-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CMIDs should hold key material #1753
Comments
swenson
added a commit
that referenced
this issue
Nov 15, 2024
Mostly. We need to keep a limited amount of storage per AES-256-GCM key to track usage, since these keys can only be used a certain number of times due to their IV problems. For HMAC, we don't specify a key usage on the output MAC, since it has to be imported back into Caliptra to be used as a key, where its usage will have to be specified. We also fix a few other minor issues with the mailbox documentation: Fixes #1753 Fixes #1754 Fixes #1755 Fixes #1756
swenson
added a commit
that referenced
this issue
Nov 15, 2024
Mostly. We need to keep a limited amount of storage per AES-256-GCM key to track usage, since these keys can only be used a certain number of times due to their IV problems. For HMAC, we don't specify a key usage on the output MAC, since it has to be imported back into Caliptra to be used as a key, where its usage will have to be specified. We also fix a few other minor issues with the mailbox documentation: Fixes #1753 Fixes #1754 Fixes #1755 Fixes #1756
swenson
added a commit
that referenced
this issue
Nov 20, 2024
Mostly. We need to keep a limited amount of storage per AES-256-GCM key to track usage, since these keys can only be used a certain number of times due to their IV problems. For HMAC, we don't specify a key usage on the output MAC, since it has to be imported back into Caliptra to be used as a key, where its usage will have to be specified. We also fix a few other minor issues with the mailbox documentation: Fixes #1753 Fixes #1754 Fixes #1755 Fixes #1756
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
https://github.com/chipsalliance/caliptra-sw/blob/main-2.x/runtime/README.md describes CMIDs, which hold metadata describing keys held in Caliptra DCCM. This imposes use-case scaling restrictions based on the amount of DCCM available. In addition, the ability to import keys of varying size mean that fragmentation may occur.
We can resolve these concerns by having CMIDs also hold the relevant key material. CMIDs are encrypted with random per-boot keys, meaning Caliptra remains the only entity that can observe the raw keys.
ML-DSA should not be a concern, because key material is stored as a seed.
The text was updated successfully, but these errors were encountered: