GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Algorithm: XChaCha20-Poly1305 Nonce / Key Properties: Extended nonce (192-bit) with subkey derivation Status/Characteristics: Modern, nonce-forgiving Algorithm: AES-GCM-SIV Nonce / Key Properties: Synthetic IV, nonce misuse-resistant Status: Modern AEAD (RFC 8452) Algorithm: AES-SIV Nonce / Key Properties: SIV construction preventing forgery on nonce reuse Status: Nonce-misuse-resistant (RFC 5297) Algorithm: AES-OCB3 Nonce / Key Properties: Single-pass AEAD with integrated nonce handling Status: Modern AEAD with certain licensing constraints Algorithm: Deoxys-II (AES-based) Nonce / Key Properties: Tweakable block cipher mode, some misuse-resistant vars Status: NIST LWC finalist, modern construction Algorithm: AES-GCM Nonce / Key Properties: Requires strictly unique nonces, vulnerable on reuse Status: Widely used, must handle nonces carefully Algorithm: AES-CCM Nonce / Key Properties: Requires unique nonces, CTR-based construction Status: Standard AEAD mode, used in constrained environments Algorithm: AES-EAX Nonce / Key Properties: Combines CTR and OMAC, needs unique nonces Status: Older AEAD mode with defined security bounds Algorithm: AES-CTR + HMAC Nonce / Key Properties: Separate encryption and MAC; complex key handling Status: Deprecated, replaced by integrated AEAD modes Algorithm: AES-CBC + HMAC Nonce / Key Properties: Separate encryption and MAC; prone to padding issues Status: Deprecated, replaced by AEAD modes

Download link

https://assets.chaos.social/media_attachments/files/113/659/406/746/864/556/original/1a2ab7321326985e.png

Notices where this attachment appears

  1. Embed this notice
    dragosr (dragosr@chaos.social)'s status on Monday, 16-Dec-2024 08:36:14 JST dragosr dragosr

    Good explanation of why AES-GCM should be frowned upon - catastrophic failure upon nonce/IV reuse. Use XChaCha20-Poly1305 if you are dealing with low computing power devices or the lesser well known AES-SIV or AES-GCM-SIV modes... and use post-quantum resistant key exchanges like KEM.

    https://frereit.de/aes_gcm/

    In conversation about 5 months ago from chaos.social permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.