[RFC PATCH 2/3] Add API for initializing AEAD modes

Jussi Kivilinna jussi.kivilinna at iki.fi
Wed Oct 16 11:05:06 CEST 2013


On 15.10.2013 16:46, Werner Koch wrote:
> On Mon, 14 Oct 2013 13:20, jussi.kivilinna at iki.fi said:
> 
>> I based CCM patchset on the AEAD API patch Dmitry sent earlier for
>> GCM. Since CCM has more restrictions (need to know data lengths in
>> advance) than GCM, I added gcry_cipher_aead_init.
> 
> I forgot about this because I delayed that far too long.  Sorry.
> 
>> With this patchset to encrypt a buffer using CCM, you'd first need to
>> initialize/reset CCM state with:
>>
>> gcry_cipher_aead_init (hd, nonce_buf, nonce_len, authtag_len, plaintext_len)
>>
>> CCM needs tag and plaintext lengths for MAC initialization. CCM also
> 
> Up until now we use separate functions to set key, IV, and counter.
> This function changes this pattern.  Why not reusing setiv for the
> nonce and adding a function for the authentication tag?

Sure, setiv can be reused.

> 
> Is the plaintext length really required in advance?  That is
> embarrassing in particular because the authenticated data is appended to
> the ciphertext.

Yes, this is really the case with CCM. The first block to CBC-MAC contains
length of encrypted message.. from RFC:

   The first block B_0 is formatted as follows, where l(m) is encoded in
   most-significant-byte first order:

      Octet Number   Contents
      ------------   ---------
      0              Flags
      1 ... 15-L     Nonce N
      16-L ... 15    l(m)

Flags encodes the length of length field (L), tag length and an AAD flag.

> 
>> gcry_cipher_authenticate (hd, aadbuf, aadbuflen)
>>
>> which does the actual MAC initialization. If aadbuflen == 0, then
>> above call can be omitted and gcry_cipher_(en|de)crypt will call
>> gcry_cipher_authenticate with zero length.
> 
> What about extending this fucntion to also take the authentication tag
> and, if the plaintext length is required for the MAC setup, also that
> length?  That would group the information together.

Ok, so we'd have
  gcry_cipher_authenticate (hd, const void *aadbuf, size_t aadbuflen,
			    count void *tag, size_t taglen, size_t crypt_len)

For encryption, tag is NULL pointer and taglen is zero and after encryption
authentication tag can be read with 'gcry_cipher_tag'. For decryption, tag
is given for authentication check with above function.

Also (at least) for CCM, encrypt_len needs to be given.

> 
>> NIST paper and RFC 3610 define CCM ciphertext as [ctr-enc(plaintext)
>> || authtag] and that decryption must not reveal any information
>> (plaintext or authtag) if authtag is not correct. Therefore full
>> buffers, matching with length of plaintext_len and authtag_len given
>> in gcry_cipher_aead_init, have to be used. If authentication check
> 
> I don't see that.  That is an implementaion detail and the requirement
> could also be achieved by putting it into the security policy.

Ok.

> 
>> Would it be better to add functions to do AEAD encrypt/decrypt in
>> single go and use gcry_buffer_t? This would avoid having internal
>> state machines in AEAD modes and having to call different functions in
>> correct order.
> 
> And it also means that you can't use that mode with large amounts of
> data.  Not a good idea; there are still lots of platforms with a quite
> limited amount of memory but in need to encrypt large data take from
> somewhere.  Yes, the need for the plaintext length makes it hard to use
> but I can image systems which know that length on advance even if the
> data does not fit into memory.

Agreed and not all AEAD modes require plaintext length in advance.

> 
> I mentioned gcry_buffer_t having the AAD in mind; a scatter/gather style
> operation may be useful here.
> 
> We should also keep in mind that adding support for OCB is desirable.  I
> had in mind to require the use of a new GCRYCTL_ENABLE_GPL_CODE to state
> that Libgcrypt is used under the terms of the GPL.  However, meanwhile
> Phil Rogaway relaxed the requirement for royalty free patent licensing
> to all free software licenses and thus we could simply got forth and
> implement OCB.  Any new API should make it easy to do just that.
> 
> 
> 
> Shalom-Salam,
> 
>    Werner
> 




More information about the Gcrypt-devel mailing list