Hi,

> On 17 Mar 2016, at 07:35, Efthymios Iosifides <iosifid...@gmail.com> wrote:
> 
> Hello all.
> 
> I have just found on the ietf archives an email discussion about the 
> inclusion of the SPECK Cipher
> in the tls standards.
> It's reference is below 
> :https://www.ietf.org/mail-archive/web/tls/current/msg13824.html
> 
> Even though that this cipher originates from the NSA one cannot find a 
> whitepaper that describes it's full cryptanalysis. In the above discussion 
> Mr. Strömbergson somehow perfunctorily presents two whitepapers that describe 
> the SPECK's cryptanalysis. Although we shall keep in mind that these papers 
> describe a limited round cryptanalysis. Also we shall not forget that a 
> similar cryptanalysis has taken place for the famous AES. Therefore i 
> personally do not see any actual arguments apart from the facts that concerns 
> the algorithm's  provenance for not including it in a future tls 
> specification. In conclusion even by this day the SPECK cipher has not been 
> yet fully cryptanalyzed succesfully.
I don't see any compelling argument for the inclusion of SPECK? Not only would 
the affiliation with NSA give the TLS-WG a bad rep. in the public, more 
importantly, it makes one of our main problems worse: combinatorial explosion 
of possible cipher-suites in TLS. This problem is so bad that it needs multiple 
blog posts, an effort by Mozilla and bettercrypto.org to get sys-admins to 
configure their services.

Aaron

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to