On Tue, Sep 2, 2025, 21:09 Martin Thomson <m...@lowentropy.net> wrote:

> On Wed, Sep 3, 2025, at 03:12, Tim Hollebeek wrote:
> > In particular, X-ECB is horribly broken and these days probably should
> > not be used by anyone, ever. That advice is already a decade old or
> > more, at this point.
>
> Total distraction, but RFC 9001 uses ECB.  Defensibly so, I believe.
> Though perhaps you might consider the use as part of a more advanced mode,
> HN-1.  Now for the tongue-in-cheek version: Absolute statements are always
> wrong.
>

To add to the distraction, this is really an example of compounded
confusion in how to define things, not a legitimately good use of ECB.

RFC 9001 doesn't really use ECB. It uses the AES block cipher, a function
that takes a fixed-length 16-byte input to a fixed-length 16-byte output.
It's just that some (but not all!) cryptography libraries don't have an API
for that, instead insisting on jamming unrelated objects into the same
interface. That leads to always having a variable-length Mode(TM) on
everything. (This kind of thinking leads to the infamous "RSA/ECB/..."
APIs.)

Then the (not common) applications that actually need the underlying
fixed-length block cipher are stuck using variable-length ECB as the only
way to get at it, even though actually making use of the variable-length
aspect would be a problem.

To that end, RFC 9001 would have been written better to say it used the
block cipher, with a little bit of implementation guidance that, if you
don't have an API for that, you might be able to call an ECB API instead.
Indeed I remember, when I was helping folks implement this, the ECB wording
caused a lot of confusion and I had to direct them to the block cipher
functions instead. No sense in materializing all the extra machinery for a
true variable-length ECB when you were just going to run the block cipher
once.

David

>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to