-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixed IV value zero for AES-CBC and AES-CTR #38
Comments
It was my misunderstanding. The same CEK will never used for other payloads. https://datatracker.ietf.org/doc/html/draft-ietf-suit-firmware-encryption#section-6.2.2-2.1.1 |
I'm still wondering about the necessity to fix IVs to start with 0 for every use case. Needed decisionIf we make it just for one example use case fixing the IV value, we can move them to section 9. Firmware Updates on IoT Devices with Flash Memory. Additionally, I think we should warn readers that the mis-configuration of IV values may a security issue (see below). Another concern: IV value collisionsAssumption
Correct exampleMis-configured IV exampleWith this mis-configured IVs, the same IV value will be used, e.g.
TODOWe should warn it in the security considerations. |
@hannestschofenig
I think it is better not to fix the IV value as zero.
As you know, section 4.1 of RFC9459 COSE: AES-CTR and AES-CBC says
If we use the same IV and CEK on different plaintext, some information about part of them might be leaked.
But there is no guidance to use different CEK with AES-KW section, moreover using the same CEK is mentioned with ES-DH (+AES-KW) section.
I think we should say something like:
Am I missing or confusing something important?
NOTE:
Section 7.1 and 7.2 of v17 draft say,
The text was updated successfully, but these errors were encountered: