Re: [Cfrg] Summary of the poll: Elliptic Curves - signature scheme: friendliness to low memory implementations (ends on June 3rd)

Adam Langley <agl@imperialviolet.org> Fri, 19 June 2015 21:53 UTC

Return-Path: <alangley@gmail.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED2A91B2AD6 for <cfrg@ietfa.amsl.com>; Fri, 19 Jun 2015 14:53:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Level:
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U9HFHsixLVDX for <cfrg@ietfa.amsl.com>; Fri, 19 Jun 2015 14:53:08 -0700 (PDT)
Received: from mail-lb0-x230.google.com (mail-lb0-x230.google.com [IPv6:2a00:1450:4010:c04::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 559031B2A9A for <cfrg@irtf.org>; Fri, 19 Jun 2015 14:53:08 -0700 (PDT)
Received: by lbbti3 with SMTP id ti3so79626295lbb.1 for <cfrg@irtf.org>; Fri, 19 Jun 2015 14:53:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=r67doMQAv7OGSwNGxKyujRYrys+UNko4Qlj4somm0zE=; b=Rtsvx4PPCd0vGyJNMXj5om+WDBeyiG0wP7WadS2wKl6Ox3zVSfE5envkgxQ1p0RkDl iXSDNUMurPxKL9qXOHUtGUKFZMryps4/prU8FZIhLMc/zruJ5AhsvgLxY1as8vbXhNi8 icuF2b6B0ln9cmWVVbytynp24MTZCuMRDxBUxJ6R4dJ6gVnYl70v+lpWVtugPHrF+lp9 WXNKgihFgu7hv1D2k4Arha3eaMokPk/DFalwzSxJ7cq9Vsur2/LjKqGATlnQL8mHNPWn XvvL5O2klg7h3Ms9OXuBT+7nabCyKnvKqVjZQLiVgHNhDbFcUQvpL+1y//homqXd1K3C yMxA==
MIME-Version: 1.0
X-Received: by 10.112.118.48 with SMTP id kj16mr19774979lbb.57.1434750786859; Fri, 19 Jun 2015 14:53:06 -0700 (PDT)
Sender: alangley@gmail.com
Received: by 10.112.89.69 with HTTP; Fri, 19 Jun 2015 14:53:06 -0700 (PDT)
In-Reply-To: <D1AA03C5.1AD55%uri@ll.mit.edu>
References: <557FEA01.7070207@isode.com> <557FE6E4.3040509@isode.com> <20150619062752.3506.qmail@cr.yp.to> <CAA4PzX3Toc+Ev6rp38rU73rinygxGPE7_FLXOWrRMh+N4SPyYQ@mail.gmail.com> <CAMfhd9Ua=fV_MKMfj1T8dApM6fA7Ko4y8-_uu03dd_WpmK4VvQ@mail.gmail.com> <D1AA03C5.1AD55%uri@ll.mit.edu>
Date: Fri, 19 Jun 2015 14:53:06 -0700
X-Google-Sender-Auth: fxIQlIFTHfrmP23A738gCSo9OM4
Message-ID: <CAMfhd9Vhdi64hA_U2oWF_Xmy-cSr59Bu2+7YEEwRg2b4EGkRPg@mail.gmail.com>
From: Adam Langley <agl@imperialviolet.org>
To: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/cfrg/p4nINPk2asg_WVnKKo8ZjI2kSa4>
Cc: "cfrg@irtf.org" <cfrg@irtf.org>
Subject: Re: [Cfrg] Summary of the poll: Elliptic Curves - signature scheme: friendliness to low memory implementations (ends on June 3rd)
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jun 2015 21:53:10 -0000

On Fri, Jun 19, 2015 at 2:40 PM, Blumenthal, Uri - 0553 - MITLL
<uri@ll.mit.edu> wrote:
> Good point. But doesn’t that imply the ability to create collisions in H()
> at will?

No, it's just a hash-cash problem: find x such that the first byte of
H(x) is one, and such that a couple of other bytes in H(x) have
certain values. Even if the hash function is perfect, trying 256
different values of x should give you one where H(x) starts with a
particular byte.


Cheers

AGL

-- 
Adam Langley agl@imperialviolet.org https://www.imperialviolet.org