Editing Template talk:Metbootldr
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 11: | Line 11: | ||
´ | ´ | ||
* this seems to be the most likely candidate for the crypto metldr/bootldr uses http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf | * this seems to be the most likely candidate for the crypto metldr/bootldr uses http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf | ||
<pre> | |||
Inputs and Outputs | |||
GCM has two operations, authenticated encryption and authenticated decryption. The authenticated | |||
encryption operation has four inputs, each of which is a bit string: | |||
• A secret key K, whose length is appropriate for the underlying block cipher. | |||
• An initialization vector IV , that can have any number of bits between 1 and 264. For a fixed | |||
value of the key, each IV value must be distinct, but need not have equal lengths. <b>96-bit | |||
IV values can be processed more efficiently, so that length is recommended for situations in | |||
which efficiency is critical.</b> | |||
• A plaintext P, which can have any number of bits between 0 and 239 − 256. | |||
• Additional authenticated data (AAD), which is denoted as A. This data is authenticated, but | |||
not encrypted, and can have any number of bits between 0 and 264. | |||
</pre> |