Good morning Kenny, On 7/12/16, 3:03 PM, "Paterson, Kenny" <kenny.pater...@rhul.ac.uk> wrote:
>Hi, > >> On 12 Jul 2016, at 18:56, Dang, Quynh (Fed) <quynh.d...@nist.gov> wrote: >> >> Hi Kenny, >> >>> On 7/12/16, 1:39 PM, "Paterson, Kenny" <kenny.pater...@rhul.ac.uk> >>>wrote: >>> >>> Hi >>> >>>> On 12/07/2016 18:12, "Dang, Quynh (Fed)" <quynh.d...@nist.gov> wrote: >>>> >>>> Hi Kenny, >>>> >>>>> On 7/12/16, 1:05 PM, "Paterson, Kenny" <kenny.pater...@rhul.ac.uk> >>>>>wrote: >>>>> >>>>> Hi >>>>> >>>>>> On 12/07/2016 16:12, "Dang, Quynh (Fed)" <quynh.d...@nist.gov> >>>>>>wrote: >>>>>> >>>>>> Hi Kenny, >>>>>> >>>>>> I support the strongest indistinguishability notion mentioned in (*) >>>>>> above, but in my opinion we should provide good description to the >>>>>> users. >>>>> >>>>> OK, I think now we are at the heart of your argument. You support our >>>>> choice of security definition and method of analysis after all. >>>>> >>>>> And we can agree that good descriptions can only help. >>>>> >>>>>> That is why I support the limit around 2^38 records. >>>>> >>>>> I don't see how changing 2^24.5 (which is in the current draft) to >>>>>2^38 >>>>> provides a better description to users. >>>>> >>>>> Are you worried they won't know what a decimal in the exponent means? >>>>> >>>>> Or, more seriously, are you saying that 2^{-32} for single key >>>>>attacks >>>>> is >>>>> a big enough security margin? If so, can you say what that's based >>>>>on? >>>> >>>> It would not make sense to ask people to rekey unnecessarily. 1 in >>>>2^32 >>>> is >>>> 1 in 4,294,967,296 for the indistinguishability attack. >>> >>> I would agree that it does not make sense to ask TLS peers to rekey >>> unnecessarily. I also agree that 1 in 2^32 is >>> 1 in 4,294,967,296. Sure looks like a big, scary number, don't it? >>> >>> Are you then arguing that 2^{-32} for single key attacks is a big >>>enough >>> security margin because we want to avoid rekeying? >> >> Because it is safe therefore there are no needs to rekey. > >Could you define "safe", please? Safe for what? For whom? > >Again, why are you choosing 2^-32 for your security bound? Why not 2^-40 >or even 2^-24? What's your rationale? Is it just finger in the air, or do >you have a threat analysis, or ...? I said it is safe because the chance of 1 in 4,294,967,296 practically does not happen. I am not interested in talking about other numbers and other questions. >> I don¹t >> recommend to run another function/protocol when there are no needs for >>it. >> I don¹t see any particular reasons for mentioning single key in the >> indistinguishability attack here. >> > >Then please read a little further into the note that presents the >analysis: a conservative but generic approach dictates that, when the >attacker has multiple keys to attack, we should multiply the security >bounds by the number of target keys. > >A better analysis for AES-GCM may eventually be forthcoming but we don't >have it yet. > >>> Then do you have a >>> specific concern about the security of rekeying? I could see various >>>ways >>> in which it might go wrong if not designed carefully. >>> >>> Or are you directly linking a fundamental security question to an >>> operational one, by which I mean: are you saying we should trade >>>security >>> for avoiding the "cost" of rekeying for some notion of "cost"? If so, >>>can >>> you quantify the cost for the use cases that matter to you? > >I'd love to have your answer to these questions. I didn't see one yet. >What is the cost metric you're using and how does it quantity for your >use cases? Again, I am not interested in other questions. I suggested the number about 2^38 records because it is a safe data bound because Eric put in his tls 1.3 draft the number 2^24.5 which is unnecessarily small. Your paper is a nice one which gives users good information about choices. > >Cheers, > >Kenny > >>> >>> Cheers, >>> >>> Kenny >> >> Regards, >> Quynh. Regards, Quynh. >> >> >> >> _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls