If we’re going to get into the cryptanalysis of SPECK then this thread should 
move off the TLS list and possibly to the CFRG list.

spt

> On Mar 21, 2016, at 10:07, Efthymios Iosifides <iosifid...@gmail.com> wrote:
> 
> >I don't see any compelling argument for the inclusion of SPECK? Not only 
> >would the affiliation with NSA give the >TLS-WG a bad rep. in the public, 
> >more importantly, it makes one of our main problems worse: combinatorial 
> >explosion >of possible cipher-suites in TLS. This problem is so bad that it 
> >needs multiple blog posts, an effort by Mozilla and >bettercrypto.org to get 
> >sys-admins to configure their services.
> 
> 
> Hi all.
> 
> The reputation aspect is not necessarily and strictly correlated with it's 
> provenance, but with it's actual security and performance. And the SPECK we 
> shall note that performs quite well. Also we shall not forget that even the 
> infamous AES has been approved by the NSA before the widespread use of it. In 
> any case i wouldn't like for us to stand on the popular press. On the other 
> hand we shall evaluate if the SPECK could be actually used. For example, the 
> fact that it lacks extensive cryptanalysis is a serious argument for not 
> using it today, but what about the future specifications. On top to that what 
> if we could prove that the SPECK can have better performance than other algos 
> without sacrificing the security. 
> 
> 
> BRs,
> Efthimios Iosifides
> 
> 2016-03-18 19:49 GMT+02:00 Aaron Zauner <a...@azet.org>:
> Hi,
> 
> > On 17 Mar 2016, at 07:35, Efthymios Iosifides <iosifid...@gmail.com> wrote:
> >
> > Hello all.
> >
> > I have just found on the ietf archives an email discussion about the 
> > inclusion of the SPECK Cipher
> > in the tls standards.
> > It's reference is below 
> > :https://www.ietf.org/mail-archive/web/tls/current/msg13824.html
> >
> > Even though that this cipher originates from the NSA one cannot find a 
> > whitepaper that describes it's full cryptanalysis. In the above discussion 
> > Mr. Strömbergson somehow perfunctorily presents two whitepapers that 
> > describe the SPECK's cryptanalysis. Although we shall keep in mind that 
> > these papers describe a limited round cryptanalysis. Also we shall not 
> > forget that a similar cryptanalysis has taken place for the famous AES. 
> > Therefore i personally do not see any actual arguments apart from the facts 
> > that concerns the algorithm's  provenance for not including it in a future 
> > tls specification. In conclusion even by this day the SPECK cipher has not 
> > been yet fully cryptanalyzed succesfully.
> 
> I don't see any compelling argument for the inclusion of SPECK? Not only 
> would the affiliation with NSA give the TLS-WG a bad rep. in the public, more 
> importantly, it makes one of our main problems worse: combinatorial explosion 
> of possible cipher-suites in TLS. This problem is so bad that it needs 
> multiple blog posts, an effort by Mozilla and bettercrypto.org to get 
> sys-admins to configure their services.
> 
> Aaron
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to