Re: [Cfrg] RG Last Call on draft-irtf-cfrg-argon2-03

"Blocki, Jeremiah M" <> Tue, 17 July 2018 17:47 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 6EED2130DF3 for <>; Tue, 17 Jul 2018 10:47:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id cOWfbCSmxFu6 for <>; Tue, 17 Jul 2018 10:47:48 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 29588130EF4 for <>; Tue, 17 Jul 2018 10:47:48 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.51,366,1526356800"; d="scan'208,217";a="126286620"
Received: from ([]) by with ESMTP/TLS/AES256-SHA; 17 Jul 2018 13:47:46 -0400
Received: from wppexc07.purdue.lcl ( by wppexc12.purdue.lcl ( with Microsoft SMTP Server (TLS) id 15.0.1365.1; Tue, 17 Jul 2018 13:47:46 -0400
Received: from wppexc07.purdue.lcl ([fe80::49db:3fa0:d668:8da4]) by wppexc07.purdue.lcl ([fe80::49db:3fa0:d668:8da4%14]) with mapi id 15.00.1365.000; Tue, 17 Jul 2018 13:47:46 -0400
From: "Blocki, Jeremiah M" <>
To: "Stanislav V. Smyshlyaev" <>, Alexey Melnikov <>
CC: "" <>
Thread-Topic: [Cfrg] RG Last Call on draft-irtf-cfrg-argon2-03
Thread-Index: AQHTUMJLh6LErL0zF0W+x3tJECOinqN3X6qAgAEJ+QCBHN718A==
Date: Tue, 17 Jul 2018 17:47:46 +0000
Message-ID: <27206ace4d244c2abf8e92174f8f6fe8@wppexc07.purdue.lcl>
References: <> <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: []
Content-Type: multipart/alternative; boundary="_000_27206ace4d244c2abf8e92174f8f6fe8wppexc07purduelcl_"
MIME-Version: 1.0
Archived-At: <>
Subject: Re: [Cfrg] RG Last Call on draft-irtf-cfrg-argon2-03
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Crypto Forum Research Group <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 17 Jul 2018 17:47:52 -0000

I believe there is a minor typo at the bottom of page 4 ( which states

“The Argon2 operation is as follows.

1.    Establish H_0 as the 64-bit value as shown below.”

My understanding from looking over the source code is that H_0 is actually a 64-byte value (a 64bit value would likely introduce vulnerabilities to brute force precomputation attacks). Assuming that this is indeed a typo it is a minor nitpick, and I have no objections to publishing.

Best Regards,


From: Cfrg [] On Behalf Of Stanislav V. Smyshlyaev
Sent: Wednesday, January 17, 2018 1:23 AM
To: Alexey Melnikov <>
Subject: Re: [Cfrg] RG Last Call on draft-irtf-cfrg-argon2-03

Dear Alexey and CFRG participants,

I did a review of this document (of -02 version) in June; I had a number of minor concerns then. Those concerns have been addressed in -03 draft, I don't see any reasons to object this I-D being published as an RFC.
So I support publishing draft-irtf-cfrg-argon2-03 as an RFC.

Best regards,

2018-01-16 17:31 GMT+03:00 Alexey Melnikov <<>>:

On 29/10/2017 14:28, Alexey Melnikov wrote:
Dear CFRG participants,

This message starts 2 week RGLC on "The memory-hard Argon2 password hash and proof-of-work function " (draft-irtf-cfrg-argon2-03, <><>), that will end on November 12th. Please send you comments, as well as expression of support to publish as an RFC (or possible reasons for not doing so) in reply to this message or directly to CFRG chairs. Your feedback will help chairs to decide whether the document is ready for review by IRSG and subsequent publication as an RFC.
I only saw one private response with some questions (I will followup on it separately). Any objections to getting this published as an RFC?

Thank you,

Cfrg mailing list<>