[noise] Aligning with Chrome and IETF's ChaCha20/Poly1305
Stephen Touset
stephen at squareup.com
Tue Jul 22 13:59:38 PDT 2014
I’ll work on these changes ASAP; I’ve been away on vacation.
I greatly prefer the new approach to the rekey step.
On Jul 13, 2014, at 1:11 AM, Trevor Perrin <trevp at trevp.net> wrote:
> On Sun, Jul 13, 2014 at 12:26 AM, Trevor Perrin <trevp at trevp.net> wrote:
>>
>> * Encrypt the plaintext starting at count=1 instead of count=2, by
>> taking the "rekey" bytes from the end of the keystream instead of the
>> beginning.
>
> Hmm, I'm worried that future SW/HW might just provide the AEAD
> combination of ChaCha/Poly[1], and not make it easy to get extra
> ChaCha keystream.
>
> So I changed the rekey step so it could be performed by invoking the
> AEAD, if need be:
>
> cc = ChaCha20(cipher_key, iv XOR 0xFF[8])[64:64 + CC_LEN]
>
> In particular: instead of using "extra" keystream from the encryption,
> rekey now uses ChaCha20 with a different IV than encryption, and it
> uses the second block of output (because if invoking the AEAD, the
> first block is used for the Poly1305 one-time key).
>
> Thoughts?
>
> Trevor
>
> [1] https://datatracker.ietf.org/doc/draft-nir-cfrg-chacha20-poly1305/?include_text=1
> _______________________________________________
> Noise mailing list
> Noise at moderncrypto.org
> https://moderncrypto.org/mailman/listinfo/noise
--
Stephen Touset
stephen at squareup.com
More information about the Noise
mailing list