On Tue, May 24, 2016 at 12:00 PM, Dang, Quynh (Fed) <quynh.d...@nist.gov>
wrote:

>
>
> On 5/24/16, 2:42 PM, "Martin Thomson" <martin.thom...@gmail.com> wrote:
>
> >On 24 May 2016 at 10:46, Dang, Quynh (Fed) <quynh.d...@nist.gov> wrote:
> >>>We discussed this at quite some length.  I originally took your
> >>>position, but the IVs add an extra layer of safety at very little
> >>>cost.
> >>
> >> I don¹t see any extra layer here.
> >
> >
> >The argument here is that there are only 2^128 keys and some protocols
> >have predictable plaintext.  A predictable nonce would allow an
> >attacker to do some pre-calculation with a large number of keys to get
> >a chance of a collision (and a break).  It's a long bow, but not
> >entirely implausible.
>
> Ciphers use nonces are designed/proved to be secure when nonces are
> predictable: nonces are not random values.
>

I think you may be misunderstanding. There is a time/space tradeoff here
when the
nonces are predictable that does not exist when they are random. This is
not a
vulnerability in the cipher and applies even if the keystream generator at
the core
of the cipher is PRF_k(nonce).

-Ekr


> >
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to