Hi Tero,

Thanks for the comments. Please find below how I updated the text on my
local copy and let me know if that addresses your concerns.

Yours,
Daniel

On Fri, Oct 30, 2020 at 3:26 PM Tero Kivinen <kivi...@iki.fi> wrote:

> Daniel Migault writes:
> >    value SN needs to be considered instead.  Note that the limit of
> >    messages being sent is primary determined by the security associated
> >    to the key rather than the SN.  The security of the key used to
> >    encrypt decreases with the each message being sent and a node MUST
> >    ensure the limit is not reached - even though the SN would permit it.
> >    In a constrained environment, it is likely that the implementation of
> a
> >    rekey mechanism is preferred over the use of ESN.
>
> No. The security of the key does not decrease, but the ability for the
> attacker to attack the key might incrase, and the value of attacking
> that one key also increases when more data is encrypted with it. Also
> with short block length algorithms there were stricter limits of data
> that can be encrypted with one key.
>
<mglt>
Thanks. Here is the text I propose.
The security of all data protected under a given key decreases slightly
with each message and a node MUST ensure the limit is not reached - even
though the SN would permit it.
</mglt>

> --
> kivi...@iki.fi
>


-- 
Daniel Migault
Ericsson
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to