Re: XTS cipher mode for cluster file encryption

Поиск
Список
Период
Сортировка
От Sasasu
Тема Re: XTS cipher mode for cluster file encryption
Дата
Msg-id f5d156bc-8532-d958-0a26-c9271b9c2960@sasa.su
обсуждение исходный текст
Ответ на Re: XTS cipher mode for cluster file encryption  (Tomas Vondra <tomas.vondra@enterprisedb.com>)
Ответы Re: XTS cipher mode for cluster file encryption  (Stephen Frost <sfrost@snowman.net>)
Re: XTS cipher mode for cluster file encryption  (Tomas Vondra <tomas.vondra@enterprisedb.com>)
Список pgsql-hackers
Just a mention. the HMAC (or AE/AD) can be disabled in AES-GCM. HMAC in 
AES-GCM is an encrypt-then-hash MAC.

CRC-32 is not a crypto-safe hash (technically CRC-32 is not a hash 
function). Cryptographers may unhappy with CRC-32.

I think CRC or SHA is not such important. If IV can be stored, I believe 
there should have enough space to store HMAC.

On 2021/10/18 05:23, Tomas Vondra wrote:
> 
> I've argued for storing the nonce, but I don't quite see why would we 
> need integrity guarantees?

Вложения

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Masahiko Sawada
Дата:
Сообщение: Re: Skipping logical replication transactions on subscriber side
Следующее
От: Sasasu
Дата:
Сообщение: Re: XTS cipher mode for cluster file encryption