Thanks for the response and the reference. The Security Considerations
referred to 4086, but I thought that it would be useful to add the
reference from the nist. I have added the following sentence.

"""
In addition [SP-800-90A-Rev-1] provides appropriated guidances to build
random generators based on deterministic random functions.
"""
I believe that we do not necessarily need to go into more details that are
related to specific transforms, but I am happy to hear otherwise.

Yours,
Daniel

On Mon, Nov 2, 2020 at 9:00 AM Tero Kivinen <kivi...@iki.fi> wrote:

> Daniel Migault writes:
> > <mglt>
> > Correct. it must be a  MUST. I also explicitly added that condition on
> nonce
> > and counter needs to remain valid. The new text is as follows:
> >
> > When such mechanisms cannot be implemented and the session key is, for
> > example, provisioned, the nodes MUST ensure that keys are not used beyond
> > their life time and that the appropriate use of the key remains across
> reboots
> > - e.g. conditions on counters and nonces remains valid.
> >
> > </mglt>
>
> Looks ok.
>
> >     Normally you use just counter, and encrypt it with secret key. The IV
> >     in CBC does not be random, it needs to be unpredictable and it should
> >     not be direct counter or other source with low Hamming distance
> >     between successive IVs.
> >
> >     Actually the problem with old way of CBC mode was that the IV was
> >     random, but predictable as implementations used last block of
> previous
> >     packet. If attacker does not know the key you are using to encrypt
> the
> >     counter to generate IVs, the IVs will be unpredictable and random.
> >
> > <mglt>
> > Thanks for the information. What I was wondering then, is for which
> reason
> > can't we consider this as a random generator - of a limited lifetime.
> > </mglt>
>
> That method is very common piece used when you are making random
> number generator. It is for example part of the NIST AES Counter mode
> based generator, but to properly make random number generator out of
> that need bit more stuff around it. For example you need to make sure
> it is rekeyed before the counter rolls over, and of course it is only
> as secure as the random secret key you are using to seed it etc.
>
> See NIST SP 800-90A REv 1 [1] CTR_DRBG description for more
> information.
>
> [1] https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final
> --
> kivi...@iki.fi
>


-- 
Daniel Migault
Ericsson
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to