones still can't do ECB because they are actually defined to
use CBC (which again, is a different mode).

Also, the Camellia ones are defined to not use AES at all - they use the
Camellia block cipher instead.

--
Martin Bonner
Any email and files/attachments transmitted with it are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux