Re: [Cfrg] draft-housley-ccm-mode-00.txt

"Housley, Russ" <rhousley@rsasecurity.com> Fri, 16 August 2002 21:00 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA01080 for <cfrg-archive@odin.ietf.org>; Fri, 16 Aug 2002 17:00:42 -0400 (EDT)
Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28112 for cfrg-archive@odin.ietf.org; Fri, 16 Aug 2002 17:02:02 -0400 (EDT)
Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA26758; Fri, 16 Aug 2002 16:57:17 -0400 (EDT)
Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA26729 for <cfrg@optimus.ietf.org>; Fri, 16 Aug 2002 16:57:15 -0400 (EDT)
Received: from vulcan.rsasecurity.com (mail.rsasecurity.com [204.167.114.123]) by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA01010 for <cfrg@ietf.org>; Fri, 16 Aug 2002 16:55:54 -0400 (EDT)
Received: from no.name.available by vulcan.rsasecurity.com via smtpd (for odin.ietf.org [132.151.1.176]) with SMTP; 16 Aug 2002 20:57:15 UT
Received: from ebola.securitydynamics.com (ebola.securid.com [192.80.211.4]) by sdtihq24.securid.com (Pro-8.9.3/Pro-8.9.3) with ESMTP id QAA18026; Fri, 16 Aug 2002 16:56:44 -0400 (EDT)
Received: from exna00.securitydynamics.com (localhost [127.0.0.1]) by ebola.securitydynamics.com (8.10.2+Sun/8.10.2) with ESMTP id g7GKsW009757; Fri, 16 Aug 2002 16:54:32 -0400 (EDT)
Received: by exna00.securitydynamics.com with Internet Mail Service (5.5.2653.19) id <3TPV245D>; Fri, 16 Aug 2002 16:56:41 -0400
Received: from HOUSLEY-LAP.rsasecurity.com (HOUSLEY-LAP [10.3.9.17]) by exna00.securitydynamics.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id 3TPV24Z8; Fri, 16 Aug 2002 16:56:35 -0400
From: "Housley, Russ" <rhousley@rsasecurity.com>
To: David Wagner <daw@cs.berkeley.edu>
Cc: Ge.Weijers@Sun.COM, daw@mozart.cs.berkeley.edu, cfrg@ietf.org
Message-Id: <5.1.0.14.2.20020816163115.03520780@exna07.securitydynamics.com>
X-Sender: rhousley@exna07.securitydynamics.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 16 Aug 2002 16:33:16 -0400
Subject: Re: [Cfrg] draft-housley-ccm-mode-00.txt
In-Reply-To: <200208161707.g7GH7HO10814@mozart.cs.berkeley.edu>
References: <3D5D2D7A.1000508@sun.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Sender: cfrg-admin@ietf.org
Errors-To: cfrg-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id: Crypto Forum Research Group <cfrg.ietf.org>
X-BeenThere: cfrg@ietf.org

David:

This requires the implementation to compute the key schedules for two 
keys.  In low end devices, storing these key schedules consumes significant 
memory, or recomputing them consumes significant cycles.  Neither is 
desirable in such devices.

Russ

At 10:07 AM 8/16/2002 -0700, David Wagner wrote:
> > An advantage I can see is the use of the same key for both
> > authentication and encryption. [...] Using the same key
> > halves the key storage requirements for an 802.11 base station.
>
>It is easy to achieve the same thing with the standard generic
>composition.  You pick a 128-bit key, and derive the encryption and
>authentication keys separately using a PRF: Ke = F_K(0), Ka = F_K(1).
>This is all very standard, and is done in IPSec and TLS, for instance.
>So I don't see this as an advantage or an disadvantage.
>
>_______________________________________________
>Cfrg mailing list
>Cfrg@ietf.org
>https://www1.ietf.org/mailman/listinfo/cfrg

_______________________________________________
Cfrg mailing list
Cfrg@ietf.org
https://www1.ietf.org/mailman/listinfo/cfrg