Skip to content

Avoid AES-GCM-SIV (?) #4

@vbakke

Description

@vbakke

First, thank you so much for compiling this list. 😃👍 I just wish I'd found this earlier : )

(EDIT: I found the sentence "So it's important to emphasise that AES-GCM-SIV (and nonce-misuse resistant modes in general) are not a magic invulnerability shield." in the "don't" link. So I will rephrase my whole question.)

I don't find the article at ImperialViolet telling us to avoid AES-GCM-SIV. Even if it isn't such a silvery bullet as many believe. I read the article in support of AES-GCM-SIV, but with a caution note at the end.

Cpmpared to the risk of catastrophic failure of reusing an IV is almost any of the streaming / one-time-pad algorithms, such as CTR, GCM, OCB, Chacha, etc, I regard the SIV alternatives easier to use correctly. (This is a guide for non-expert cryptographers, after all.)

SIV algorithms have one other property that should be mentioned. Encrypting the same value twice will yield the same cipher. This may often be harmful, but is an added bonus when pseudonymization fields in a database. You may still be able to use encrypted values as foreign keys, even if you cannot decipher them.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions