Software keys are very commonly used, so claiming "typically" a hardware device is used is saying too much.

However, if a hardware device is used, the delineation of what the hardware device does and doesn't do heavily impacts the architecture.
This commit is contained in:
Heiko Schaefer 2023-11-30 23:27:00 +01:00
parent e4733eeb6c
commit 552e32f9f0
No known key found for this signature in database
GPG key ID: DAE9A9050FCCF1EB

View file

@ -168,7 +168,7 @@ When implementing a keystore based on hardware cryptographic devices like [OpenP
- **supplementary layer**: performs additional cryptographic operations that don't directly use the private key material, such as [AES key wrap](https://www.rfc-editor.org/rfc/rfc3394.html) for ECDH.
```{note}
The decryption process using ECC algorithms, especially ECDH, has multiple steps. The initial step, typically performed by devices such as OpenPGP cards, directly uses private key material to produce a "shared secret." Following this, operations like ["AES key unwrap"](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-ec-dh-algorithm-ecdh) are conducted in software outside the hardware device.
The decryption process using ECC algorithms, especially ECDH, has multiple steps. The initial step, potentially performed by devices such as OpenPGP cards, directly uses private key material to produce a "shared secret." Following this, operations like ["AES key unwrap"](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-ec-dh-algorithm-ecdh) are conducted in software outside the hardware device.
Further details on this process can be found in the "Advanced Encryption Standard (AES) Key Wrap Algorithm" [RFC 3394](https://www.rfc-editor.org/rfc/rfc3394.html).
```