-
-
Notifications
You must be signed in to change notification settings - Fork 15
Description
First, thank you so much for compiling this list. 😃👍 I just wish I'd found this earlier : )
(EDIT: I found the sentence "So it's important to emphasise that AES-GCM-SIV (and nonce-misuse resistant modes in general) are not a magic invulnerability shield." in the "don't" link. So I will rephrase my whole question.)
I don't find the article at ImperialViolet telling us to avoid AES-GCM-SIV. Even if it isn't such a silvery bullet as many believe. I read the article in support of AES-GCM-SIV, but with a caution note at the end.
Cpmpared to the risk of catastrophic failure of reusing an IV is almost any of the streaming / one-time-pad algorithms, such as CTR, GCM, OCB, Chacha, etc, I regard the SIV alternatives easier to use correctly. (This is a guide for non-expert cryptographers, after all.)
SIV algorithms have one other property that should be mentioned. Encrypting the same value twice will yield the same cipher. This may often be harmful, but is an added bonus when pseudonymization fields in a database. You may still be able to use encrypted values as foreign keys, even if you cannot decipher them.