On Tue, May 24, 2016 at 12:00 PM, Dang, Quynh (Fed) <quynh.d...@nist.gov> wrote:
> > > On 5/24/16, 2:42 PM, "Martin Thomson" <martin.thom...@gmail.com> wrote: > > >On 24 May 2016 at 10:46, Dang, Quynh (Fed) <quynh.d...@nist.gov> wrote: > >>>We discussed this at quite some length. I originally took your > >>>position, but the IVs add an extra layer of safety at very little > >>>cost. > >> > >> I don¹t see any extra layer here. > > > > > >The argument here is that there are only 2^128 keys and some protocols > >have predictable plaintext. A predictable nonce would allow an > >attacker to do some pre-calculation with a large number of keys to get > >a chance of a collision (and a break). It's a long bow, but not > >entirely implausible. > > Ciphers use nonces are designed/proved to be secure when nonces are > predictable: nonces are not random values. > I think you may be misunderstanding. There is a time/space tradeoff here when the nonces are predictable that does not exist when they are random. This is not a vulnerability in the cipher and applies even if the keystream generator at the core of the cipher is PRF_k(nonce). -Ekr > > > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls