Hi Everyone,

The Kalyna team sent us polynomials for GCM mode (beyond the 128-bit one 
that NIST uses). They are from DSTU 7624:2014, and listed below.

    128-bit block: x^127 + x^7 + x^2 + x + 1
    256-bit block: x^256 + x^10 + x^5 + x + 1
    512-bit block: x^512 + x^8 + x^5 + x^2 + 1

My first question is, are we mostly safe using them when we need a 
polynomial for a larger block size? For example, here's a recent update to 
CMAC for testing: 
https://github.com/weidai11/cryptopp/commit/7697857481f51c51. It uses the 
512-bit block polynomial.

A question on Crypto Stack Exchange has also questioned a parameter used in 
CMAC mode of operation. If my math is correct in evaluating the polynomial 
at X=2, then the 256-bit block is correctly using 0x423 (not 0x425). Also 
see https://crypto.stackexchange.com/q/9815/10496. 

My second question is, is our use of 0x423 correct?

Jeff

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to cryptopp-users-unsubscr...@googlegroups.com.
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cryptopp-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to