Score:0

Question about Asymmetric key wrapping using (limited) AES-GCM

nr flag

assuming that I have an RSA key of length 4k bit which I'm interested to wrap using AES-GCM, and I have a (limited) AES-GCM cipher which can only encrypt limited input in size (say 256-bit/512-bit input) per invocation. Is there a way/conditions to fulfill when splitting this 4k bit key into smaller keys to fit my (limited) AES-GCM and yet get the same security as when using an unlimited AES-GCM (encrypts 4k bits per invocation)? or is this proposed method inherently weaker?

Maarten Bodewes avatar
in flag
Are you **sure** that your cipher can only handle 256 or 512 bit input? What about the AAD input, does it have a higher data limit? Could you maybe link to the library/runtime because I find this claim highly doubtful. The main problem of encrypting chunks is that you can reorder or leave out chunks without breaking authentication errors.
Rami avatar
nr flag
Hi Maarten, SW usually doesn't have these limitations, these limitations start appearing when moving from standard to HW. For the sake of our discussion lets assume that I have a limited piece of AES-GCM HW, and also we can keep AAD out as I'm not sure it changes the security of the GCM mode
Maarten Bodewes avatar
in flag
Yes, you can leave AAD out, but you could use AAD to create an authentication tag over the other authentication tags.
poncho avatar
my flag
Or use the AAD to tag the location of each chunk (so that you cannot reorder or leave out chunks); part of the AAD could be effectively "this is chunk 5 of 7"; you could do that as well within the plaintext, but that reduces the amount of plaintext available to encoding the 4k bit key, which means you'll need more chunks overall
Rami avatar
nr flag
understood, do you think that this way is acceptable (FIPs for example) and as key wrapping mechanism? as their documents doesn't say so
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.