TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

AES-GCM-SIV: Specification and Analysis [pdf]

49 pointsby remxabout 8 years ago

6 comments

tyingqabout 8 years ago
Reading this first was helpful for me: <a href="https:&#x2F;&#x2F;www.lvh.io&#x2F;posts&#x2F;nonce-misuse-resistance-101.html" rel="nofollow">https:&#x2F;&#x2F;www.lvh.io&#x2F;posts&#x2F;nonce-misuse-resistance-101.html</a>
tveitaabout 8 years ago
Going directly to CFRG with this kind of feels like stealing the thunder from the ongoing CAESAR competition.<p>Unfortunately the only misuse-resistant CAESAR candidate left in the running is AEZ, according to <a href="https:&#x2F;&#x2F;aezoo.compute.dtu.dk&#x2F;doku.php" rel="nofollow">https:&#x2F;&#x2F;aezoo.compute.dtu.dk&#x2F;doku.php</a>.
评论 #13792480 未加载
评论 #13791973 未加载
p1mrxabout 8 years ago
Do I understand correctly that the change from GHASH to POLYVAL is basically saying &quot;screw tradition, let&#x27;s put Little Endian on the wire&quot;?<p>In general, when you see Little Endian on the wire, that means someone forgot to call htonl() in their code.
评论 #13793130 未加载
basculeabout 8 years ago
For context, this is describing an updated AES-GCM-SIV construction following a number of attacks reported by NSA earlier this year:<p><a href="https:&#x2F;&#x2F;mailarchive.ietf.org&#x2F;arch&#x2F;attach&#x2F;cfrg&#x2F;pdfL0pM_N.pdf" rel="nofollow">https:&#x2F;&#x2F;mailarchive.ietf.org&#x2F;arch&#x2F;attach&#x2F;cfrg&#x2F;pdfL0pM_N.pdf</a><p>Several cryptographers have been wary of this construction, both because of the history of attacks and also because it generally hasn&#x27;t lived up to the goals of (nonce) &quot;misuse resistant authenticated encryption&quot; as described in the seminal Rogaway paper on the matter:<p><a href="https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2006&#x2F;221.pdf" rel="nofollow">https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2006&#x2F;221.pdf</a><p>It will be interesting to see more analysis on the latest version. For the intended use case (QUIC ticket encryption) it would be helpful.
评论 #13791944 未加载
memmingabout 8 years ago
Sadly hard to read...I was away from the crypto world for too long!
runeksabout 8 years ago
What is this used for? Stuff like file encryption?
评论 #13793113 未加载