Closed
Bug 467372
Opened 16 years ago
Closed 6 months ago
Implement SOBER-128 Encryption Algorithm
Categories
(NSS :: Libraries, enhancement, P5)
NSS
Libraries
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: KaiE, Unassigned)
Details
There is a desire to have the SOBER-128 Encryption Algorithm available in NSS. Requested in https://bugzilla.redhat.com/show_bug.cgi?id=462014 See http://en.wikipedia.org/wiki/SOBER-128 for information about SOBER-128
Comment 1•16 years ago
|
||
As a general rule, we only accept implementations of ciphers in NSS when all the following are true: - Those ciphers have been publicly published, - The PKCS#11 API specification standard has been updated, or a draft modification for it has been accepted by the PKCS#11 "cryptoki" working group, that defines all the "mechanisms" (and object types, if applicable) needed to implement it, - (if applicable) Algorithm Identifier OID(s) have been published for it - It's use in some standard protocol implemented in NSS (such as new TLS cipher suites or CMS OIDs) has been specified in an RFC. - Any patent concerns have been resolved. Are those conditions now met for this new cipher? To be accepted, contributed implementations of ciphers must include: - the cipher algorithm in Freebl - the implementation of the PKCS#11 mechanisms and object types defined for it, - Modifications to the pk11wrap layer required to understand and work with the new mechanisms, - Modifications to lib/util to understand any new Algorithm IDentifier OIDs - Modifications to lib/ssl and/or lib/smime to implement the new SSL cipher suites and/or use of the new algorithm in CMS - Modifications to test programs for freebl (blapitest), SSL and/or CMS have been made, - Modifications to NSS's QA Acceptance test scripts to run the new tests (both blapitest and SSL and/or CMS tests). - All patches must be in the form of a CVS unified diff (or set of CVS unified diffs) that apply cleanly to the NSS trunk with the patch command. When the above conditions are met and a CVS patch that meets those requirements is ready, please let us know.
Comment 2•16 years ago
|
||
Here's the spec. http://www.qualcomm.com.au/PublicationsDocs/SOBER-128-v2.pdf I'd like to make this one a sample of how to implement a separately loaded crypto module rather than adding this to base softoken. This is particularly true since there is no need to use SSL with this cipher. In any case I don't think this would make a NSS 3.12 softoken. Also, SOBER-128 MAC has been broken and should not be part of this implementation. bob
Updated•2 years ago
|
Severity: normal → S3
Updated•6 months ago
|
Severity: S3 → N/A
Status: NEW → RESOLVED
Closed: 6 months ago
Priority: -- → P5
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•