Loop/Architecture/Context: Difference between revisions

Jump to navigation Jump to search
No edit summary
Line 21: Line 21:
To allow for evolving the underlying crypto algorithm, any encrypted context will be paired with an explicit indication of the algorithm in use. For the moment, we define only one algorithm, "AES-GCM". Key length is not explicitly included in the algorithm name, and is instead implied by the length of the accompanying key. For our initial implementation, we will be generating 128-bit keys; however, code should be forwards-compatible with longer key lengths.
To allow for evolving the underlying crypto algorithm, any encrypted context will be paired with an explicit indication of the algorithm in use. For the moment, we define only one algorithm, "AES-GCM". Key length is not explicitly included in the algorithm name, and is instead implied by the length of the accompanying key. For our initial implementation, we will be generating 128-bit keys; however, code should be forwards-compatible with longer key lengths.


For AES-GCM, the "context" field is formatted as follows:
For AES-GCM, the "context.value" field is formatted as follows:


  Base64(IV || ciphertext || tag)
  Base64(IV || ciphertext || tag)
Confirmed users
632

edits

Navigation menu