ciphers:gcm
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ciphers:gcm [2020/05/26 00:26] – peter | ciphers:gcm [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Ciphers - GCM ====== | ====== Ciphers - GCM ====== | ||
- | GCM ([[http:// | + | **GCM** ([[http:// |
+ | |||
+ | The operation is an [[https:// | ||
+ | |||
+ | GCM is defined for block ciphers with a block size of 128 bits. | ||
+ | |||
+ | ---- | ||
===== Pros ===== | ===== Pros ===== | ||
Line 9: | Line 15: | ||
* Extremely fast. | * Extremely fast. | ||
* Patent-free. | * Patent-free. | ||
- | * Spported | + | * Can take full advantage of parallel processing. |
- | * Supported by OpenSSL. | + | * Implementing GCM can make efficient use of an instruction pipeline or a hardware pipeline. |
+ | * Supported | ||
+ | * Supported by [[https:// | ||
* Supported by Crypto++. | * Supported by Crypto++. | ||
+ | ---- | ||
===== Cons ===== | ===== Cons ===== | ||
- | * GCM is CTR mode encryption with the addition of a Carter-Wegman MAC set in a Galois field. | + | * GCM is CTR mode encryption with the addition of a Carter-Wegman MAC set in a [[https:// |
* Implementing GCM is a hassle in a way that most other AEADs (Authenticated Encryption with Associated Data) are not. But if you have someone else’s implementation — say OpenSSL’s — it’s a perfectly lovely mode. | * Implementing GCM is a hassle in a way that most other AEADs (Authenticated Encryption with Associated Data) are not. But if you have someone else’s implementation — say OpenSSL’s — it’s a perfectly lovely mode. | ||
Line 24: | Line 33: | ||
- The first weakness is that an n-bit tag provides only n − k bits of authentication security when messages are 2 k blocks long. | - The first weakness is that an n-bit tag provides only n − k bits of authentication security when messages are 2 k blocks long. | ||
- | * Competing modes do not have this problem, or have it only when n = 128, in which case the practical effect is minimal. | + | * Competing modes do not have this problem, or have it only when n = 128, in which case the practical effect is minimal.\\ \\ |
- A successful forgery immediately reveals information about the authentication key. | - A successful forgery immediately reveals information about the authentication key. | ||
* This weakness exacerbates the consequences of the first one, and leads to a complete loss of authentication security. | * This weakness exacerbates the consequences of the first one, and leads to a complete loss of authentication security. | ||
ciphers/gcm.1590452805.txt.gz · Last modified: 2020/07/15 09:30 (external edit)