// Copyright 2017 Google Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // /////////////////////////////////////////////////////////////////////////////// #ifndef TINK_SUBTLE_AES_SIV_BORINGSSL_H_ #define TINK_SUBTLE_AES_SIV_BORINGSSL_H_ #include #include #include #include "absl/strings/string_view.h" #include "absl/types/span.h" #include "openssl/aes.h" #include "tink/deterministic_aead.h" #include "tink/internal/aes_util.h" #include "tink/internal/fips_utils.h" #include "tink/util/secret_data.h" #include "tink/util/status.h" #include "tink/util/statusor.h" namespace crypto { namespace tink { namespace subtle { // AesSivBoringSsl is an implemenatation of AES-SIV-CMAC as defined in // https://tools.ietf.org/html/rfc5297 . // AesSivBoringSsl implements a deterministic encryption with associated // data (i.e. the DeterministicAead interface). Hence the implementation // below is restricted to one AD component. // // Thread safety: This class is thread safe and thus can be used // concurrently. // // Security: // ========= // Chatterjee, Menezes and Sarkar analyze AES-SIV in Section 5.1 of // https://www.math.uwaterloo.ca/~ajmeneze/publications/tightness.pdf // Their analysis shows that AES-SIV is susceptible to an attack in // a multi-user setting. Concretely, if an attacker knows the encryption // of a message m encrypted and authenticated with k different keys, // then it is possible to find one of the MAC keys in time 2^b / k // where b is the size of the MAC key. A consequence of this attack // is that 128-bit MAC keys give unsufficient security. // Since 192-bit AES keys are not supported by tink for voodoo reasons // and RFC 5297 only supports same size encryption and MAC keys this // implies that keys must be 64 bytes (2*256 bits) long. class AesSivBoringSsl : public DeterministicAead { public: static crypto::tink::util::StatusOr> New( const util::SecretData& key); crypto::tink::util::StatusOr EncryptDeterministically( absl::string_view plaintext, absl::string_view associated_data) const override; crypto::tink::util::StatusOr DecryptDeterministically( absl::string_view ciphertext, absl::string_view associated_data) const override; static bool IsValidKeySizeInBytes(size_t size) { return size == 64; } static constexpr crypto::tink::internal::FipsCompatibility kFipsStatus = crypto::tink::internal::FipsCompatibility::kNotFips; private: static constexpr size_t kBlockSize = internal::AesBlockSize(); AesSivBoringSsl(util::SecretUniquePtr k1, util::SecretUniquePtr k2) : k1_(std::move(k1)), k2_(std::move(k2)), cmac_k1_(ComputeCmacK1()), cmac_k2_(ComputeCmacK2()) {} // Precomputes cmac_k1 util::SecretData ComputeCmacK1() const; // Precomputes cmac_k2 util::SecretData ComputeCmacK2() const; // Encrypts a single block using k2_. // This is used for CMACs. void EncryptBlock(const uint8_t in[kBlockSize], uint8_t out[kBlockSize]) const; // Computes a CMAC of some data. void Cmac(absl::Span data, uint8_t mac[kBlockSize]) const; // Computes CMAC(XorEnd(data, last)), where XorEnd // xors the bytes in last to the last bytes in data. // The size of the data must be at least 16 bytes. void CmacLong(absl::Span data, const uint8_t last[kBlockSize], uint8_t mac[kBlockSize]) const; // Multiplying an element in GF(2^128) by its generator. // This functions is incorrectly named "doubling" in section 2.3 of RFC 5297. static void MultiplyByX(uint8_t block[kBlockSize]); // Xors a block // res = x ^ y static void XorBlock(const uint8_t x[kBlockSize], const uint8_t y[kBlockSize], uint8_t res[kBlockSize]); void S2v(absl::Span aad, absl::Span msg, uint8_t siv[kBlockSize]) const; // Encrypts (or decrypts) `in` using an SIV `siv` and key `key`, and writes // the result to `out`. util::Status AesCtrCrypt(absl::string_view in, const uint8_t siv[kBlockSize], const AES_KEY* key, absl::Span out) const; const util::SecretUniquePtr k1_; const util::SecretUniquePtr k2_; const util::SecretData cmac_k1_; const util::SecretData cmac_k2_; }; } // namespace subtle } // namespace tink } // namespace crypto #endif // TINK_SUBTLE_AES_SIV_BORINGSSL_H_