[145006] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Truncating SHA2 hashes vs shortening a MAC for ZFS Crypto

daemon@ATHENA.MIT.EDU (Alexander Klimov)
Mon Nov 2 16:30:01 2009

Date: Mon, 2 Nov 2009 09:45:14 +0200 (IST)
From: Alexander Klimov <alserkli@inbox.ru>
To: Darren J Moffat <Darren.Moffat@Sun.COM>
cc: cryptography@metzdowd.com, zfs-crypto-discuss@opensolaris.org
In-Reply-To: <4AEB229B.3080101@Sun.COM>

On Fri, 30 Oct 2009, Darren J Moffat wrote:
> The SHA256 checksums are used even for blocks in the pool that aren't
> encrypted and are used for detecting and repairing (resilvering) block
> corruption.  Each filesystem in the pool has its own wrapping key and
> data encryption keys.
>
> Due to some unchangeable constraints I have only 384 bits of space to
> fit in all of: IV, MAC (CCM or GCM Auth Tag), and the SHA256 checksum,
> which best case would need about 480 bits.
>
> Currently I have Option 1 below but I the truncation of SHA256 down to
> 128 bits makes me question if this is safe.  Remember the SHA256 is of
> the ciphertext and is used for resilvering.

If you use hash only to protect against non-malicious corruptions,
when why you use SHA-2? Would not MD5 or even CRC be enough?

-- 
Regards,
ASK

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post