Re: [Cfrg] revised requirements for new curves

"Paterson, Kenny" <> Mon, 08 September 2014 15:14 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 222DB1A884D for <>; Mon, 8 Sep 2014 08:14:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id BKg9hPuT0OK7 for <>; Mon, 8 Sep 2014 08:14:53 -0700 (PDT)
Received: from ( []) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 6AD8F1A884B for <>; Mon, 8 Sep 2014 08:14:53 -0700 (PDT)
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1019.16; Mon, 8 Sep 2014 15:14:51 +0000
Received: from ([]) by ([]) with mapi id 15.00.1015.018; Mon, 8 Sep 2014 15:14:51 +0000
From: "Paterson, Kenny" <>
To: Phillip Hallam-Baker <>
Thread-Topic: [Cfrg] revised requirements for new curves
Thread-Index: AQHPy07l29iFHJb+W02/iURsgQFUO5v3T7UAgAAZqwA=
Date: Mon, 08 Sep 2014 15:14:51 +0000
Message-ID: <>
References: <> <>
In-Reply-To: <>
Accept-Language: en-GB, en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: []
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;UriScan:;
x-forefront-prvs: 03283976A6
x-forefront-antispam-report: SFV:NSPM; SFS:(6009001)(199003)(189002)(24454002)(479174003)(31966008)(79102001)(85306004)(46102001)(83506001)(110136001)(74662001)(74482001)(106356001)(77982001)(105586002)(101416001)(2656002)(85852003)(106116001)(20776003)(74502001)(76482001)(107046002)(83322001)(99396002)(19580395003)(19580405001)(76176999)(54356999)(21056001)(90102001)(92566001)(95666004)(87936001)(66066001)(83072002)(4396001)(86362001)(80022001)(92726001)(81342001)(81542001)(97736003)(36756003)(50986999); DIR:OUT; SFP:; SCL:1; SRVR:DBXPR03MB384;; FPR:; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "" <>
Subject: Re: [Cfrg] revised requirements for new curves
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 08 Sep 2014 15:14:55 -0000


You're correct, there was not consensus on this point. The whole
requirement is marked as [NC] on my list, meaning "no consensus". It's
true that I did not specifically call this aspect out as being "NC".

However, 192-bit security was in the initial request from TLS WG as an
option. I don't see why we can't also solve this problem too (but I'm
prepared to drop it if it looks like it will prevent us from making



On 08/09/2014 15:42, "Phillip Hallam-Baker" <> wrote:

>I didn't see consensus that we needed 192 bit curves.
>These seem superfluous to me If I want speed then I will go to 128
>bits. If I want high assurance I will go to 256. 192 is neither fish
>nor fowl.
>In a perfect world folk can make fine tuned choices between speed and
>security but I only have two security levels: paranoid and till the
>sun goes supernova secure level paranoid.