tech-crypto archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: crypto(4) and IVs



Thor Lancelot Simon <tls%rek.tjls.com@localhost> writes:

> > It appears to assume that any cryptosystem with an IV is doing
> > CBC-style feedback.  This will break when someone gets around to adding
> > the counter modes (see draft-ietf-secsh-newmodes-03.txt), unless their
> > state is represented somewhere other than the IV storage....
> 
> I don't have access to any hardware that does any counter mode (I'm not
> even sure if there is any, yet).  If you do, I agree that you're probably
> going to have to do some interface and client code bashing to make it
> work right.

Such hardware does exist; for example, the built-in "SEC 2.0" security
enging on the Freescale MPC8555E/MPC8541 SoC devices. See

http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=MPC8555E

Both the reference manual and application note 2755 go into detail on
the capabilites of the security engine, which includes AES counter
mode, HMACs, lots of elliptic curve stuff I don't understand...

        - Nathan



Home | Main Index | Thread Index | Old Index