Skip to content

Clarification on "independent" #93

@powersmc

Description

@powersmc

Regarding XTS-AES, this evaluation activity discusses independence:

"If AES-XTS is claimed then the evaluator shall examine the TSS to verify that the TOE creates full-length keys by methods that ensure that the two key halves are different and independent. The evaluator shall confirm the TSS describes the block of data containing the key and that is full block of data in alignment with selected the AES standard."

The core XTS-AES standards (NIST SP 800-38E and IEEE Std 1619-2007) do not require independence - they require that the two key halves are different, and only discuss independence in the informative (non-normative) sections of IEEE Std 1619-2007.

This language should be clarified to distinguish between information-theoretic independence and computational independence. Common methods for establishing keys (such as KDFs and RBGs as listed) generally provide only computational independence (i.e.: per SP 800-90C: "Real-world RBGs are designed with a security goal of indistinguishability from the output of an ideal randomness source. That is, given some limits on an adversary’s data and computing power, it is expected that no adversary can reliably distinguish between RBG outputs and outputs from an ideal randomness source.").

I suggest updating the verbiage to state explicitly "computationally independent" to reflect the achievable security property.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions