Are you worried about 2^96 precomputation and the risk of 1/2^32 of
cracking your key?

Quynh.
On May 24, 2016 3:05 PM, "Eric Rescorla" <e...@rtfm.com> wrote:

>
>
> On Tue, May 24, 2016 at 12:00 PM, Dang, Quynh (Fed) <quynh.d...@nist.gov>
> wrote:
>
>>
>>
>> On 5/24/16, 2:42 PM, "Martin Thomson" <martin.thom...@gmail.com> wrote:
>>
>> >On 24 May 2016 at 10:46, Dang, Quynh (Fed) <quynh.d...@nist.gov> wrote:
>> >>>We discussed this at quite some length.  I originally took your
>> >>>position, but the IVs add an extra layer of safety at very little
>> >>>cost.
>> >>
>> >> I don¹t see any extra layer here.
>> >
>> >
>> >The argument here is that there are only 2^128 keys and some protocols
>> >have predictable plaintext.  A predictable nonce would allow an
>> >attacker to do some pre-calculation with a large number of keys to get
>> >a chance of a collision (and a break).  It's a long bow, but not
>> >entirely implausible.
>>
>> Ciphers use nonces are designed/proved to be secure when nonces are
>> predictable: nonces are not random values.
>>
>
> I think you may be misunderstanding. There is a time/space tradeoff here
> when the
> nonces are predictable that does not exist when they are random. This is
> not a
> vulnerability in the cipher and applies even if the keystream generator at
> the core
> of the cipher is PRF_k(nonce).
>
> -Ekr
>
>
>> >
>>
>>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to