On Sun, Oct 4, 2015 at 9:01 PM, Martin Thomson <martin.thom...@gmail.com> wrote:
> On 4 October 2015 at 19:26, Eric Rescorla <e...@rtfm.com> wrote: > > Consider the trivial case of ASCII text. Each character takes up the > > same amount of room, but if you compress (as an intuition pump, > > think of a simple Huffman code), then more common characters > > take up less room than less common characters. > > This is right, but it's also not the case that revealing information > like that is necessarily bad. I didn't say it was. But it's also leaking information that the encryption didn't, which is intended as a simple counterexample to Jeffrey's claim. HPACK for instance compresses base64-encoded data unevenly. But the > study that was run in 2013 determined that it wasn't especially > interesting. [32] shows ~2 bits regained from a 30 character word. Of > course, you should examine the conditions on that claim; such a result > is not generally applicable. Mixing attacker-controlled data with > secrets has shown to make protecting those secrets extremely > difficult. > Yes, if the attacker can provide their own data, it makes matters worse, but as the reference I provided indicated, there are potential security issues even if the attacker is not able to do so, provided that the data is sufficiently redundant. -Ekr
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls