Yo Hal!

On Sat, 02 Feb 2019 02:33:56 -0800
Hal Murray via devel <devel@ntpsec.org> wrote:

> The per client-server pair of keys, C2S and S2C don't roll over as
> long as the connection works reasonably well.  I asked about key
> lifetime on the NTP list and Daniel said we don't have to worry about
> it.
> https://mailarchive.ietf.org/arch/msg/ntp/lV74s2I97P8ncJdjsIKvlcAgEG0

The Germans thought that with Enigma.  The japanese thought that
with Purple.  Both were proven wrong.

Daniel makes bad assumptions about how many tries a second can be made.

> > The recommendation for AES-SIV is to encrypt no more than 2**48
> > messages under the same key. At one message per second that's
> > almost 9 million years. If you (unwisely) use AES-GCM instead,
> > where the recommended limit is 2**32 messages, that's still 136
> > years.  

Nothing says that a single cookie could not be used by a farm of
clients to push the cookies per second into the thousands.

Then add that this is millions of know plaintext and known ciphertext pairs
That is not what the key reuse calculations assume.

Yes, not a simple thing, but possible for a nation state.

So whatever a conservative key reuse limit is, it should be enforced.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgpfiTifNMhIw.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to