Hacker News new | past | comments | ask | show | jobs | submit login
Double Nonce Derive Key AES-GCM (DNDK-GCM) (ietf.org)
2 points by scryptor 11 days ago | hide | past | favorite | 1 comment





Encryption takes the root key and a random nonce, derives a fresh encryption key and a key commitment value, invokes AES-GCM with the derived key and a 12-byte zero nonce, and outputs the ciphertext, authentication tag and the key commitment value.

The low collision probability with 24-byte random nonces extends the lifetime of the root key and this supports processing up to 2^64 bytes under one root key. DNDK-GCM involves a small overhead compared to using AES-GCM directly, and its security relies only on the standard assumption on AES as a pseudorandom permutation.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: