Re: [quicwg/base-drafts] Encrypting Retry token (#3274)

MikkelFJ <> Mon, 09 December 2019 20:06 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 69CD71200A4 for <>; Mon, 9 Dec 2019 12:06:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.382
X-Spam-Status: No, score=-6.382 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id L8WNlaUSqKSq for <>; Mon, 9 Dec 2019 12:06:34 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id F2E45120019 for <>; Mon, 9 Dec 2019 12:06:33 -0800 (PST)
Date: Mon, 09 Dec 2019 12:06:33 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1575921993; bh=i60BY294Yxyg2hq34ETaQKNr0rHvBFkEPT6N6pPqSjs=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=lgk71Dr7+GB6dBDfxt034sWaCDVEO8AWLrMIcEIqfMP84u5Kc8FQlSTpS+0HXx/cW Hlc2SZ5okYMKwNryaLRJZZc03v9pGA7talEH2qCkOaAdWvV8wjcgLS44o+ZZwMOM5R PVo2IpnS0qBqkmIcBzRVawVf1hicK64FHdnpp3sY=
From: MikkelFJ <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/issues/3274/>
In-Reply-To: <quicwg/base-drafts/issues/>
References: <quicwg/base-drafts/issues/>
Subject: Re: [quicwg/base-drafts] Encrypting Retry token (#3274)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5deea949b715_5a2f3fd5c44cd964110438"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: mikkelfj
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 09 Dec 2019 20:06:36 -0000

If it's not clear, GHASH is the underlying hash algorithm for GCM and addition to the AES encryption track, but it somehow needs a key and a way to specify content and somewhere to place the result. GCM provides the framework for that hence GMAC is additional authenticated data without encrypted plaintext. Since there is no encryption in GMAC, GMAC is essentially GHASH, but with a clear way to specify the input/output parameters. There is probably an extra AES block encryption in GMAC to derive the GHASH key, and possibly an extra AES block encryption on the output, compared to raw GHASH, but I do not remember exactly.

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: