Within this line of thought, an unlimited-key-use-diediedie would have far more 
value. An RFC precisely defining a set of key data limits would address both 
this 3DES issue as well as AES and any other cipher. As cited on 
https://sweet32.info/ , data limits is a primary way Mozilla is dealing with 
this attack.


Dave


On Monday, August 29, 2016 09:26:18 am Rene Struik wrote:
> I think it is a mistake to think that simply using block ciphers with a 
> larger block size is enough to counter attacks, as the literature on 
> successful side channel attacks on such block cipher demonstrates. The 
> real message is that one should not reuse keys ad infinitum, which 
> unfortunately seems hard to sink in.
> 
> Singling out 3-DES in this respect does not seem to tackle the real 
> issue (which is a system security issue often only paid lip service to 
> in practice).
> 
> Rene
> 
> On 8/29/2016 8:56 AM, Joachim Strömbergson wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA256
> >
> > Aloha!
> >
> > As a side note, there has been a bunch of lightweight block ciphers
> > suggested the last few years, most of them with a block size of 64 bits.
> > And there has been discussion on IETF maillists about IETF accepting
> > them. For example the SIMON and SPECK ciphers. These ciphers can have
> > block sizes as small as 32 bits.
> >
> > https://www.cryptolux.org/images/a/a0/Beaulieu-DAC2015.pdf
> > https://eprint.iacr.org/2015/209.pdf
> >
> > Yours
> > JoachimS
> >
> >
> >
> > David McGrew (mcgrew) wrote:
> >> Hi Peter,
> >>
> >> You make a bunch of good points.   But it is also worth noting that
> >> some people feel that current crypto standards, including IETF
> >> standards, are suitable for IoT.   See for instance slides 8 and 9 of
> >> Daniel Shumow's talk at NIST’s LWC workshop last year:
> >> http://csrc.nist.gov/groups/ST/lwc-workshop2015/presentations/session4-shumow.pdf
> >> Also, CoAP isn’t on his list, but it could be, and it uses DTLS.   So
> >> while I agree with you that overuse of a 64-bit block cipher is far
> >> from the biggest security concern for IoT, the IETF should expect its
> >> protocols to be used in some IoT scenarios.
> >>
> >> The malleability of the term IoT is causing trouble here.   Slide 6
> >> of Daniel’s talk is quite revealing.  To my thinking, by definition
> >> IoT devices are connected to the Internet in some way.
> >>
> >> David
> >>
> >>
> >>
> >> On 8/28/16, 8:01 AM, "Peter Gutmann" <pgut...@cs.auckland.ac.nz>
> >> wrote:
> >>
> >>> David McGrew (mcgrew) <mcg...@cisco.com> writes:
> >>>
> >>>> I don’t think you understood my point. IoT is about small devices
> >>>> connecting to the Internet, and IETF standards should expect
> >>>> designed-for-IoT crypto to be increasingly in scope.  It is
> >>>> important to not forget about these devices, amidst the current
> >>>> attention being paid to misuses of 64-bit block ciphers, which
> >>>> was the ultimate cause of this mail thread.
> >>> But the IETF has a long history of creating standards that
> >>> completely ignore IoT.  I can't think of a single general-purpose
> >>> IETF security standard (TLS, SSH, IPsec, etc) that has any hope of
> >>> working with IoT devices (say a 40Mhz ARM-core ASIC with 32kB RAM
> >>> and 64kB flash).  This is why the ITU/IEC and a million
> >>> lesser-known standards bodies are all busy inventing their own
> >>> exquisitely homebrew crypto protocols, most of which make WEP look
> >>> like a model of good design.
> >>>
> >>> (I've always wanted to sit down and design a generic "encrypted
> >>> pipe from A to B using minimal resources" spec, and I'm sure many
> >>> other people have had the same thought at one time or another).
> >>>
> >>> So it seems like you've got:
> >>>
> >>> - The "TLS = the web" crowd (browser vendors and the like) who will
> >>> implement whatever's trendy at the moment and assume everyone has a
> >>> quad-core 2GHz CPU with gigabytes of RAM and access to weekly live
> >>> updates and hotfixes.
> >>>
> >>> - Embedded/SCADA folks who need to deal with 10-15 year product
> >>> cycles (see my TLS-LTS draft for more on this) and are kind of
> >>> stuck.
> >>>
> >>> - IoT people, who can't use any standard protocol and will get the
> >>> least unqualified person on staff to invent something that seems OK
> >>> to them.
> >>>
> >>> I'm not sure that a draft on theoretical weaknesses in 64-bit block
> >>> ciphers is going to affect any of those...

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to