Hey Martin,

You're right, this analysis works for any block cipher with 128 bit output that is "good enough" (a pseudorandom permutation), and so for all versions of AES regardless of the key size. Determining the appropriate key size for the block cipher relies on accounting for possible attacks against the block cipher itself, and estimating the computational power of the adversaries you want to protect against.

You could also use formula (7) to recompute the bounds with a different block size (e.g. 64 bits).

Atul

On 2016-04-29 05:40, Martin Thomson wrote:
On 9 March 2016 at 09:16, aluykx <atul.lu...@esat.kuleuven.be> wrote:
Kenny Paterson and I prepared a document providing an overview of how much data ChaCha20+Poly1305 and AES-GCM can process with a single key. Besides summarizing the results, the document also gives an explanation of why the limits are there. The document confirms the analysis done by Watson and others in the thread on "Data Volume Limits", but goes into more detail.

Hi Atul,

Just to confirm, but this analysis is for all variants of AES-GCM
regardless of key size?  From formula (7) it shows that attack
probability is directly a function of block size and the number of
blocks.

--Martin

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to