> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of David Maurus
> Sent: Tuesday, June 24, 2003 7:29 AM
> To: [EMAIL PROTECTED]
> Subject: Re: AES counter mode
>
> The easiest way to go about it would be to increment the user
> supplied
> IV by 1 for each encrypted block, and leave it to the user of this
> function to make sure that no overflow in the counter can occur. This
> obligation to the programmer should be written somewhere in
> big letters
> ;-) (i.e. DON'T USE COUNTER MODE TO ENCRYPT MORE THAN 2**32
> [or 2**64,
> depending on the counter size] BLOCKS WITH THE SAME KEY!).
> Higher level
> routines, i.e. the SSL BIO, should avoid counter overflows
> automatically
> for the user by initiating a rehandshake.

Agreed, just increment the user supplied IV, it's the most general approach
and will work for all the protocols that need ctr mode but can't (shouldn't)
agree on nounce/counter boundries.

-lee

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to