Add a note to CHANGES indicating that AES-XTS now enforces two different
authorPauli <paul.dale@oracle.com>
Tue, 11 Sep 2018 22:42:15 +0000 (08:42 +1000)
committerPauli <paul.dale@oracle.com>
Tue, 11 Sep 2018 22:44:48 +0000 (08:44 +1000)
keys.

Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7120)

CHANGES

diff --git a/CHANGES b/CHANGES
index d5ed4227cb397717267dd70f2e629cc0ff2fe760..657f0cfb234dba6ca027e20c7d0e836280e605c7 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -9,7 +9,12 @@
 
  Changes between 1.1.1 and 1.1.2 [xx XXX xxxx]
 
-  *)
+  *) AES-XTS mode now enforces that its two keys are different to mitigate
+     the attacked described in "Efficient Instantiations of Tweakable
+     Blockciphers and Refinements to Modes OCB and PMAC" by Phillip Rogaway.
+     Details of this attack can be obtained from:
+     http://web.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf
+     [Paul Dale]
 
  Changes between 1.1.0i and 1.1.1 [11 Sep 2018]
 
   *) Add SM2 base algorithm support.
      [Jack Lloyd]
 
-  *) AES-XTS mode now enforces that its two keys are different to mitigate
-     the attacked described in "Efficient Instantiations of Tweakable
-     Blockciphers and Refinements to Modes OCB and PMAC" by Phillip Rogaway.
-     Details of this attack can be obtained from:
-     http://web.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf
-     [Paul Dale]
-
   *) s390x assembly pack: add (improved) hardware-support for the following
      cryptographic primitives: sha3, shake, aes-gcm, aes-ccm, aes-ctr, aes-ofb,
      aes-cfb/cfb8, aes-ecb.