[PATCH v6] security/keys: rewrite all of big_key crypto
Stephan Mueller
smueller at chronox.de
Wed Sep 20 13:45:07 UTC 2017
Am Mittwoch, 20. September 2017, 12:52:21 CEST schrieb Jason A. Donenfeld:
Hi Jason,
>
> This sounds incorrect to me. Choosing a fresh, random, one-time-use
> 256-bit key and rolling with a zero nonce is a totally legitimate way
> of using GCM. There's no possible reuse of the key stream this way.
> However, on the off chance that you know what you're talking about,
> could you outline the cryptographic attack you have in mind, or if
> that's too difficult, simply link to the relevant paper on eprint?
http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list