Re: [Cfrg] matching AES security
"D. J. Bernstein" <djb@cr.yp.to> Sat, 09 August 2014 01:38 UTC
Return-Path: <djb-dsn2-1406711340.7506@cr.yp.to>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6F011A035A for <cfrg@ietfa.amsl.com>; Fri, 8 Aug 2014 18:38:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.7
X-Spam-Level:
X-Spam-Status: No, score=-0.7 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, RCVD_IN_DNSWL_LOW=-0.7, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5nfeXEp7thmr for <cfrg@ietfa.amsl.com>; Fri, 8 Aug 2014 18:38:48 -0700 (PDT)
Received: from mace.cs.uic.edu (mace.cs.uic.edu [131.193.32.224]) by ietfa.amsl.com (Postfix) with SMTP id D82041A035C for <cfrg@irtf.org>; Fri, 8 Aug 2014 18:38:47 -0700 (PDT)
Received: (qmail 16949 invoked by uid 1011); 9 Aug 2014 01:38:46 -0000
Received: from unknown (unknown) by unknown with QMTP; 9 Aug 2014 01:38:46 -0000
Received: (qmail 13848 invoked by uid 1001); 9 Aug 2014 01:38:35 -0000
Date: Sat, 09 Aug 2014 01:38:35 -0000
Message-ID: <20140809013835.13846.qmail@cr.yp.to>
From: "D. J. Bernstein" <djb@cr.yp.to>
To: cfrg@irtf.org
Mail-Followup-To: cfrg@irtf.org
In-Reply-To: <CA+Vbu7wwSUOJgHmGZu3ii1sn9ZfmqsWUHimYVd3wNX=RgxbaBg@mail.gmail.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/cfrg/6Nq1C5uzns8RN-NZtzg911bAPxE
Subject: Re: [Cfrg] matching AES security
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Aug 2014 01:38:51 -0000
Benjamin Black writes: > The goal is matching security levels of the suite components as designed I understand that you have this goal. What I'm saying is that---never mind the disputes about whether this goal is appropriate---pairing AES-128 with 256-bit ECC is failing to achieve this goal. It isn't even close. Compared to the quantitative security level of 256-bit ECC, there are _huge_ and undisputed weaknesses in AES-128. Similar comments apply to AES-256 and 512-bit ECC. > AES is not the only symmetric cipher in use today and we can expect > new ciphers to supersede it during the service life of the new curves > under discussion. Replacing AES-128 with another 128-bit cipher, or replacing AES-256 with another 256-bit cipher, has no effect on my point here. Blumenthal, Uri - 0558 - MITLL writes: > "Multiple-key attacks" reference please? The central idea comes from Hellman's classic "Cryptanalytic time-memory trade-off". After Hellman there were many followup papers on improved algorithms that exploit multiple inputs ("time-memory-data tradeoffs"), reduce precomputation, reduce communication cost, reduce other overheads, etc. Public multiple-target attacks tend to use Oechslin's "rainbow tables", but attackers carrying out mass exploitation obtain lower cost from Rivest's "distinguished points". The word "tradeoff" turned out to be misleading in this context: a properly optimized multiple-target parallel machine using these ideas is fundamentally better for the attacker than any single-target machine can possibly be. http://cr.yp.to/snuffle/bruteforce-20050425.pdf contains a detailed cost evaluation and various references. Peter Gutmann writes: > a custom device with 2^42 bytes of memory and 2^32 keysearch engines > that required 2^36 inputs. That's 100 terabytes of RAM, 4 billion > keysearch engines, and around 70 billion sets of input data. > I'm not overly concerned. http://blog.cr.yp.to/20140602-saber.html shows how we put together a cluster from off-the-shelf components with around 1TB RAM and more than 100000 ALUs, each running at nearly 1GHz, for a total of just 50000 EUR. You're talking about 100x more RAM and 40000x more ALUs, raising the cost to about 2 billion EUR, but this is well within the supercomputing budget of some existing adversaries. At that scale it's also no problem to build application-specific chips. The attack parallelizes without trouble and has very low communication costs. As for "sets of input data": If you check what the paper actually says, you'll see that this example is targeting 1024 keys. The "inputs" are generated internally. Even for such a small number of keys, the effective security level of AES-128 drops from 2^128 to just 2^118. More importantly, RFC 7258 says The IETF community has expressed strong agreement that PM [pervasive monitoring] is an attack that needs to be mitigated where possible, via the design of protocols that make PM significantly more expensive or infeasible. Surely you're not arguing that 70 billion encryptions would be _infeasible_ (or even hard!) for this type of attacker to collect---and the security consequences seem to be something where IETF needs advice from IRTF, specifically CFRG. ECC doesn't have the same weakness. One way to think about this is that "random self-reduction" already turns one ECC target into many targets (see http://cr.yp.to/talks/2007.09.03-2/slides-djb-20070903-2-a4.pdf) producing square-root attacks; this is the reason that ECC keys are chosen to be larger than 128 bits in the first place. For the same reason, having more ECC targets doesn't improve the attacker's success chance---the attacker already had as many targets as desired---while having more AES targets makes an important difference in security level. Paul Lambert writes: > So, would this attack be mitigated by a change in algorithm mode? Sufficient input randomization would stop the basic AES attack---but it would also make the cryptography unnecessarily complex, unnecessarily hard to test, and unnecessarily error-prone, not to mention issues of randomness as a covert channel (see http://eprint.iacr.org/2014/438 and http://blog.cr.yp.to/20140205-entropy.html) performance problems, etc. Switching to a larger cipher key is almost certainly cheaper, and is clearly much more robust system engineering. More to the point, we _already have_ standard, widely deployed, provably secure cipher modes that provide predictable input blocks to ciphers (such as input block 0 in counter mode), and it's not as if these modes are going away. Anyone proposing AES-128 as part of a general-purpose "2^128 security" cipher suite is ignoring the undisputed fact that AES-128 used in these standard modes will leak some user keys to an attack costing vastly less than 2^128. Dan Brown writes: > It seems to me that even in the single-key setting, a 256-bit ECC key > fares better than a 128-bit AES key, because of the tradeoff between > computation and success rate. Correct. One reference for this success-rate comparison is http://cr.yp.to/talks/2005.09.19/slides.pdf particularly the last slide. This is also what I was alluding to when I mentioned "lucky attacks" in my CFRG slides. ---Dan
- [Cfrg] matching AES security D. J. Bernstein
- Re: [Cfrg] matching AES security Robert Moskowitz
- Re: [Cfrg] matching AES security Natanael
- Re: [Cfrg] matching AES security Tanja Lange
- Re: [Cfrg] matching AES security Paul Lambert
- Re: [Cfrg] matching AES security Benjamin Black
- Re: [Cfrg] matching AES security Blumenthal, Uri - 0558 - MITLL
- Re: [Cfrg] matching AES security Phillip Hallam-Baker
- Re: [Cfrg] matching AES security Watson Ladd
- Re: [Cfrg] matching AES security Blumenthal, Uri - 0558 - MITLL
- Re: [Cfrg] matching AES security Michael Hamburg
- Re: [Cfrg] matching AES security Andrey Jivsov
- Re: [Cfrg] matching AES security Andy Lutomirski
- Re: [Cfrg] matching AES security Andy Lutomirski
- Re: [Cfrg] matching AES security Michael Hamburg
- Re: [Cfrg] matching AES security Sandy Harris
- Re: [Cfrg] matching AES security James Cloos
- Re: [Cfrg] matching AES security Blumenthal, Uri - 0558 - MITLL
- Re: [Cfrg] matching AES security Nico Williams
- Re: [Cfrg] matching AES security Blumenthal, Uri - 0558 - MITLL
- Re: [Cfrg] matching AES security Phillip Hallam-Baker
- Re: [Cfrg] matching AES security Watson Ladd
- Re: [Cfrg] matching AES security Johannes Merkle
- Re: [Cfrg] matching AES security Robert Moskowitz
- Re: [Cfrg] matching AES security Brian Smith
- Re: [Cfrg] matching AES security Peter Gutmann
- Re: [Cfrg] matching AES security Andrey Jivsov
- Re: [Cfrg] matching AES security Watson Ladd
- Re: [Cfrg] matching AES security Alex Elsayed
- Re: [Cfrg] matching AES security Peter Gutmann
- Re: [Cfrg] matching AES security Alyssa Rowan
- Re: [Cfrg] matching AES security Phillip Hallam-Baker
- Re: [Cfrg] matching AES security Dan Brown
- Re: [Cfrg] matching AES security Dan Harkins
- Re: [Cfrg] matching AES security Ilari Liusvaara
- Re: [Cfrg] matching AES security D. J. Bernstein