It's worth noting that we considered a variant of this design initially
and then decided on the XOR design instead.

-Ekr


On Fri, Jun 2, 2017 at 4:20 PM, Adam Langley <a...@imperialviolet.org> wrote:

> On Fri, Jun 2, 2017 at 3:33 PM, Andrey Jivsov <cry...@brainhub.org> wrote:
>
>> The benefits are that the encryption layer doesn't need to deal with a
>> record number or its serialization, or the mask. The state is minimal.
>> The nonce update code is faster and smaller (e.g. 3 instructions on
>> x86_64).
>>
>> I would like to thank earlier reviewers. As part of these reviews
>> RFC7905 was brought up. I appreciate the desire not to update the
>> RFC7905, but this should not interfere with the WGLC, and it's a fairly
>> new stream cipher anyway.
>>
>
> If the encryption layer implements the standard interface[1] then it
> doesn't care about any of this anyway. Also, I'm not sure that it is any
> faster (the current scheme can be done in three x86-64 instructions
> too[2]), but any difference would be immeasurably tiny compared to the work
> of the AEAD itself.
>
> The overriding interest here is to avoid having yet another nonce format.
> RFC 7905 diverged from TLS 1.2 with the intent that it would align with TLS
> 1.3. There would have to be a significant reason to add more complexity.
>
> [1] https://tools.ietf.org/html/rfc5116#section-2.1
> [2] context struct addr in rax, seq number in rcx: leaq maskOffset(%rax),
> %rbx ; xorq (%rbx), %rcx ; movbeq %rcx, 4(%rdi)
>
>
> Cheers
>
> AGL
>
> --
> Adam Langley a...@imperialviolet.org https://www.imperialviolet.org
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to