Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider situations where AAD is non-negligible in length compared to the plaintext #16

Closed
chris-wood opened this issue Jul 15, 2020 · 2 comments

Comments

@chris-wood
Copy link
Collaborator

From Dan Harkins in the call. This could affect the presented limits.

@chris-wood chris-wood changed the title Consider situations where AAD is longer than plaintext Consider situations where AAD is non-negligible in length compared to the plaintext Jul 27, 2020
@chris-wood
Copy link
Collaborator Author

See https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-28 as another use case. From Hal Murray on the list:

NTP (Network Time Protocol) uses UDP which is easy to forge. It's getting a
layer of authentication which uses AEAD.

The basic NTP packet is 48 bytes. NTS bumps that up to roughly 200. The
client-to-server has no encryption. The server-to-client encrypts roughly 100
bytes.

That 100 bytes is a cookie which also uses AEAD. The cookie contains a
client-to-server and a server-to-client key for the above AEAD so the server
doesn't have to maintain any per-client state. The cookie key is maintained
by the server.

@chris-wood
Copy link
Collaborator Author

Closing as WONTFIX, since (a) not all published analyses make this distinction between AAD and plaintext length inputs, and (b) assuming AAD is part of the plaintext in practice likely does not have any substantial impact on key update or rotation logic.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant