Hi,

In the TLS case, RFC5288 defines the following IV construction (Section 3):

```
             struct {
                opaque salt[4];
                opaque nonce_explicit[8];
             } GCMNonce;


   The salt is the "implicit" part of the nonce and is not sent in the
   packet.  Instead, the salt is generated as part of the handshake
   process: it is either the client_write_IV (when the client is
   sending) or the server_write_IV (when the server is sending).  The
   salt length (SecurityParameters.fixed_iv_length) is 4 octets.
```

As you can see the salt is is implicitly derived from the *_write_IV. We have 
no influence on this part of the IV construction, whereas the `nonce_explicit` 
is generated by the implementer. I don't see a way how we could XOR some 
records and compromise confidentiality, we've checked, believe me. If somebody 
can come up with an attack though, that'd be nice.

On the catastrophic part: I'd like to keep it around. I don't think it deserves 
a name like a hurricane, but catastrophic is pretty spot on in this regard.

w.r.t. nonce/n-nonce: either we keep the parentheses with "number used once" 
around or we change it to n-once as suggested by Tony and beautifully 
pronounced by Adam Langley :)

Aaron

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to