Pascal Thubert (pthubert) writes: > o The cryptographic mechanisms used by [IEEE802154] include the > 2-byte short address in the calculation of the context. If the > 2-byte short address is reassigned to another node while the same > network-wide keys are in operation, it is possible that this could > result in disclosure of the network-wide key due to reused of the
Even when the nonce reuse happens, I do not think there is any leak of the network-wide keys in that case. What is lost is the confidentiality of the those messages sharing nonce, i.e., only those messages are broken, not the whole network key. > o Many cipher algorithms have some suggested limits on how many > bytes should be encrypted with that algorithm before a new key is > used. These numbers are typically in the many to hundreds of > gigabytes of data. On very fast backbone networks this becomes an > important concern. On LLNs with typical data rates in the > kilobits/second, this concern is significantly less. However, the > LLN may be expected to operate for decades at a time, and > operators are advised to plan for the need to rekey. Note, that TSCH in general allows maximally of 2^40 frames to be sent before ASN rolls over. In normal case the maximum packet size is 2^7 octets, meaning the total amount of bytes that can be transferred over TSCH network is 2^47 octects, meaning 2^43 blocks of AES. Currently only cipher supported by the TSCH is AES-CCM-128 (altough 802.15.4y will be adding support for other algorithms too), but I think the maximum number of blocks recommened for one key for AES is more than 2^43, so this should not be a problem at all. I.e., the ASN frame counter will be problem before this will be problem. Even if using the PHY with 2^11 max frame length that gives only 2^47 blocks at maximum. -- kivi...@iki.fi _______________________________________________ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch