On Wed, May 17, 2017 at 12:42 -0400, Ted Unangst wrote:
> Stefan Sperling wrote:
> > I also have some machines which are affected by this, and I am
> > not sure what to about it. I cannot judge the advantages of
> > either AES implementation.
> 
> There's very little advantage to a constant time implementation for disk
> encryption. The threat model doesn't really include such side channels.
>

This is simply not true if you have local users on the same box.
http://www.cs.tau.ac.il/~tromer/papers/cache.pdf

> But I don't know how much burden it will be to maintain two implementations,
> with the various defines like CRYPTO_AES_XTS and
> CRYPTO_AES_XTS_FASTER_BUT_MAYBE_A_LITTLE_UNSAFE and deciding where to use
> each.
>

I can switch AES-XTS back to T-tables at any time but there's no way
to distinguish between what implementation to use at a given moment.

> Although, truth be told, XTS is only useful for disk encryption. It shouldn't
> be used for network traffic. So we could just always make software XTS use
> the original rijndael code. But this is mike's fun zone.

Again, if you don't have local users or you trust them to not attack
you, you can use any implementation.

Reply via email to