Re: Encryption and authentication modes

2010-07-25 Thread Justin Troutman
Florian Weimer wrote: > > I just want to create a generic API which takes a key (most of the > time, a randomly generated session key) and can encrypt and decrypt > small blobs. Application code should not need to worry about details > (except getting key management right, which is difficult enoug

Re: Encryption and authentication modes

2010-07-24 Thread David Wagner
Florian Weimer wrote: >* David McGrew: >> can I ask what your interest in AEAD is? Is there a particular >> application that you have in mind? > > I just want to create a generic API which takes a key (most of the > time, a randomly generated session key) and can encrypt and decrypt > small blob

Re: Encryption and authentication modes

2010-07-24 Thread Chris Palmer
Florian Weimer writes: > I just want to create a generic API which takes a key (most of the time, a > randomly generated session key) and can encrypt and decrypt small blobs. > Application code should not need to worry about details (except getting > key management right, which is difficult enough

Re: Encryption and authentication modes

2010-07-24 Thread David McGrew
Hi Florian, On Jul 23, 2010, at 1:14 AM, Florian Weimer wrote: * David McGrew: can I ask what your interest in AEAD is? Is there a particular application that you have in mind? I just want to create a generic API which takes a key (most of the time, a randomly generated session key) and ca

Re: Encryption and authentication modes

2010-07-23 Thread Florian Weimer
* David McGrew: > can I ask what your interest in AEAD is? Is there a particular > application that you have in mind? I just want to create a generic API which takes a key (most of the time, a randomly generated session key) and can encrypt and decrypt small blobs. Application code should not n

Re: Encryption and authentication modes

2010-07-22 Thread David McGrew
t.com wrote: What's the current state of affairs regarding combined encryption and authentication modes? I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I couldn't find test vectors), The motivations for aead-aes-cbc-hmac-sha1 were 1) to match "legacy"

Re: Encryption and authentication modes

2010-07-15 Thread Matt Ball
On Thu, Jul 15, 2010 at 9:32 AM, markus reichelt wrote: > > * james hughes wrote: > > > If there is no room for or an integrity field, you can look at > > XTS-AES. > > http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf > > A not so well-known statement of said PDF certainly is

Re: Encryption and authentication modes

2010-07-15 Thread markus reichelt
* james hughes wrote: > If there is no room for or an integrity field, you can look at > XTS-AES. > http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf A not so well-known statement of said PDF certainly is the following, especially in light of today's storage device capacitie

Re: Encryption and authentication modes

2010-07-14 Thread dj
> What's the current state of affairs regarding combined encryption and > authentication modes? > > I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I > couldn't find test vectors), but I later came across CCM and EAX. CCM > has the advantage of

Re: Encryption and authentication modes

2010-07-14 Thread james hughes
On Jul 14, 2010, at 1:52 AM, Florian Weimer wrote: > What's the current state of affairs regarding combined encryption and > authentication modes? > > I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I > couldn't find test vectors), but I later

Encryption and authentication modes

2010-07-14 Thread Florian Weimer
What's the current state of affairs regarding combined encryption and authentication modes? I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I couldn't find test vectors), but I later came across CCM and EAX. CCM has the advantage of being NIST-reviewed. EAX c