Re: [Cfrg] I-D Action: draft-irtf-cfrg-dragonfly-03.txt

Robert Ransom <rransom.8774@gmail.com> Tue, 04 February 2014 19:41 UTC

Return-Path: <rransom.8774@gmail.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56EFF1A0167 for <cfrg@ietfa.amsl.com>; Tue, 4 Feb 2014 11:41:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ar52Oyze8XwC for <cfrg@ietfa.amsl.com>; Tue, 4 Feb 2014 11:41:38 -0800 (PST)
Received: from mail-qa0-x235.google.com (mail-qa0-x235.google.com [IPv6:2607:f8b0:400d:c00::235]) by ietfa.amsl.com (Postfix) with ESMTP id 2176F1A0127 for <cfrg@ietf.org>; Tue, 4 Feb 2014 11:41:37 -0800 (PST)
Received: by mail-qa0-f53.google.com with SMTP id cm18so12763998qab.26 for <cfrg@ietf.org>; Tue, 04 Feb 2014 11:41:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=nW2l/2GnaLnui04SST2jWl1YQ0QmbHIEl5X13rXnKq4=; b=PotD+201a3AOuJDvTmDYeY7AOLCUkoU+XqFOaV0fqKPtrre4b6zxlhsLOszExfaWVQ 1+AQ8DuoU/KvsJgFKr+9hH6J2hJu/HIcaogznT3Hnp2laI1baG76YzTlt7j67bmQg0ML iAacqNGtoLW0nDdTbAis5qyS3qQ3chOETUAl8gLr+XOUE5ZHwZoF3KHu1NZZnSb3nwTx YYxD/RDw2OyTtX3V/nFj7m/D40cRLQ2IGD7MINbZpZLn43KYhvsIrLlXhpW6CdGCJq5K va9Ayr++dG9Cab/0mga+BFBzqovYPuNKQabZd/eyb+J3oBznjQBEB/8tLI1yg2KTcPib EYHw==
MIME-Version: 1.0
X-Received: by 10.224.129.138 with SMTP id o10mr69714309qas.13.1391542897430; Tue, 04 Feb 2014 11:41:37 -0800 (PST)
Received: by 10.140.86.42 with HTTP; Tue, 4 Feb 2014 11:41:37 -0800 (PST)
In-Reply-To: <75e1e853dc391b418062ee5e51adeb2f.squirrel@www.trepanning.net>
References: <20140203192451.6268.76511.idtracker@ietfa.amsl.com> <7af2f9df96e5867d493c614806235363.squirrel@www.trepanning.net> <CACsn0cm1f-P95je5AbEbZ02Ut3+HM7Hx28P6j46TqE-=06eZDg@mail.gmail.com> <52F00EF3.3040505@cisco.com> <CACsn0c=zS5GKex3eF_hKgTsL1kH=TiBi3iAP9oMrJ9hDQcT4Gw@mail.gmail.com> <7BAC95F5A7E67643AAFB2C31BEE662D018B81B7DE5@SC-VEXCH2.marvell.com> <CACsn0cn0TaHsDkyN2ewOorxxBzXivCg=QGR-ZnBiC3nJhvhpRg@mail.gmail.com> <14AB44E0-4C90-4E4C-A656-885A31CF4C02@checkpoint.com> <CACsn0cmDT-FAN8uMZ0w8TX6GKPAZjnrexLeFQd7QhRfoY6AGFQ@mail.gmail.com> <75e1e853dc391b418062ee5e51adeb2f.squirrel@www.trepanning.net>
Date: Tue, 04 Feb 2014 11:41:37 -0800
Message-ID: <CABqy+sr7ZKrACj4Ga2_75d9Kea0aKbrp2P5fWWu4YZP53zijxw@mail.gmail.com>
From: Robert Ransom <rransom.8774@gmail.com>
To: Dan Harkins <dharkins@lounge.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: cfrg@ietf.org, David McGrew <mcgrew@cisco.com>
Subject: Re: [Cfrg] I-D Action: draft-irtf-cfrg-dragonfly-03.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Feb 2014 19:41:39 -0000

On 2/4/14, Dan Harkins <dharkins@lounge.org> wrote:

>   This is mentioned in section 6.3 of RFC 5931 (dragonfly as an EAP
> method), knowledge of r where PE = r * G can enable a dictionary
> attack. But knowledge of r requires doing a discrete logarithm. A discrete
> logarithm is assumed to be "computationally infeasible" and you're talking
> about doing 2^40 of them!?!

<http://cr.yp.to/papers.html#nonuniform> is relevant here.  It
discusses several other ‘attacks’ of this general type, and explains
why they should not be taken seriously.


Robert Ransom