doc/wg/cryptography/notes/cryptography-notes-2026-1-30.md
Date: 2025-12-12
Participants:
The working group reached consensus on exploring a major architectural pivot: moving software cryptography out of the kernel and into userspace shared libraries. This addresses the current complexity and circularity of kernel HILs while maintaining application portability. The group will now conduct a comparative code review of AES implementations across Pluton, OpenThread, and OpenTitan to inform the new HIL design.
| Task | Owner | Status |
|---|---|---|
| Prepare AES (GCM/CCM) code/constraints for comparative review | @reynoldsbd (Pluton) | New |
| Prepare AES (GCM/CCM) code/constraints for comparative review | @tyler-potyondy (OpenThread) | New |
| Prepare AES (GCM/CCM) code/constraints for comparative review | @pqcfox (OpenTitan) | New |
The current AES GCM implementation is broken, revealing a broader issue: Tock’s kernel crypto stacks have become overly complex and circular. Currently, HILs try to balance hardware acceleration with software fallbacks in the same layer, leading to kernel bloat and maintenance difficulty.
Shift software cryptography fallbacks to userspace shared libraries.
The group needs a representative problem set to test the new HIL design across different hardware paradigms (Pluton, OpenThread, and OpenTitan).
The group will focus its first deep dive on AES (GCM/CCM) modes.
AES shows the most significant variation in hardware support between chips. By comparing how Pluton, OpenThread, and OpenTitan handle AES, the group can design an HIL that captures varied constraints (like opaque keys or specific padding schemes) without over-engineering the interface.