View Source NoNoncense (NoNoncense v0.0.2)
Generate globally unique nonces (number-only-used-once) in distributed Elixir.
The nonces are guaranteed to be unique if:
- machine IDs are unique for each node (
NoNoncense.MachineId.ConflictGuard
can help there) - individual machines maintain a somewhat accurate clock (specifically, the UTC clock has to have progressed between node restarts)
Usage
Note that NoNoncense
is not a GenServer. Instead it stores its initial state using :persistent_term
and its internal counter using :atomics
. Because :persistent_term
triggers a garbage collection cycle on writes, it is recommended to initialize your NoNoncense
instance(s) at application start, when there is hardly any garbage to collect.
# lib/my_app/application.ex
# generate a machine ID, start conflict guard and initialize a NoNoncense instance
defmodule MyApp.Application do
use Application
def start(_type, _args) do
machine_id = NoNoncense.MachineId.id!(node_list: [:"myapp@127.0.0.1"])
:ok = NoNoncense.init(machine_id: machine_id)
children =
[
# optional but recommended
{NoNoncense.MachineId.ConflictGuard, [machine_id: machine_id]}
]
opts = [strategy: :one_for_one, name: MyApp.Supervisor]
Supervisor.start_link(children, opts)
end
end
Then you can generate plain and encrypted nonces.
# generate nonces
iex> <<_::64>> = NoNoncense.nonce(64)
iex> <<_::96>> = NoNoncense.nonce(96)
iex> <<_::128>> = NoNoncense.nonce(128)
# generate encrypted nonces
iex> <<_::64>> = NoNoncense.encrypted_nonce(64, :crypto.strong_rand_bytes(24))
iex> <<_::96>> = NoNoncense.encrypted_nonce(96, :crypto.strong_rand_bytes(24))
iex> <<_::128>> = NoNoncense.encrypted_nonce(128, :crypto.strong_rand_bytes(32))
How it works
The first 42 bits are a millisecond-precision timestamp of the initialization time (allows for ~139 years of operation), relative to the NoNoncense epoch (2025-01-01 00:00:00 UTC) by default. The next 9 bits are the machine ID (allows for 512 machines). The remaining bits are a per-machine counter.
A counter overflow will trigger a timestamp increase by 1ms (the timestamp effectively functions as a cycle counter after initialization). The theoretical maximum sustained rate is 2^counter-bits nonces per millisecond per machine. For 64-bit nonces (with a 13-bit counter), that means 8192 nonces per millisecond per machine. Because the timestamp can't exceed the actual time (that would break the uniqueness guarantee), new nonce generation throttles if the nonce timestamp/counter catches up to the actual time. In practice, that will probably never happen, and nonces will be generated at a higher rate. For example, if the first nonce is generated 10 seconds after initialization, 10K milliseconds have been "saved up" to generate 80M 64-bit nonces at virtually unlimited rate. Benchmarking shows rates around 20M/s are attainable.
The design is inspired by Twitter's Snowflake IDs, although there are some differences, most notably in the timestamp which is not a message timestamp. Unlike Snowflake IDs, nonces are meant to be opaque, and not used for sorting.
Suitability of plain nonces for cryptography
The plain nonces produced by nonce/2
are technically suitable for cryptography as IVs for block cipher modes that permit use of a counter, like CTR, OFB, CCM, and GCM, and for streaming ciphers like ChaCha20. However, block cipher modes that require not just unique but also unpredictable IVs, like CBC and CFB, should use encrypted_nonce/2
(or random IVs).
A plain nonce's timestamp bits will leak the node initialization time, the machine ID, and the counter, and - with improbably high-rate 64-bit nonces - the nonce generation timestamp. If that is not acceptable, use encrypted_nonce/2
instead of the plain nonce functions.
Encrypted nonces
By encrypting a nonce, the timestamp, machine ID and message ordering information leak can be prevented. However, we wish to encrypt in a way that maintains the uniqueness guarantee of the plain input nonce. So 2^64 unique inputs should generate 2^64 unique outputs, same for the other sizes.
IETF has some wisdom to share on the topic of nonce encryption (in the context of ChaCha20 / Poly1305 nonces):
Counters and LFSRs are both acceptable ways of generating unique nonces, as is encrypting a counter using a block cipher with a 64-bit block size such as DES. Note that it is not acceptable to use a truncation of a counter encrypted with block ciphers with 128-bit or 256-bit blocks, because such a truncation may repeat after a short time.
There are some interesting things to unpick there. Why can't we use higher ciphers with a larger block size? As it turns out, block ciphers only generate unique outputs for inputs of at least their block size (128 bits for most modern ciphers, notably AES). For example, encrypting a 64-bit nonce with AES would produce a unique 128-bit ciphertext, but that ciphertext can't be reduced back to 64 bits without losing the uniqueness property. Sadly, this also holds for the streaming modes of these ciphers, which still use blocks internally to generate the keystream. That means we can just use AES256 ECB (we only encrypt one block) for 128-bit nonces.
128-bit encrypted nonces
We have "perfect" AES256-encrypted 128-bit nonces, each one unique and indistinguishable from random nonces, with no information leakage.
However, for 64-bit nonces we are limited to block ciphers with 64-bit block sizes. There are only a few of those in OTP's :crypto
module, namely DES, 3DES, and BlowFish. DES is broken and can merely be considered obfuscation at this point, despite the IETF quote (from 2018). BlowFish performs atrociously in the OTP implementation (~30 times worse than AES, dropping from ~1.8M ops/s to 60K ops/s) to the point where it can realistically form a bottleneck. 3DES seems like the least worst option, and practical attacks on it are mainly aimed at block collisions (within a message) which doesn't apply here. Still, it's old.
64-bit encrypted nonces
We have 3DES-encrypted 64-bit nonces, which is probably good enough.
For 96-bit nonces there are no block ciphers whatsoever to choose from. The best we can do while maintaining uniqueness is use a 64-bit cipher for the first 64 bits (hiding the timestamp) but leave the remaining 32 bits of the counter unencrypted and leaking info on message ordering.
There is an alternative. Ciphers that use 96-bit IVs (ChaCha20, GCM-mode block cipher) pre- or postfix an all-zero block counter. That means we can use a 64-bit encrypted nonce with an all-zero 64-bit counter (for example, for ChaCha20, prefix 64 zero bits to a 64-bit nonce). That way, at least the message counter part of the nonce is encrypted (and the block counter is not part of the nonce that is attached to the message).
96-bit encrypted nonces
If you really can't tolerate any information leakage through the nonce, you should not use encrypted nonces of 96 bits because the last 32 counter bits can't be encrypted. Consider using 64-bit nonces with a larger block counter complement instead.
Summary
Functions
Generate a new nonce and encrypt it. This creates an unpredictable but still unique nonce.
Initialize a nonce factory. Multiple instances with different names, epochs and even machine IDs are supported.
Generate a new 64/96/128-bits nonce.
Types
@type init_opts() :: [epoch: non_neg_integer(), name: atom()]
@type nonce() :: <<_::64>> | <<_::96>> | <<_::128>>
@type nonce_size() :: 64 | 96 | 128
Functions
@spec encrypted_nonce(atom(), nonce_size(), binary()) :: nonce()
Generate a new nonce and encrypt it. This creates an unpredictable but still unique nonce.
64/96 bits caveats
Be sure to read the docs of NoNoncense
for important caveats before deciding to use 64/96-bits encypted nonces.
@spec init(init_opts()) :: :ok
Initialize a nonce factory. Multiple instances with different names, epochs and even machine IDs are supported.
Options
:machine_id
- machine ID of the node:name
- The name of the nonce factory (default: module name).:epoch
- Override the configured epoch for this factory instance. Defaults to the NoNoncense epoch (2025-01-01 00:00:00Z).
Examples
iex> NoNoncense.init(machine_id: 1)
:ok
iex> NoNoncense.init(machine_id: 1, name: :custom, epoch: 1609459200000)
:ok
@spec nonce(atom(), nonce_size()) :: nonce()
Generate a new 64/96/128-bits nonce.
Examples
iex> nonce(64)
<<101, 6, 25, 181, 192, 128, 32, 17>>
iex> nonce(96)
<<101, 6, 25, 181, 192, 128, 32, 0, 0, 0, 0, 18>>
iex> nonce(128)
<<101, 6, 25, 181, 192, 128, 32, 0, 0, 0, 0, 0, 0, 0, 0, 19>>