From 95eda4f09a37382393cfec7933bac4deb613cdec Mon Sep 17 00:00:00 2001 From: Pauli Date: Wed, 5 Sep 2018 12:18:22 +1000 Subject: FIPS 140-2 IG A.9 XTS key check. Add a check that the two keys used for AES-XTS are different. One test case uses the same key for both of the AES-XTS keys. This causes a failure under FIP 140-2 IG A.9. Mark the test as returning a failure. Reviewed-by: Tim Hudson (Merged from https://github.com/openssl/openssl/pull/7120) --- CHANGES | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'CHANGES') diff --git a/CHANGES b/CHANGES index abb03b4e4b..d5ed4227cb 100644 --- a/CHANGES +++ b/CHANGES @@ -24,6 +24,13 @@ *) Add SM2 base algorithm support. [Jack Lloyd] + *) AES-XTS mode now enforces that its two keys are different to mitigate + the attacked described in "Efficient Instantiations of Tweakable + Blockciphers and Refinements to Modes OCB and PMAC" by Phillip Rogaway. + Details of this attack can be obtained from: + http://web.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf + [Paul Dale] + *) s390x assembly pack: add (improved) hardware-support for the following cryptographic primitives: sha3, shake, aes-gcm, aes-ccm, aes-ctr, aes-ofb, aes-cfb/cfb8, aes-ecb. -- cgit v1.2.3