-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create an AEAD cipher SPI for ChaCha20-Poly1305 #1
Comments
This forms a stable starting point for #1, #2, and #3 SPIs along with providers for #8, #9, and #10. These consist of an AEAD cipher SPI, a key exchange SPI, and a signature SPI, along with providers based on BouncyCastle, Java 11, and Java 15 respectively. A small number of smoke tests are included from the relevant RFCs.
After implementing the two providers so far, once I actually started to use the cipher API in building the higher level APIs, I found that there may not be a need to facade over |
Oh no, it seems as though we have a slight problem. It sounds like the 96-bit nonces standardized in RFC 7539 might be too short for random nonces and long lived keys. While this may not be a problem for the use case in #5, if data in #4 are to be long-lived, then upgrading to XChaCha20-Poly1305 (fairly similar to XSalsa20-Poly1305 which already extended its nonce) would be more appropriate. |
This seems to be about as explored as it will get. Only a thin wrapper around |
Reopening since the BouncyCastle version turned out to be annoying. |
This cipher SPI should provide basic low level functionality that follows RFC 7539 for ChaCha20-Poly1305. This should have at least two core implementations: one based on BouncyCastle, and the other based on Java 11.
The text was updated successfully, but these errors were encountered: