Scott, thank you.  How dense of me!  Doubling the work effort is 
equivalent to adding one bit to the effective strength, not doubling the 
number of bits.


Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
"Scott Fluhrer" <sfluh...@cisco.com>
To:
Scott C Moonen/Raleigh/i...@ibmus, <ipsec@ietf.org>
Date:
06/29/2009 01:01 PM
Subject:
RE: [IPsec] guidelines for choice of D-H group



 

From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of 
Scott C Moonen
Sent: Monday, June 29, 2009 12:30 PM
To: ipsec@ietf.org
Subject: [IPsec] guidelines for choice of D-H group


RFCs 4753 and 5114 provide vague recommendations for choice of 
Diffie-Hellman group relative to symmetric key sizes.  They don't 
specifically address how to look at a set of chosen SA encryption and 
authentication algorithms and arrive at a choice of suitable 
Diffie-Hellman group, nor do they address the use of PFS.  So: 

1) For the IKE SA, the Diffie-Hellman operation generates two encryption 
and two authentication keys.  Should the Diffie-Hellman strength generally 
be equivalent to the longest key length, or to the sum of the key lengths? 
 If we sum up all four symmetric key lengths, most choices will exceed the 
strength provided by the currently available Diffie-Hellman groups.  But 
if we don't sum up the symmetric key lengths, then we are making 
Diffie-Hellman the weakest link in the chain (i.e., we aren't obtaining 
significant added value by generating different values for each of SK_ei, 
SK_er, SK_ai, SK_ar).  Which is the case? 
It's pointless to make it much stronger than the longest key, as each 
individual symmetric key can be attacked separately.
 
For example, suppose that SK_ei was an 128 bit AES key; the attacker could 
recover that key by finding a packet encrypted with that key, and do a 
trial decrypt based on successive keys, and stop when he finds a key that 
makes a plausible plaintext.  The important point is that he can do this 
without knowing what the other keys SK_er, SK_ai, SK_ar are, and so those 
other keys don't add to the security in this specific attack.
 
More generally, suppose the attacker is able to recover SK_ei with effort 
A (for example, if AES-128 is being used, and we're using brute force to 
recover the key, then A=2**127 decrypt operations expected), and similarly 
SK_er, SK_ai, SK_ar can be recovered with efforts B, C, D, then the time 
taken to recover all four is A+B+C+D, which is no more than 4 times the 
largest of the four (and this is assuming that the attacker is actually 
interested in all four, which is generally not the case).
  

1b) In any case, we don't have suitable Diffie-Hellman groups for use with 
HMAC-SHA2-384 and HMAC-SHA2-512.  Interestingly, the upcoming NIST and DoD 
standards push into the realm of 256-bit symmetric algorithms 
(HMAC-SHA2-256) with SHOULD+ or MUST, but for Diffie-Hellman only into the 
realm of 112 bits (NIST makes group 24 a MUST) or 128 bits (DoD makes 
group 19 a MUST).  Do the folks from DoD or NIST have any comments on this 
disparity? 

2) If we are recommending parity between symmetric algorithms and DH group 
choice, is there any place that we are also recommending the use of 
perfect forward secrecy to guard against weaknesses there?  Not using 
perfect forward secrecy goes even further to make the Diffie-Hellman the 
weakest link in the chain.  And yet RFC 4308 does not require PFS, and 
NIST's own RFC 4869 doesn't even mention it.  Do the folks from NIST have 
any comments on why PFS is not mandated, let alone mentioned, in RFC 4869? 


3) IKEv2 does not allow perfect forward secrecy for the first child SA. 
Similar to question 1 above, how does that play into the recommendation 
for DH group size to choose?  Admittedly, there probably isn't much lost 
if the IKE SA keys are compromised.  So should we look only at the child 
SA symmetric key sizes when considering what IKE SA DH group is 
appropriate?  Or should we sum up the IKE and child SA symmetric key 
lengths?  
Same answer to the last question: the IKE and the IPSec SA keys can be 
attacked separately, and so making the DH stronger than the longest 
individual key doesn't gain you anything from a security standpoint.
 
-- 
scott
 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to