Hi,

On 15 December 2016 at 19:11, David Sommerseth
<open...@sf.lists.topphemmelig.net> wrote:
> On 15/12/16 16:35, Sebastian Rubenstein wrote:
>> Could you explain in greater detail your statement "use AES-256-GCM
>> for more efficiency on the data channel"?
>
> I'll leave this to Steffan (or JJK).

AES-GCM has a shorter authentication tag (128 bits) than HMAC-SHA256
(256 bits).  Also, AES-GCM doesn't need a unpredictable IV but rather
just a unique-per-key nonce, which mean we can transfer 8 less bytes
per packet for the IV.  This saves us a total of 24 bytes per packet
overhead compared to cipher AES-256-CBC + auth SHA256.

Furthermore, AES-GCM can maximallu leverage the AES-NI hardware
acceleration available in modern Intel CPUs, which will result is
*much* faster crypto.

-Steffan

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to