Wakened SRTP key

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
when generating a key for SRTP the following is done in transport_srtp.c:
- ---
for (i=0; i<crypto_suites[cs_idx].cipher_key_len && key_ok; ++i)
	if (key[i] == 0) key_ok = PJ_FALSE;
- ---
Any key containing a byte with the value 0 will be rejected and
another key will be generated instead. The key size is 128 bits (plus
a 112 bit salt value).
So the key is 16 bytes long, giving one of 256^16 possible values. But
since the value 0 isn't allowed the possible values are reduced to
255^16. Thus the key is weakened.

Is there a good reason for weakening the SRTP key?

Cheers,
Dan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUtm3QAAoJEOvuRbFerTDlKRgH/RAJQIzohPsnThy3cViwhaeh
Fm2/dvIMD2zXo9EKBcriN5XSEgY+wIb1NR3exSUQTA4LZfI9Ns+3GNNt7yQAolsC
0KugHRhQxLmgzKhyRK8rL8m0ulBE+KniTClk2xWus1B7GluOBZBhhlN6XOtK2Y4t
kpau3tgqWPmO5vCUq3li+ovalJ0KQ5MByNVs/h+90iT9OJIumwoHTK5/3ByDeAAj
matC3loDM+P3kelGvpMkuQYg3G6hByOlfzxkVmT8UPuY85m3aW/sYOH9SfOhb01M
cMKcrpSQ/qHwpQXTUWq+TPZyRpcpz7mjH+aFfXvZ+nXaG0CJKsmR2UUm8m4AKuY=
=gfKH
-----END PGP SIGNATURE-----



[Index of Archives]     [Asterisk Users]     [Asterisk App Development]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [Linux API]
  Powered by Linux