On Mon, 2 Nov 2015 22:52:59 +0900
Yoshiaki Hori <hor...@cc.saga-u.ac.jp> wrote:

> Name:           draft-kiyomoto-kcipher2-tls
> Revision:       02
> Title:          Use of KCipher-2 with Poly1305 in Transport Layer

I feel I've written almost the same on multiple occassions lately, but
I'll do it again:

I think one of the major problems of TLS (and other crypto) in the past
has been that it has grown to be too complicated. I'm therefore
strictly against adding new options without any reasonable rationale
behind them.

The rationale here seems to be "let's have another algorithm just in
case". That "just in case" here is that if chacha20 turns out to be
insecure we don't have another streamcipher. However we'd of course
still have AES-GCM.

I think TLS has suffered a lot in the past from feature bloat. I'd
propose to go the other way: Lower the number of options if they don't
make sense.

Therefore: Please don't introduce another algorithm into TLS - unless
you have very good arguments (i.e. it is vastly better than the other
options or you have serious arguments why you think AES-GCM and
chacha20/poly1305 are in danger of being real-world-broken any time
soon).

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: BBB51E42

Attachment: pgpyXsPnjb0bl.pgp
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to