> -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of David Maurus > Sent: Tuesday, June 24, 2003 7:29 AM > To: [EMAIL PROTECTED] > Subject: Re: AES counter mode > > The easiest way to go about it would be to increment the user > supplied > IV by 1 for each encrypted block, and leave it to the user of this > function to make sure that no overflow in the counter can occur. This > obligation to the programmer should be written somewhere in > big letters > ;-) (i.e. DON'T USE COUNTER MODE TO ENCRYPT MORE THAN 2**32 > [or 2**64, > depending on the counter size] BLOCKS WITH THE SAME KEY!). > Higher level > routines, i.e. the SSL BIO, should avoid counter overflows > automatically > for the user by initiating a rehandshake.
Agreed, just increment the user supplied IV, it's the most general approach and will work for all the protocols that need ctr mode but can't (shouldn't) agree on nounce/counter boundries. -lee ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]