-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for ChaCha20-Poly1305 AEAD #1
Labels
Comments
@iarenaza Thanks Iñaki, the linked references are especially helpful 👍 PR welcome in case you or someone else felt like submitting one, otherwise I'll take a look at this myself next time I'm on batched Tempel work. |
iarenaza
added a commit
to iarenaza/tempel
that referenced
this issue
Dec 22, 2023
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 (https://openjdk.org/jeps/329). It is a very popular alternative to AES-GCM, due to its performance [1], and the fact that its used in a lot of security network protocols and tools[2]. [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; see https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (according to https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use) [Re: taoensso#1]
iarenaza
added a commit
to iarenaza/tempel
that referenced
this issue
Dec 31, 2023
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 (https://openjdk.org/jeps/329). It is a very popular alternative to AES-GCM, due to its performance [1], and the fact that its used in a lot of security network protocols and tools[2]. [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; see https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (according to https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use) [Re: taoensso#1]
ptaoussanis
added a commit
that referenced
this issue
Jan 4, 2024
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 [1]. It is a very popular alternative to AES-GCM, due to its performance [2], and the fact that its used in a lot of security network protocols and tools [3]. [1] https://openjdk.org/jeps/329 [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; see https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (according to https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use)
ptaoussanis
added a commit
that referenced
this issue
Jan 4, 2024
ptaoussanis
added a commit
that referenced
this issue
Jan 5, 2024
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 [1]. It is a very popular alternative to AES-GCM, due to its performance [2], and the fact that its used in a lot of security network protocols and tools [3]. [1] Ref. <https://openjdk.org/jeps/329> [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; Ref. <https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance> [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (Ref. <https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use>)
ptaoussanis
added a commit
that referenced
this issue
Jan 5, 2024
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 [1]. It is a very popular alternative to AES-GCM, due to its performance [2], and the fact that its used in a lot of security network protocols and tools [3]. [1] Ref. <https://openjdk.org/jeps/329> [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; Ref. <https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance> [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (Ref. <https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use>)
Closing, PR was merged manually 👍 |
ptaoussanis
added a commit
that referenced
this issue
Feb 1, 2024
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 [1]. It is a very popular alternative to AES-GCM, due to its performance [2], and the fact that its used in a lot of security network protocols and tools [3]. [1] https://openjdk.org/jeps/329 [1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; see https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance [2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (according to https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use)
ptaoussanis
added a commit
that referenced
this issue
Feb 1, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Support for ChaCha20-Poly1305 was added in JDK 11 in 2018 (https://openjdk.org/jeps/329). It's a very popular alternative to AES-GCM, due to its performance [1], and the fact that its used in a lot of security network protocols and tools[2].
[1] Faster than AEC-GCM without hardware AES acceleration, and similar or better performace in multi-core machines even with AES hardware acceleration; see https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Performance
[2] IPSec, TLS 1.2, DTLS 1.2, TLS 1.3, Wireguard, OTRv4 and multipe other protocols (according to https://en.wikipedia.org/wiki/ChaCha20-Poly1305#Use)
The text was updated successfully, but these errors were encountered: