On 2016-08-16 07:51, Watson Ladd wrote:
On Mon, Aug 15, 2016 at 9:56 PM, Martin Thomson
<martin.thom...@gmail.com> wrote:
On 16 August 2016 at 09:46, Paterson, Kenny <kenny.pater...@rhul.ac.uk> wrote:
Sadly, you can't implement XGCM using an existing AES-GCM API, because of the way the MAC (which is keyed) is computed over the ciphertext in the
standard GCM scheme.


Is there a reason why you can't simply XOR the plaintext stream that
is fed to AES-GCM?

We set N = N XOR HKDF(IKM, salt, label[N], 12), which the paper shows
improves things.  If we also set P = P XOR repeat(HKDF(IKM, salt,
label[P], 16)) would we gain any of the advantages of XCAU?  That
change could be made without needing a new algorithm.

Yes. XOR two adjacent blocks, and you get something that is a function
purely of the key.

This is true if N XOR L is made public (where L is the secret value). As long as N XOR L is only used for encryption, and N is the value communicated, then it isn't possible to get a function purely of the key by XORing two adjacent ciphertext blocks, since the block cipher inputs will depend on L.

Atul

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to