Re: [Cryptography-dev] KDF Question

2025-01-11 Thread Sriram R via Cryptography-dev
t 5:01 PM Sriram R via Cryptography-dev > wrote: > > > > Hello, > > > > I'm generating a key using Scrypt from a password supplied by the user. > I then use this key as follows. This works but my question to the experts: > is this an acceptable way to

Re: [Cryptography-dev] KDF Question

2025-01-11 Thread Sriram R via Cryptography-dev
rypted when storing or > is it not sensitive information? > > > > > > On Sat, Jan 11, 2025, 6:22 AM Alex Gaynor wrote: > >> > >> In general, using the output of a KDF as the key for symmetric > >> encryption is fine. > >> > >

[Cryptography-dev] KDF Question

2025-01-10 Thread Sriram R via Cryptography-dev
Hello, I'm generating a key using Scrypt from a password supplied by the user. I then use this key as follows. This works but my question to the experts: is this an acceptable way to use the AESGCMSIV cipher? Am I doing something that's fundamentally against best practices? In the examples on the

Re: [Cryptography-dev] KDF Question

2025-01-12 Thread Sriram R via Cryptography-dev
t; has happened on it. If you're interested in contributing, we're happy >> to review a PR. >> >> Alex >> >> On Sun, Jan 12, 2025 at 12:02 PM Sriram R via Cryptography-dev >> wrote: >> > >> > Robert, >> > >> > Appreciate t

Re: [Cryptography-dev] KDF Question

2025-01-12 Thread Sriram R via Cryptography-dev
ve had the privilege of following along with Team Keccak on the > development of what is now SHA3 and its derivatives. We are finally seeing > an uptick in replacing HMAC/HKDF with KMAC. > > On 1/10/25 17:00, Sriram R via Cryptography-dev wrote: > > Hello, > > I'm generat

Re: [Cryptography-dev] KDF Question

2025-01-12 Thread Sriram R via Cryptography-dev
tps://github.com/pyca/cryptography/issues/12141. Thus far no work > has happened on it. If you're interested in contributing, we're happy > to review a PR. > > Alex > > On Sun, Jan 12, 2025 at 12:02 PM Sriram R via Cryptography-dev > wrote: > > > > Robert, > >

[Cryptography-dev] AES Key Type Issue

2025-01-19 Thread Sriram R via Cryptography-dev
Hello, I'm testing a softHSM2 setup with the following code on rhel 9.4 system running in FIPS mode: import pkcs11 from cryptography.hazmat.primitives import serialization from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes lib = pkcs11.lib("/usr/local/lib/softhsm/libsof

[Cryptography-dev] AESGCMSIV

2025-01-04 Thread Sriram R via Cryptography-dev
Hello, I'm reaching out to the cryptography experts for this issue. Using Python 3.9 on a RHEL 9.4 platform with the cryptography module installed on it. The requirements are to encrypt some data using *class* cryptography.hazmat.primitives.ciphers.aead.AESGCM(*key*) I've written the encryption

Re: [Cryptography-dev] AESGCMSIV

2025-01-04 Thread Sriram R via Cryptography-dev
e. You generally should not store the key > with the ciphretext, as there's basically no threat model that makes > sense under. > > Alex > > On Sat, Jan 4, 2025 at 12:28 PM Sriram R via Cryptography-dev > wrote: > > > > Hello, > > > > I&#x

Re: [Cryptography-dev] AESGCMSIV

2025-01-04 Thread Sriram R via Cryptography-dev
gt; nfile = "/tmp/cstore/csrs/eud1.red.ftf.net.csr.nonce" > >>> with open(nfile, 'rb') as f: > >>>nonce = f.read() > >>>decrypt(nonce, file, aesgcmsiv) > >>> > >>> if __name__ == "