Florian Weimer wrote:
>
> I just want to create a generic API which takes a key (most of the
> time, a randomly generated session key) and can encrypt and decrypt
> small blobs. Application code should not need to worry about details
> (except getting key management right, which is difficult enoug
Florian Weimer wrote:
>* David McGrew:
>> can I ask what your interest in AEAD is? Is there a particular
>> application that you have in mind?
>
> I just want to create a generic API which takes a key (most of the
> time, a randomly generated session key) and can encrypt and decrypt
> small blob
Florian Weimer writes:
> I just want to create a generic API which takes a key (most of the time, a
> randomly generated session key) and can encrypt and decrypt small blobs.
> Application code should not need to worry about details (except getting
> key management right, which is difficult enough
Hi Florian,
On Jul 23, 2010, at 1:14 AM, Florian Weimer wrote:
* David McGrew:
can I ask what your interest in AEAD is? Is there a particular
application that you have in mind?
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and ca
* David McGrew:
> can I ask what your interest in AEAD is? Is there a particular
> application that you have in mind?
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and can encrypt and decrypt
small blobs. Application code should not n
t.com wrote:
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors),
The motivations for aead-aes-cbc-hmac-sha1 were 1) to match "legacy"
On Thu, Jul 15, 2010 at 9:32 AM, markus reichelt wrote:
>
> * james hughes wrote:
>
> > If there is no room for or an integrity field, you can look at
> > XTS-AES.
> > http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf
>
> A not so well-known statement of said PDF certainly is
* james hughes wrote:
> If there is no room for or an integrity field, you can look at
> XTS-AES.
> http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf
A not so well-known statement of said PDF certainly is the following,
especially in light of today's storage device capacitie
> What's the current state of affairs regarding combined encryption and
> authentication modes?
>
> I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
> couldn't find test vectors), but I later came across CCM and EAX. CCM
> has the advantage of
On Jul 14, 2010, at 1:52 AM, Florian Weimer wrote:
> What's the current state of affairs regarding combined encryption and
> authentication modes?
>
> I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
> couldn't find test vectors), but I later
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the advantage of being NIST-reviewed. EAX c
11 matches
Mail list logo