If that is what you are worried about, then that would make sense.

Quynh.
On May 24, 2016 4:23 PM, "Eric Rescorla" <e...@rtfm.com> wrote:

> No, a smaller computation (say 2^{64}) and then collecting 2^{40}
> connections all of which encipher the same plaintext (e.g., "GET /...")
>
> -Ekr
>
>
> On Tue, May 24, 2016 at 1:13 PM, Quynh Dang <quyn...@gmail.com> wrote:
>
>> Are you worried about 2^96 precomputation and the risk of 1/2^32 of
>> cracking your key?
>>
>> Quynh.
>> On May 24, 2016 3:05 PM, "Eric Rescorla" <e...@rtfm.com> wrote:
>>
>>>
>>>
>>> On Tue, May 24, 2016 at 12:00 PM, Dang, Quynh (Fed) <quynh.d...@nist.gov
>>> > wrote:
>>>
>>>>
>>>>
>>>> On 5/24/16, 2:42 PM, "Martin Thomson" <martin.thom...@gmail.com> wrote:
>>>>
>>>> >On 24 May 2016 at 10:46, Dang, Quynh (Fed) <quynh.d...@nist.gov>
>>>> wrote:
>>>> >>>We discussed this at quite some length.  I originally took your
>>>> >>>position, but the IVs add an extra layer of safety at very little
>>>> >>>cost.
>>>> >>
>>>> >> I don¹t see any extra layer here.
>>>> >
>>>> >
>>>> >The argument here is that there are only 2^128 keys and some protocols
>>>> >have predictable plaintext.  A predictable nonce would allow an
>>>> >attacker to do some pre-calculation with a large number of keys to get
>>>> >a chance of a collision (and a break).  It's a long bow, but not
>>>> >entirely implausible.
>>>>
>>>> Ciphers use nonces are designed/proved to be secure when nonces are
>>>> predictable: nonces are not random values.
>>>>
>>>
>>> I think you may be misunderstanding. There is a time/space tradeoff here
>>> when the
>>> nonces are predictable that does not exist when they are random. This is
>>> not a
>>> vulnerability in the cipher and applies even if the keystream generator
>>> at the core
>>> of the cipher is PRF_k(nonce).
>>>
>>> -Ekr
>>>
>>>
>>>> >
>>>>
>>>>
>>>
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls
>>>
>>>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to