<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Key_Wrap</id>
	<title>Key Wrap - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Key_Wrap"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Key_Wrap&amp;action=history"/>
	<updated>2026-05-15T07:34:07Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Key_Wrap&amp;diff=5622&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''Key Wrap''' constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wra...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Key_Wrap&amp;diff=5622&amp;oldid=prev"/>
		<updated>2019-06-07T05:38:01Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Key Wrap&amp;#039;&amp;#039;&amp;#039; constructions are a class of &lt;a href=&quot;/index.php?title=Symmetric_encryption&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Symmetric encryption (page does not exist)&quot;&gt;symmetric encryption&lt;/a&gt; algorithms designed to &lt;a href=&quot;/index.php?title=Key_encapsulation&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Key encapsulation (page does not exist)&quot;&gt;encapsulate&lt;/a&gt; (encrypt) cryptographic key material. The Key Wra...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''Key Wrap''' constructions are a class of [[symmetric encryption]] algorithms designed to [[key encapsulation|encapsulate]] (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as protecting keys while in untrusted storage or transmitting keys over untrusted communications networks. The constructions are typically built from standard primitives such as [[block cipher]]s and [[cryptographic hash function]]s.&lt;br /&gt;
&lt;br /&gt;
Key Wrap may be considered as a form of [[key encapsulation]] algorithm, although it should not be confused with the more commonly known ''asymmetric'' (public-key) [[key encapsulation]] algorithms (e.g., [[PSEC-KEM]]). Key Wrap algorithms can be used in a similar application: to securely transport a session key by encrypting it under a long-term encryption key.&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
&lt;br /&gt;
In the late 1990s, the [[National Institute of Standards and Technology]] (NIST) posed the &amp;quot;Key Wrap&amp;quot; problem: to develop secure and efficient cipher-based key encryption algorithms. The resulting algorithms would be formally evaluated by NIST, and eventually approved for use in NIST-certified cryptographic modules. NIST did not precisely define the security goals of the resulting algorithm, and left further refinement to the algorithm developers. Based on the resulting algorithms, the design requirements appear to be (1) confidentiality, (2) integrity protection (authentication), (3) efficiency, (4) use of standard (approved) underlying primitives such as the [[Advanced Encryption Standard]] (AES) and the Secure Hash Algorithm ([[SHA-1]]), and (5) consideration of additional circumstances (e.g., resilience to operator error, low-quality random number generators). Goals (3) and (5) are particularly important, given that many widely deployed [[authenticated encryption]] algorithms (e.g., AES-CCM) are already sufficient to accomplish the remaining goals.&lt;br /&gt;
&lt;br /&gt;
[[Image:NIST_AES_key_wrap.png|thumb|right|NIST AES Key Wrap Specification]]&lt;br /&gt;
&lt;br /&gt;
Several constructions have been proposed. These include:&lt;br /&gt;
&lt;br /&gt;
* ''[http://csrc.nist.gov/groups/ST/toolkit/documents/kms/key-wrap.pdf AES Key Wrap Specification]'' (November 2001)&lt;br /&gt;
* [http://eprint.iacr.org/2004/340.pdf American Standards Committee ANSX9.102], which defines four algorithms:&lt;br /&gt;
** AESKW (a variant of the ''AES Key Wrap Specification'')&lt;br /&gt;
** TDKW (similar to AESKW, built from [[Triple DES]] rather than AES).&lt;br /&gt;
** AKW1&lt;br /&gt;
** AKW2&lt;br /&gt;
&lt;br /&gt;
Each of the proposed algorithms can be considered as a form of [[authenticated encryption]] algorithm providing confidentiality for highly [[entropic security|entropic]] messages such as cryptographic keys. The AES Key Wrap Specification, AESKW, TDKW, and AKW1 are intended to maintain confidentiality under [[adaptive chosen ciphertext attack]]s, while the AKW2 algorithm is designed to be secure only under known-plaintext (or weaker) attacks. (The stated goal of AKW2 is for use in legacy systems and computationally limited devices where use of the other algorithms would be impractical.) AESKW, TDKW and AKW2 also provide the ability to authenticate cleartext &amp;quot;header&amp;quot;, an associated block of data that is not encrypted.&lt;br /&gt;
&lt;br /&gt;
[[Phillip Rogaway|Rogaway]] and Shrimpton evaluated the design of the ANSX9.102 algorithms with respect to the stated security goals. Among their general findings, they noted the lack of clearly stated design goals for the algorithms, and the absence of security proofs for all constructions.&lt;br /&gt;
&lt;br /&gt;
In their paper, [[Phillip Rogaway|Rogaway]] and Shrimpton proposed a provable key-wrapping algorithm (SIV—the Synthetic Initialization Vector mode) that authenticates and encrypts an arbitrary string and authenticates, &lt;br /&gt;
but does not encrypt, additional data which can be bound into the wrapped key. This has been standardized as a &lt;br /&gt;
new AES mode in RFC 5297.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Authenticated encryption]]&lt;br /&gt;
* [[Deterministic encryption]]&lt;br /&gt;
* [[Key management]]&lt;br /&gt;
* [[Offline private key protocol]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptographic algorithms]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>