Re: [Cfrg] I-D Action:draft-kiyomoto-kcipher2-02.txt

"Wook Shin" <wookshin@kddilabs.jp> Thu, 14 April 2011 00:42 UTC

Return-Path: <wookshin@kddilabs.jp>
X-Original-To: cfrg@ietfc.amsl.com
Delivered-To: cfrg@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id D423AE0741 for <cfrg@ietfc.amsl.com>; Wed, 13 Apr 2011 17:42:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.572
X-Spam-Level:
X-Spam-Status: No, score=-2.572 tagged_above=-999 required=5 tests=[AWL=0.027, BAYES_00=-2.599]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IGVx3LTdb0cA for <cfrg@ietfc.amsl.com>; Wed, 13 Apr 2011 17:42:17 -0700 (PDT)
Received: from mandala.kddilabs.jp (mandala.kddilabs.jp [IPv6:2001:200:601:12::16]) by ietfc.amsl.com (Postfix) with ESMTP id B5259E06DF for <cfrg@irtf.org>; Wed, 13 Apr 2011 17:42:16 -0700 (PDT)
Received: from localhost (mandala.kddilabs.jp [127.0.0.1]) by mandala.kddilabs.jp (Postfix) with ESMTP id 9F8191748236; Thu, 14 Apr 2011 09:42:13 +0900 (JST)
X-Virus-Scanned: amavisd-new at kddilabs.jp
Received: from mandala.kddilabs.jp ([127.0.0.1]) by localhost (mandala.kddilabs.jp [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oHYv0dMDIaHS; Thu, 14 Apr 2011 09:42:11 +0900 (JST)
Received: from ist.sec.kddilabs.jp (ist.sec.kddilabs.jp [IPv6:2001:200:601:d00:2e0:81ff:fe28:b57f]) by mandala.kddilabs.jp (Postfix) with ESMTP id E90A517480F3; Thu, 14 Apr 2011 09:42:11 +0900 (JST)
Received: from ohpato-t61.sec.kddilabs.jp by ist.sec.kddilabs.jp (8.14.1/8.12.11) with ESMTP id p3E0gMIM024812; Thu, 14 Apr 2011 09:42:25 +0900
Content-Type: text/plain; charset="utf-8"; format="flowed"; delsp="yes"
To: cfrg@irtf.org, Jim Schaad <ietf@augustcellars.com>, "Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com>
References: <20110413010001.17531.11616.idtracker@ietfc.amsl.com> <op.vtur72zepzjggh@ohpato-t61.sec.kddilabs.jp> <00a201cbf9b4$06bc8a00$14359e00$@augustcellars.com> <op.vtva9lw0pzjggh@ohpato-t61.sec.kddilabs.jp> <EE0C2F9E065E634B84FC3BE36CF8A4B2068A8BBF@xmb-sjc-23e.amer.cisco.com>
Date: Thu, 14 Apr 2011 09:42:10 +0900
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
From: Wook Shin <wookshin@kddilabs.jp>
Organization: KDDI
Message-ID: <op.vtwj8k1lpzjggh@ohpato-t61.sec.kddilabs.jp>
In-Reply-To: <EE0C2F9E065E634B84FC3BE36CF8A4B2068A8BBF@xmb-sjc-23e.amer.cisco.com>
User-Agent: Opera Mail/11.01 (Win32)
X-Antivirus: avast! (VPS 110413-1, 04/14/2011), Outbound message
X-Antivirus-Status: Clean
Subject: Re: [Cfrg] I-D Action:draft-kiyomoto-kcipher2-02.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2011 00:42:19 -0000

Scott,

Oops, I was wrong about the location of the right parenthesis in
my previous message. It is (as described in the draft)

SubK2((IK[3] <<32 8) XOR (IK[3] >>32 24)) XOR (0x01, 0x00, 0x00, 0x00);

and that means (as it is written in the above)

   (1) IK[3] gets left-shifted by 8 bits
   (2) IK[3] gets right-shifted by 24 bits
   (3) call SubK2() by giving "(1) XOR (2)" as its input
       and the result will be XOR-ed with 0x01000000

not
>>   (1) IK[3] gets left-shifted by 8 bits
>>   (2) IK[3] gets right-shifted by 24 bits
>>   (3) call SubK2() by giving "(1) XOR (2) XOR 0x01000000"
>>       as the input parameter

Sorry for the confusions.

Wook




On Wed, 13 Apr 2011 23:30:35 +0900, Scott Fluhrer (sfluhrer)  
<sfluhrer@cisco.com> wrote:

>
>
>> -----Original Message-----
>> From: cfrg-bounces@irtf.org [mailto:cfrg-bounces@irtf.org] On Behalf
> Of
>> Wook Shin
>> Sent: Wednesday, April 13, 2011 4:31 AM
>> To: cfrg@irtf.org; Jim Schaad
>> Subject: Re: [Cfrg] I-D Action:draft-kiyomoto-kcipher2-02.txt
>>
>> Jim,
>>
>> That's my mistake. I think I made that mistake while converting
>> circular shift operations to the combination of XOR and
>> non-circular shit operations.
>>
>> The notation in Section 2.1 should be corrected to
>>
>>    <<n t     t-bit left shift in an n-bit register
>>    >>n t     t-bit right shift in an n-bit register
>>
>> and then, the code
>>
>>    SubK2((IK[3] <<32 8) XOR (IK[3] >>32 24))
>>      XOR (0x01, 0x00, 0x00, 0x00);
>>
>> should mean that
>>
>>   (1) IK[3] gets left-shifted by 8 bits
>>   (2) IK[3] gets right-shifted by 24 bits
>>   (3) call SubK2() by giving "(1) XOR (2) XOR 0x01000000"
>>       as the input parameter
>
> If that's what you meant, well, that's a really odd notation.
> Typically, where someone writes:
>     Func(A) op B
> They usually mean:
>    - Give the value A to function Func, then take the result, and use it
> to perform the operation with B.
>
> A more conventional way of writing what you said you meant would be:
>
>     SubK2((IK[3] <<32 8) XOR (IK[3] >>32 24) XOR
>                             (0x01, 0x00, 0x00, 0x00));
>
> So, did you mean what you wrote, or did you mean what you said you
> meant?
>
>>
>> Best regards,
>>
>> Wook
>>
>>
>>
>>
>> On Wed, 13 Apr 2011 17:23:10 +0900, Jim Schaad
> <ietf@augustcellars.com>
>> wrote:
>>
>> > You have a notation that is leaving me puzzled.
>> >
>> > In section 2.1 you say
>> >
>> >      <<n   Left circular rotation by n bits
>> >
>> >       >>n   Right circular rotation by n bits
>> >
>> > Which makes sense.
>> >
>> > However in section 2.3.2 you use the notation
>> >
>> >            SubK2((IK[3] <<32 8) XOR (IK[3] >>32 24)) XOR
>> >             (0x01, 0x00, 0x00, 0x00);
>> >
>> > Which is not covered by the above.
>> >
>> > Additionally I wonder if you mean to use IK[3] in both locations
> here
>> as
>> > (I think)
>> >
>> > (IK[3] << 8) XOR (IK[3] >> 24) ---> (IK[3] << 8) XOR (IK[3] << (32-
>> 24))
>> > --> (IK[3] << 8) XOR (IK[3] << 8)
>> >
>> > jim
>> >
>> >> -----Original Message-----
>> >> From: Wook Shin [mailto:wookshin@kddilabs.jp]
>> >> Sent: Tuesday, April 12, 2011 6:39 PM
>> >> To: cfrg@irtf.org
>> >> Subject: Re: I-D Action:draft-kiyomoto-kcipher2-02.txt
>> >>
>> >> Hello all,
>> >>
>> >> I've revised our previous draft that explains the KCipher-2 stream
>> >> cipher.
>> >> The current version includes some code snippets written in the C
>> >> language
>> >> syntax, so that it could help implementers get clearer idea of how
>> it
>> >> works
>> >> and help them check their outputs with the test vectors mentioned
> in
>> the
>> >> draft.
>> >> The new version of the draft can be found at
>> >>    http://www.ietf.org/internet-drafts/draft-kiyomoto-kcipher2-
>> 02.txt
>> >>
>> >> I have attached a naive implementation of KCipher-2 written in C.
>> >> Two files, KCipher2.c and KCipher2.h, are in the attached .zip
> file,
>> >> and no
>> >> special option is required to compile and run the program.
>> >> The code snippets and the test vector running examples in the draft
>> are
>> >> from the the attached code.
>> >>
>> >> Please look at the new version of the draft and the code, and let
> me
>> >> have
>> >> your comments.
>> >>
>> >> Thank you,
>> >>
>> >> Wook
>>
>>
>> --
>> Wook Shin
>> Information Security Laboratory,
>> KDDI R&D Laboratories, Inc.
>> _______________________________________________
>> Cfrg mailing list
>> Cfrg@irtf.org
>> http://www.irtf.org/mailman/listinfo/cfrg


-- 
Wook Shin
Information Security Laboratory,
KDDI R&D Laboratories, Inc.