IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: [psg.com #460] IESG - Transport - Oakley



[wg chair hat off].

We have to cope with a grab bag of algorithms at seemingly random
bit-strengths that don't necessarily fit together well if you try to
tune one to match the other.  I think that's the wrong attitude..

> What this means is that we should avoid selecting a cipher for which the 
> kex does not provide enough keying material.  

Reality check:

so, if the kex provides N bits, and you have a choice between a cipher
with keysize N/2 and keysize 2N, you would prefer the N/2-bit cipher
to running a 2N bit cipher with what is effectively a stretched N-bit
key?

The latter is obviously stronger against brute force attacks.  

> Or, more likely, we should avoid selecting a kex that does not
> provide enough keying material for the cipher we're going to use.
> Unfortunately, that would mean changing the algorithm selection
> rules, and I think it's too late to do that without a really good
> reason.

Going outside the scope of the IETF spec and deep into
quality-of-implementation space:

I'd rather see an application-level requirement for a specific
strength-in-bits.  If the kex generates enough bits, add it to the
acceptable list.  Likewise, if the symmetric algorithm is
N-bits-strong against all known attacks, add it to the list.

Then sort the lists by the performance metric of your choice
(throughput, latency, etc.,).  

						- Bill



Home | Main Index | Thread Index | Old Index