On 2015-12-16 00:48, Eric Rescorla wrote:


On Tue, Dec 15, 2015 at 3:08 PM, Scott Fluhrer (sfluhrer)
<sfluh...@cisco.com <mailto:sfluh...@cisco.com>> wrote:
    The quadratic behavior in the security proofs are there for just
    about any block cipher mode, and is the reason why you want to stay
    well below the birthday bound.


The birthday bound here is 2^{64}, right?

-Ekr

       However, that's as true for (say) CBC mode as it is for GCM

Actually, no.

Using the sequence number as part of the effective nonce, means that it won't collide. There is no relevant bound for collisions in the nonces or in the CTR state, because they simply won't happen (unless there is an implementation flaw). There won't be any potentially exploitable collisions.

However, theoretically, the GHASH state might collide with a 2^{64} birthday bound. This possibility doesn't seem entirely relevant, though.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to