-
Following up from https://github.com/RustCrypto/meta/issues/10, this is an issue for discussion potentially adding "recommended" badges to certain algorithms in this repo:
![Recommended: Yes](https…
-
Some findings from an initial investigation:
If we delete the following files from picoquic:
```
tls_api.c
picoquic_ptls_openssl.c
picoquic_ptls_minicrypto.c
picoquic_ptls_fusion.c
picoquic_m…
-
### Describe the bug
The JWE protected_header is not protected AEAD as expected by the [RFC for JWE](https://datatracker.ietf.org/doc/html/rfc7516#section-3.3).
### How to reproduce
n/a
### CoCo v…
-
This separation is bad because it makes its API and the code much more complicated, and it makes handling `ChangeCipherSpec` much more complicated. `ChangeCipherSpec` can be sent when an encrypted mes…
-
### Problem:
I'm attempting to use `aws_lc_rs::aead` to encrypt and decrypt packets. The AEAD in-place should work fine. However, I need to include the nonce in the header (aad'd as well).
I…
-
Implement various popular AEADs:
- [AES-GCM](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf)
- [ChaCha20Poly1305](https://datatracker.ietf.org/doc/html/rfc8439#section…
-
Implement XChaCha20-Poly1305 using the IETF construction only, as done here.
This is blocked on us finding (or writing) a clear security analysis of the XChaCha20-Poly1305 construct. In particular,…
-
-
We currently require an explicit nonce for all encryption APIs, including ones which automatically encode the nonce as part of the AEAD message.
For some AEADs we can use purely randomized nonces s…
-
Authenticated-Encryption with Associated-Data (AEAD) schemes provide confidentiality by encrypting the data, and also provide authenticity assurances by creating a MAC tag over the encrypted data. The…