Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature request: Add support for eXtended-nonce ChaCha (AEAD_XChaCha20_Poly1305) #631

Open
bdemers opened this issue Dec 3, 2019 · 3 comments · May be fixed by #957
Open

Feature request: Add support for eXtended-nonce ChaCha (AEAD_XChaCha20_Poly1305) #631

bdemers opened this issue Dec 3, 2019 · 3 comments · May be fixed by #957
Assignees

Comments

@bdemers
Copy link

bdemers commented Dec 3, 2019

https://tools.ietf.org/html/draft-irtf-cfrg-xchacha-01#section-2

AEAD_XChaCha20_Poly1305

   XChaCha20-Poly1305 is a variant of the ChaCha20-Poly1305 AEAD
   construction as defined in [RFC7539] that uses a 192-bit nonce
   instead of a 96-bit nonce.
@bdemers
Copy link
Author

bdemers commented Dec 3, 2019

It might be possible to extend/tweak org.bouncycastle.crypto.modes.ChaCha20Poly1305) to take in the NONCE_SIZE in a constructor (or package private constructor)

ok3141 pushed a commit to ok3141/bc-java that referenced this issue Apr 14, 2020
@alexdupre
Copy link

Given that there is already the implementation of XSala20 and ChaCha20-Poly1305 in BC, it shouldn't be too complex to add it.
I've found some experiments with BC.NET in the following url, but it cannot be imported as is: https://www.scottbrady91.com/C-Sharp/XChaCha20-Poly1305-dotnet
It'd be a nice addition.

@Traderjoe95 Traderjoe95 linked a pull request May 20, 2021 that will close this issue
@Traderjoe95
Copy link

I address this in PR #957. The implementation really wasn't that much work along the lines of XSalsa20Engine

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants