What is HIP_CIPHER?

This is the cipher used to encrypt a HIP parameter (that calls for encrypting). No HIP Parameter authentication is used, encrypted parameters are protected with any of the various HIP_MAC parameters.

HIP_CIPHER AES-CBC

This is quite a reasonable cipher to use. The IV is defined variously. However...

802.11 and 802.15 interfaces have AES-CCM built into them. It was pointed out to me, that for HIP-DEX, I had added the need for the AES decrypt in software because I was using AES_CBC for the HIP_CIPHER. So I am changing HIP-DEX to specify AES-CTR.

I am bringing this to everyone's attention so we can get agreement on the construct of the counter

AND

Perhaps it should be added to 5201-bis as well...

==============================================

No on to defining the counter. We will reference RFC 3686 for the counter block format. We need a 32 bit nonce and a 64 bit IV and then there will be a 32 bit block counter (quite an overkill for the size and number of encrypted parameter blocks, but stay consistant).

It is my proposal that R1_Counter be used for the IV and the puzzle I and J be used for the nonce (low order 32 bits as they are larger than 32bits). Or 'just' use I and J, their lower 96bits.

This brings into focus that we need to specify that I and J can never be equal (it just could happen, it can work if k=0). We use I and J as nonces in few areas. They need to be unique. I think we missed being explicit on this test.

Using R1_Counter turns it from a SHOULD to a MUST if HIP_CIPHER = AES-CTR.

But does the update frequency of the puzzle and its potential reuse introduce a potential weakness. The responder would be using the same counter space in different HIP exchanges. As long as these are with different initiators, this is not a problem as the DH derived keys would be different. In HIP-BEX with ephemeral DH, we are still 'safe'? But HIP-DEX with static ECDH, we could never use the same puzzle between two HP-DEX peers.

An alternative would be to still use I and J for the IV, but to include a 32bit nonce with the encrypt block that MUST be fresh with each block.

=============================================

Two questions:

For HIP-DEX: how to construct the Counter Block.

For HIP-BEX: is AES-CTR worth adding?


_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to