> -----Original Message-----
> From: Michael Rossberg <michael.rossb...@tu-ilmenau.de>
> Sent: Wednesday, July 29, 2020 2:35 PM
> To: Scott Fluhrer (sfluhrer) <sfluh...@cisco.com>
> Cc: ipsecme mailing list <ipsec@ietf.org>
> Subject: Re: [IPsec] Teaser for pitch talk at IETF 108
> 
> >
> > Actually, it does add value from a crypto point of view, at least from a
> specific attack.  In a multitarget attack, that is, an attack where we assume
> that the attacker has encrypted packets from a large number of SAs, and his
> goal is to recover the keys for any one of the encrypted packets, here is what
> the attacker can do (assuming GCM or ChaCha20-Poly1305); if he has packet
> encrypted with each SA with the same nonce, he can guess a key, and
> generate the internal GCM/ChaCha20 keystream based on that key/nonce
> combination.  He can then scan through all the packets to see if the
> encryption makes sense (or the ICV tag works out); this can be done far
> faster than checking each packet individually.  Assuming the packets are
> encrypted with AES-128, and the attacker has packets from 2**L SAs, then
> against this attack, we have only 128-L bits of security.
> >
> > By including 32 bits of unpredictable values, we make this attack 4 billion
> times harder, and for AES-128, that would give us 160-L bits of security. This
> doesn't actually add any security against attacks against a single SA, and the
> salt doesn't actually need to be secret.
> 
> Thanks for clarification. I guess I have been thinking too SA centric.
> In fact we always discussed AES-256 only.
> 
> Do you agree that starting the window/sender IDs with random offsets
> would fix this weakness?

Yes, it would address this weakness.  On the other hand, with AES-256, you 
don't really need this anyways...

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to