Florian Weimer wrote:
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and can encrypt and decrypt
small blobs. Application code should not need to worry about details
(except getting key management right, which is difficult enough).
Hi Florian,
On Jul 23, 2010, at 1:14 AM, Florian Weimer wrote:
* David McGrew:
can I ask what your interest in AEAD is? Is there a particular
application that you have in mind?
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and
Florian Weimer writes:
I just want to create a generic API which takes a key (most of the time, a
randomly generated session key) and can encrypt and decrypt small blobs.
Application code should not need to worry about details (except getting
key management right, which is difficult enough).
Florian Weimer wrote:
* David McGrew:
can I ask what your interest in AEAD is? Is there a particular
application that you have in mind?
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and can encrypt and decrypt
small blobs.
* David McGrew:
can I ask what your interest in AEAD is? Is there a particular
application that you have in mind?
I just want to create a generic API which takes a key (most of the
time, a randomly generated session key) and can encrypt and decrypt
small blobs. Application code should not
Hi Florian,
can I ask what your interest in AEAD is? Is there a particular
application that you have in mind?
DJ provided a good summary of CCM and GCM. To add some follow-on to
that, RFC 5116 defines an interface to an AEAD algorithm, and a
registry of such algorithms. TLS 1.2 ties
* james hughes hugh...@mac.com wrote:
If there is no room for or an integrity field, you can look at
XTS-AES.
http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf
A not so well-known statement of said PDF certainly is the following,
especially in light of today's storage
On Jul 14, 2010, at 1:52 AM, Florian Weimer wrote:
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the advantage of being NIST-reviewed. EAX can do