-
Consider placing integrity checks on keys. Not high priority since keys are already masked.
Integrity options to consider: ECC, parity, digest, None.
moidx updated
8 months ago
-
### Test point name
[chip_sw_rom_ctrl_kmac_error](https://github.com/lowRISC/opentitan/blob/72211c306ccacc11da7f4f2059c291690abcf9de/hw/top_earlgrey/data/chip_testplan.hjson#L2503)
### Host side com…
-
### Test point name
[chip_sw_keymgr_sideload_kmac_error](https://cs.opensource.google/opentitan/opentitan/+/master:hw/top_earlgrey/data/chip_testplan.hjson?q=chip_sw_keymgr_sideload_kmac_error&ss=o…
-
Restrict HMAC and KMAC key sizes below 112 bits. There is no official guidance on this but it is something KeyPair has learnt from the CMVP.
This will need to be optional but enforced with the pedant…
-
I understand that this library is a work in progress, and a substantial amount of effort and work has and continues to go into bringing awesome functionality to life. So this isn't at all a criticism,…
-
Discussed with Software ppl about the context switch feature in KMAC, which software can save current hashing engine state and restore later after processing urgent requests like KeyMgr KDF. General c…
-
### Description
Factored out from #22794 and #16855. We should extend DV to cover the sideload key becoming invalid during operation in all possible states.
@andreaskurth and I discussed that this…
-
### Test point name
[chip_sw_kmac_app_keymgr](https://github.com/lowRISC/opentitan/blob/ec2c5dee719b65882057e57ce815af238f926b96/hw/top_earlgrey/data/chip_testplan.hjson#L1796)
### Host side compone…
-
In https://github.com/openpgp-pqc/draft-ehlen-openpgp-nist-bp-comp/issues/10#issuecomment-2220090284 Quynh states that the current construction with a key derivation step in ECDH-KEM is not NIST compl…
-
For more:
* https://kerkour.com/sha256-length-extension-attacks
* https://news.ycombinator.com/item?id=36058754