From 1f8f6c9c5af785667cc84cd4a6666460e7ffb58e Mon Sep 17 00:00:00 2001 From: Ken Takayama Date: Mon, 21 Oct 2024 01:06:59 +0000 Subject: [PATCH] update: transform the table 3 with kramdown style --- draft-ietf-suit-firmware-encryption.md | 34 ++++---------------------- 1 file changed, 5 insertions(+), 29 deletions(-) diff --git a/draft-ietf-suit-firmware-encryption.md b/draft-ietf-suit-firmware-encryption.md index 6cf3f2d..6d13ab5 100644 --- a/draft-ietf-suit-firmware-encryption.md +++ b/draft-ietf-suit-firmware-encryption.md @@ -1486,35 +1486,11 @@ two methods are utilized, namely AES Key Wrap (AES-KW) and Ephemeral-Static Diffie-Hellman (ES-DH). In this table we summarize the main properties with respect to their deployment: -~~~ -+---------------++------------+---------------+----------------+ -| || | | | -| Number of || Same key | One key | One Key | -| Long-Term || for all | per device | per device | -| Keys || devices | | | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Number of || Single | Single | One CEK | -| Content || CEK per | CEK per | per payload | -| Encryption || payload | payload | encryption | -| Keys (CEKs) || shared | shared | transaction | -| || with all | with all | per device | -| || devies | devies | | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Use Case || Legacy | Efficient | Point-to- | -| || Usage | Payload | Point Payload | -| || | Distribution | Distribution | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Recommended? || No, bad | Yes | Yes | -| || practice | | | -| || | | | -+---------------++------------+---------------+----------------+ -~~~ +| Number of
Long-Term
Keys | Number of
Content
Encryption
Keys (CEKs) | Use Case | Recommended? | +|----------------------------------|-----------------------------------------------------------------------|----------------------------------------------|----------------------| +| Same key
for all
devices | Single
CEK per
payload
shared
with all
devies | Legacy
Usage | No, bad
practice | +| One key
per device | Single
CEK per
payload
shared
with all
devies | Efficient
Payload
Distribution | Yes | +| One Key
per device | One CEK
per payload
encryption
transaction
per device | Point-to-
Point Payload
Distribution | Yes | The use of firmware encryption with IoT devices introduces an battery exhaustion attack. This attack utilizes the fact that flash memory