[Cryptography] Killing two IV related birds with one stone
Perry E. Metzger
perry at piermont.com
Wed Sep 11 20:15:30 EDT 2013
On Wed, 11 Sep 2013 20:01:28 -0400 Jerry Leichter <leichter at lrw.com>
wrote:
> > ...Note that if you still transmit the IVs, a misimplemented
> > client could still interoperate with a malicious counterparty
> > that did not use the enforced method for IV calculation. If you
> > don't transmit the IVs at all but calculate them, the system will
> > not interoperate if the implicit IVs aren't calculated the same
> > way by both sides, thus ensuring that the covert channel is
> > closed.
> Ah, but where did the session and IV-generating keys come from?
> The same random generator you now don't trust to directly give you
> an IV?
Certainly, but if you remove most or all covert channels, you've
narrowed the problem down to auditing the RNG instead of having to
audit much more of the system. It is all a question of small steps
towards better assurance. No one measure will fix everything.
--
Perry E. Metzger perry at piermont.com
More information about the cryptography
mailing list