On Jun 21, 2011, at 6:50 AM, Peter Gutmann wrote:

"Novikov, Lev" <[email protected]> writes:

There is an existing class of devices and environments (e.g., military and diplomatic communications) which have particular requirements that are hard
to retrofit into existing crypto APIs (i.e. the logical models are
substantially different).

For example, many of these devices operate in a manner such that the results of cryptographic operations are not returned to program that initiate the operation--as they are in existing crypto APIs. Rather, the request starts in one security domain, is executed by the crypto (which is on the border
between two domains), and the result emanates in another domain.

I guess my question had insufficient detail :-).  The problem is that
introducing a totally new crypto API today is going to be pretty much
impossible. The NSA, in the mid to late 1990s, when the only well- established crypto API around was PKCS #11, published three different reports on crypto API design, presumably to meet the sorts of goals you're listing, but AFAIK the work never went anywhere. Now we have PKCS #11, CryptoAPI, JCE, OpenSSL,
and some others, as well-established, entrenched APIs.

plus RFC 5116, an internet standard that defines a simple interface to authenticated encryption with associated data, and is used by nine RFC and is referenced by 14 current internet drafts.

David

http://www.mindspring.com/~dmcgrew/ic/aead2.html
ftp://ftp.ietf.org/iana/aead-parameters/aead-parameters.xml


I cannot imagine what size hammer you'd need to wield to convince vendors to implement a totally new API for their products. You might be able to add a new object-type to PKCS #11 (this has been done for some other mechanisms like additional auth.mechs) to handle this, leveraging the investment in the existing API, but I just can't imagine how you'd get vendors to support a completely new API (even for PKCS #11, development has pretty much stagnated for some time, not through any lack of interest but because you can do pretty much everything that most users need, so there's not much incentive to push things in new directions). The problem really is political, not technical.

Peter.
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to