To be clear, this probability is that an attacker would be able to
take a huge (4+ Petabyte) ciphertext, and a compatibly sized potential
(but incorrect) plaintext, and with probability 2^{-32}, be able to
determine that this plaintext was not the one used for the ciphertext
(and with probability 0.999999999767..., know nothing about whether
his guessed plaintext was correct or not).
You need to be careful when making such claims. There are schemes for
which when you reach the birthday bound you can perform partial key
recovery.
The probabilities we calculated guarantee that there won't be any
attacks (with the usual assumptions...). Beyond the bounds, there are no
guarantees. In particular, you cannot conclude that one, for example,
loses 1 bit of security once beyond the birthday bound.
Atul
On 2016-07-12 20:06, Scott Fluhrer (sfluhrer) wrote:
-----Original Message-----
From: Paterson, Kenny [mailto:kenny.pater...@rhul.ac.uk]
Sent: Tuesday, July 12, 2016 1:17 PM
To: Dang, Quynh (Fed); Scott Fluhrer (sfluhrer); Eric Rescorla;
tls@ietf.org
Subject: Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt
Hi
On 12/07/2016 18:04, "Dang, Quynh (Fed)" <quynh.d...@nist.gov> wrote:
>Hi Kenny,
>
>On 7/12/16, 12:33 PM, "Paterson, Kenny" <kenny.pater...@rhul.ac.uk>
wrote:
>
>>Finally, you write "to come to the 2^38 record limit, they assume that
>>each record is the maximum 2^14 bytes". For clarity, we did not
>>recommend a limit of 2^38 records. That's Quynh's preferred number,
>>and is unsupported by our analysis.
>
>What is problem with my suggestion even with the record size being the
>maximum value?
There may be no problem with your suggestion. I was simply trying to
make it
clear that 2^38 records was your suggestion for the record limit and
not ours.
Indeed, if one reads our note carefully, one will find that we do not
make any
specific recommendations. We consider the decision to be one for the
WG;
our preferred role is to supply the analysis and help interpret it if
people
want that. Part of that involves correcting possible misconceptions
and
misinterpretations before they get out of hand.
Now 2^38 does come out of our analysis if you are willing to accept
single key
attack security (in the indistinguishability sense) of 2^{-32}. So in
that limited
sense, 2^38 is supported by our analysis. But it is not our
recommendation.
But, speaking now in a personal capacity, I consider that security
margin to be
too small (i.e. I think that 2^{-32} is too big a success
probability).
To be clear, this probability is that an attacker would be able to
take a huge (4+ Petabyte) ciphertext, and a compatibly sized potential
(but incorrect) plaintext, and with probability 2^{-32}, be able to
determine that this plaintext was not the one used for the ciphertext
(and with probability 0.999999999767..., know nothing about whether
his guessed plaintext was correct or not).
I'm just trying to get people to understand what we're talking about.
This is not "with probability 2^{-32}, he can recover the plaintext"
Regards,
Kenny
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls