Skip to main content

Questions tagged [key-wrap]

Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material.

1 vote
1 answer
240 views

I'm trying to understand exactly what nonce-misuse AES-GCM-SIV mode mitigates. Wikipedia says, "In the event a nonce is misused (i.e., used more than once), nothing is revealed except in the ...
hunter's user avatar
  • 4,051
1 vote
1 answer
118 views

I am having a hard time understanding this concept as I am new to this world. AES key wrapping says it operates on blocks of 64-bit. I thought 64-bit blocks are not considered safe? Also, doesn’t AES ...
kag1357's user avatar
  • 139
1 vote
0 answers
97 views

AES-128 encrypting the key versus AES Key Wrap. Which one would be the more secure mode of operation to protect encryption keys in storage? Specifically, will both method have same security level ...
kag1357's user avatar
  • 139
1 vote
1 answer
105 views

I'm trying to use LibSodium to implement Key Wrapping using SIV mode (Synthetic Initialization Vector). I'm using this answer as a guide, but I want be sure I understand it correctly. My biggest doubt ...
hunter's user avatar
  • 4,051
4 votes
1 answer
403 views

In AES Key Wrap, we apply 6n AES encryptions for an input of n 64-bit blocks. Informally speaking, we wrap the key 6 times. What is the motivation behind 6? Why not 4 or 10? Is there something like a ...
guestQWERTY's user avatar
0 votes
0 answers
259 views

It is well-known that AES-GCM requires the IV to be unique for each message that is encrypted with the same key. If the IV ever repeats, with the same key, then AES-GCM fails catastrophically. Now, ...
pogoya9172's user avatar
0 votes
0 answers
81 views

assuming that I have an RSA key of length 4k bit which I'm interested to wrap using AES-GCM, and I have a (limited) AES-GCM cipher which can only encrypt limited input in size (say 256-bit/512-bit ...
Rami's user avatar
  • 1
3 votes
1 answer
666 views

In PKCS#11 documentation § 2.1.23 is described how to wrap and unwrap a target asymmetric key of any length and type using an RSA key, called CKM_RSA_AES_KEY_WRAP. ...
3ric-T's user avatar
  • 61
3 votes
1 answer
517 views

I want to wrap a private key out of a HSM, using an external EC key pair (master key) and then verify that I can recover it. The wrapping occurs as follows: Generate a secret AES key in the HSM, ...
3ric-T's user avatar
  • 61
3 votes
1 answer
216 views

The iOS version of Signal application (not the protocol) includes a form of key wrap that I've never seen elsewhere: SHA256-HMAC-SIV. It's used to encrypt your master key with your ...
Tim Shadel's user avatar
2 votes
1 answer
906 views

I ask because some vendors of HSM try to avoid the export of wrapped secret key from HSM to insecure storage – storage that does not belong to these vendor’s HSM infrastructure. For example, Thales ...
Vlad's user avatar
  • 81
1 vote
0 answers
195 views

Given a random 256bit key used for data encryption with Streaming AES GCM I would like to wrap it for backup with AES GCM. Is it safe to use ...
zjmo's user avatar
  • 123
1 vote
1 answer
213 views

I am looking at wrapping AES keys with RSA. In NIST SP 800-57 Part 1 Recommendation for Key Management, pg 55 it is estimated that the RSA security-strength equivalent of symmetric AES-256 key would ...
Lajos Pajtek's user avatar
1 vote
1 answer
39 views

Is there any protocol for remote secret key storage without disclosure the key value for remote server administrator?
Rinat Shakirov's user avatar
1 vote
0 answers
108 views

Am following the instructions on https://datatracker.ietf.org/doc/html/rfc5649#section-3 ("AES Key Wrap with Padding Algorithm") and I have gotten to a point where I need to generate the <...
lulliezy's user avatar
  • 111

15 30 50 per page