Return-Path: <khovratovich@gmail.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 3CD121294CF
 for <cfrg@ietfa.amsl.com>; Mon, 27 Mar 2017 03:51:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.667
X-Spam-Level: 
X-Spam-Status: No, score=-1.667 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001,
 MISSING_HEADERS=1.021, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001,
 T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001]
 autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
 header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id z9Jr_Ziz8zXX for <cfrg@ietfa.amsl.com>;
 Mon, 27 Mar 2017 03:51:33 -0700 (PDT)
Received: from mail-yw0-x22b.google.com (mail-yw0-x22b.google.com
 [IPv6:2607:f8b0:4002:c05::22b])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id A531C12947B
 for <cfrg@ietf.org>; Mon, 27 Mar 2017 03:51:33 -0700 (PDT)
Received: by mail-yw0-x22b.google.com with SMTP id i203so28112480ywc.3
 for <cfrg@ietf.org>; Mon, 27 Mar 2017 03:51:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; 
 h=mime-version:in-reply-to:references:from:date:message-id:subject:cc; 
 bh=NwuXKerL/S7v5bXrqf16nGtfg7dLgJ9+XU2wKps3NNc=;
 b=SI9dM/WQOcdy5GzEr+IJW83QGw2CIJeYHXI7DOxEboYUkOIvzOrFP+oTRyE9JWcJgV
 7OKMJmj4mgDGC9pXaNKAqOYx6T1V20XqILp7p+01xLwCESRUaxVbs1ceuNKXMYEkBnyT
 y5wFSmEvTsfWnxIiD9jLZN8ap8oZJCWYRxWo87RnQojhcBkpyF8PewspbeIITdYIPEns
 9i1jdKqfUWXlsBFAV3s+GjSNDVUX42UzUZmDS6XUrPth1ihuLboTFSQmMih1aug/ALk/
 C2r2QtZsvwoI3Jsg4gbhcihEPh4U8g0A7X3nGzLbm6/POVguNAeHdsPSrQjO/EjE94ex
 dq5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:cc;
 bh=NwuXKerL/S7v5bXrqf16nGtfg7dLgJ9+XU2wKps3NNc=;
 b=ixhNnvI4STqie5MFbpppaN5Fx9PZ8sAAZeuwmCFpw2/T67eIVKcVsz0CqT6jRbbEAI
 iNXYQsgLnr/rAfr7izU/BqVWjiGXO++hks0pLc662+mOseNyjjOKsnyCxxaUQNEmntu0
 H/VopY3dYDcmvp849n6xefvogk6nZNJeQ5M0/DI8Utef2bzjulxPXlBB/UB8h7e4X7Tf
 2/JA0YF+z1CraJ4+vLk74HAN3DAcZl+Qck5nvd+jpp+7OhGZnIfs4PC/LfXeX2hZ84Mq
 lJuVl+CHcKK3AjDLBh3QlxZGiVhC+VaOCHnaKSH/9UE/aEYU6hdTPKFARiPQUAgwQOyH
 GU6A==
X-Gm-Message-State: AFeK/H367hS0A3khXqnuBWM1uxiXy+lpE7JnwH9KUVTEPPzA5NZXCOtkTH81aYCUNZ5bAhQxFFGOvxoyS3f7mA==
X-Received: by 10.37.80.208 with SMTP id e199mr15323015ybb.165.1490611892717; 
 Mon, 27 Mar 2017 03:51:32 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.83.67.5 with HTTP; Mon, 27 Mar 2017 03:51:17 -0700 (PDT)
In-Reply-To: <149061159741.30566.11599293166376872082@ietfa.amsl.com>
References: <149061159741.30566.11599293166376872082@ietfa.amsl.com>
From: Dmitry Khovratovich <khovratovich@gmail.com>
Date: Mon, 27 Mar 2017 12:51:17 +0200
Message-ID: <CALW8-7+BL5dLJiTh_yn_OD8pNNwLvEz5ZPhqK=-TfUH3xvohBg@mail.gmail.com>
Cc: cfrg@ietf.org
Content-Type: multipart/alternative; boundary=001a113ea1465d10b2054bb4201b
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/s1rytkhCoOwEXsFhr-vkaCsyc-4>
Subject: Re: [Cfrg] I-D Action: draft-irtf-cfrg-argon2-02.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>,
 <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>,
 <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Mar 2017 10:51:36 -0000

--001a113ea1465d10b2054bb4201b
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Some comments on a new draft:Variants

Argon2 fills M bytes of memory in T iterations over it, with M and T being
the parameters supplied to Argon2 and determining its performance. Speed on
a typical server is linear in the MT product.

The Argon2 family has three variants: I, D, and ID, which differ in the way
of reusing memory that has been filled. The I variant makes queries with
predictable addresses, whereas D determines the addresses on the fly
depending on the current state (and thus the password). The ID variant
follows I for the first half of the memory used and D for the rest and
while overwriting.
Side-channels

The side-channel attacks, which are of still rising concern in the security
community, are applicable to the D variant as the memory addresses and thus
information about the password or other secret inputs can be determined
from the timing leaks. The I variant is completely invulnerable to this
attack, and the ID variant provides only a constant factor improvement for
the attacker.
Hardware and tradeoffs

The M and T parameters determine the cost of bruteforcing passwords on
custom hardware, which is proportional to M2T if we follow the traditional
time-area product metric. The time-memory tradeoff analysis [2] shows that
the bruteforce cost for the I variant can be changed to M2T/Q(M,T) for some
quality function Q. For instance, Q(230,1)=3D5, Q(230,4)=3D2.5.

The D variant is invulnerable to the approach [2], and the savings factor
in the ID variant is upper bounded by factor 2 for all parameters.
Defender tradeoff and ultimate recommendations

In public and private conversations with security architects in the
industry we learned that the bottleneck in a system employing the
password-hashing function is the function latency rather than memory costs.
We then assume that a rational defender would like to maximize the
bruteforce costs for the attacker equipped with a list of hashes, salts,
and timing information, for fixed computing time on the defender=E2=80=99s =
machine.
In this assumption the defender keeps the MT product constant and maximizes
the losses M/Q(M,T). The authors of [2] provides us with attack cost
estimates for constant MT =3D 228,230,232 (measured in iteration-bytes)

We ultimately recommend the ID variant with T=3D1 and maximum M as a defaul=
t
setting for all environments, which is secure against side-channel attacks
and prohibit adversarial advantage on dedicated bruteforce hardware.

References

[1] =E2=80=9CEfficiently Computing Data-Independent Memory-Hard Functions=
=E2=80=9D
<http://eprint.iacr.org/2016/115.pdf>

[2] =E2=80=9CTowards Practical Attacks on Argon2i and Balloon Hashing=E2=80=
=9D
<http://eprint.iacr.org/2016/759.pdf>


On Mon, Mar 27, 2017 at 12:46 PM, <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Crypto Forum of the IETF.
>
>         Title           : The memory-hard Argon2 password hash and
> proof-of-work function
>         Authors         : Alex Biryukov
>                           Daniel Dinu
>                           Dmitry Khovratovich
>                           Simon Josefsson
>         Filename        : draft-irtf-cfrg-argon2-02.txt
>         Pages           : 26
>         Date            : 2017-03-27
>
> Abstract:
>    This document describes the Argon2 memory-hard function for password
>    hashing and proof-of-work applications.  We provide an implementer
>    oriented description together with sample code and test vectors.  The
>    purpose is to simplify adoption of Argon2 for Internet protocols.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-irtf-cfrg-argon2/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-irtf-cfrg-argon2-02
> https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-argon2-02
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-irtf-cfrg-argon2-02
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> Cfrg mailing list
> Cfrg@irtf.org
> https://www.irtf.org/mailman/listinfo/cfrg
>



--=20
Best regards,
Dmitry Khovratovich

--001a113ea1465d10b2054bb4201b
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><span id=3D"gmail-docs-internal-guid-8af37723-0f61-57e6-88=
4b-1afd0c84e82a"><h2 style=3D"line-height:1.38;margin-top:18pt;margin-botto=
m:6pt"><font color=3D"#000000" face=3D"arial" size=3D"2"><span style=3D"fon=
t-weight:normal;white-space:pre-wrap">Some comments on a new draft:</span><=
/font></h2><h2 dir=3D"ltr" style=3D"line-height:1.38;margin-top:18pt;margin=
-bottom:6pt"><span style=3D"font-family:arial;color:rgb(0,0,0);background-c=
olor:transparent;font-weight:400;vertical-align:baseline;white-space:pre-wr=
ap"><font size=3D"4">Variants</font></span></h2><p dir=3D"ltr" style=3D"lin=
e-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:10=
pt;font-family:arial;color:rgb(0,0,0);background-color:transparent;vertical=
-align:baseline;white-space:pre-wrap">Argon2 fills M bytes of memory in T i=
terations over it, with M and T being the parameters supplied to Argon2 and=
 determining its performance. Speed on a typical server is linear in the MT=
 product.</span></p><br><p dir=3D"ltr" style=3D"line-height:1.38;margin-top=
:0pt;margin-bottom:0pt"><span style=3D"font-size:10pt;font-family:arial;col=
or:rgb(0,0,0);background-color:transparent;vertical-align:baseline;white-sp=
ace:pre-wrap">The Argon2 family has three variants: I, D, and ID, which dif=
fer in the way of reusing memory that has been filled. The I variant makes =
queries with predictable addresses, whereas D determines the addresses on t=
he fly depending on the current state (and thus the password). The ID varia=
nt follows I for the first half of the memory used and D for the rest and w=
hile overwriting.</span></p><h2 dir=3D"ltr" style=3D"line-height:1.38;margi=
n-top:18pt;margin-bottom:6pt"><span style=3D"font-family:arial;color:rgb(0,=
0,0);background-color:transparent;font-weight:400;vertical-align:baseline;w=
hite-space:pre-wrap"><font size=3D"4">Side-channels</font></span></h2><p di=
r=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span=
 style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);background-colo=
r:transparent;vertical-align:baseline;white-space:pre-wrap">The side-channe=
l attacks, which are of still rising concern in the security community, are=
 applicable to the D variant as the memory addresses and thus information a=
bout the password or other secret inputs can be determined from the timing =
leaks. The I variant is completely invulnerable to this attack, and the ID =
variant provides only a constant factor improvement for the attacker.</span=
></p><h2 dir=3D"ltr" style=3D"line-height:1.38;margin-top:18pt;margin-botto=
m:6pt"><span style=3D"font-size:16pt;font-family:arial;color:rgb(0,0,0);bac=
kground-color:transparent;font-weight:400;vertical-align:baseline;white-spa=
ce:pre-wrap">Hardware and tradeoffs</span></h2><p dir=3D"ltr" style=3D"line=
-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:10p=
t;font-family:arial;color:rgb(0,0,0);background-color:transparent;vertical-=
align:baseline;white-space:pre-wrap">The M and T parameters determine the c=
ost of bruteforcing passwords on custom hardware, which is proportional to =
M</span><span style=3D"font-size:6pt;font-family:arial;color:rgb(0,0,0);bac=
kground-color:transparent;vertical-align:super;white-space:pre-wrap">2</spa=
n><span style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);backgrou=
nd-color:transparent;vertical-align:baseline;white-space:pre-wrap">T if we =
follow the traditional time-area product metric. The time-memory tradeoff a=
nalysis [2] shows that the bruteforce cost for the I variant can be changed=
 to M</span><span style=3D"font-size:6pt;font-family:arial;color:rgb(0,0,0)=
;background-color:transparent;vertical-align:super;white-space:pre-wrap">2<=
/span><span style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);back=
ground-color:transparent;vertical-align:baseline;white-space:pre-wrap">T/Q(=
M,T) for some quality function Q. For instance, Q(2</span><span style=3D"fo=
nt-size:6pt;font-family:arial;color:rgb(0,0,0);background-color:transparent=
;vertical-align:super;white-space:pre-wrap">30</span><span style=3D"font-si=
ze:10pt;font-family:arial;color:rgb(0,0,0);background-color:transparent;ver=
tical-align:baseline;white-space:pre-wrap">,1)=3D5, Q(2</span><span style=
=3D"font-size:6pt;font-family:arial;color:rgb(0,0,0);background-color:trans=
parent;vertical-align:super;white-space:pre-wrap">30</span><span style=3D"f=
ont-size:10pt;font-family:arial;color:rgb(0,0,0);background-color:transpare=
nt;vertical-align:baseline;white-space:pre-wrap">,4)=3D2.5.</span></p><br><=
p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><=
span style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);background-=
color:transparent;vertical-align:baseline;white-space:pre-wrap">The D varia=
nt is invulnerable to the approach [2], and the savings factor in the ID va=
riant is upper bounded by factor 2 for all parameters.</span></p><h2 dir=3D=
"ltr" style=3D"line-height:1.38;margin-top:18pt;margin-bottom:6pt"><span st=
yle=3D"font-family:arial;color:rgb(0,0,0);background-color:transparent;font=
-weight:400;vertical-align:baseline;white-space:pre-wrap"><font size=3D"4">=
Defender tradeoff and ultimate recommendations</font></span></h2><p dir=3D"=
ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span styl=
e=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);background-color:tra=
nsparent;vertical-align:baseline;white-space:pre-wrap">In public and privat=
e conversations with security architects in the industry we learned that th=
e bottleneck in a system employing the password-hashing function is the fun=
ction latency rather than memory costs. We then assume that a rational defe=
nder would like to maximize the bruteforce costs for the attacker equipped =
with a list of hashes, salts, and timing information, for </span><span styl=
e=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);background-color:tra=
nsparent;font-style:italic;vertical-align:baseline;white-space:pre-wrap">fi=
xed computing time on the defender=E2=80=99s machine</span><span style=3D"f=
ont-size:10pt;font-family:arial;color:rgb(0,0,0);background-color:transpare=
nt;vertical-align:baseline;white-space:pre-wrap">.=C2=A0 In this assumption=
 the defender keeps the MT product constant and maximizes the losses M/Q(M,=
T). The authors of [2] provides us with attack cost estimates for constant =
MT =3D 2</span><span style=3D"font-size:6pt;font-family:arial;color:rgb(0,0=
,0);background-color:transparent;vertical-align:super;white-space:pre-wrap"=
>28</span><span style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);=
background-color:transparent;vertical-align:baseline;white-space:pre-wrap">=
,2</span><span style=3D"font-size:6pt;font-family:arial;color:rgb(0,0,0);ba=
ckground-color:transparent;vertical-align:super;white-space:pre-wrap">30</s=
pan><span style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);backgr=
ound-color:transparent;vertical-align:baseline;white-space:pre-wrap">,2</sp=
an><span style=3D"font-size:6pt;font-family:arial;color:rgb(0,0,0);backgrou=
nd-color:transparent;vertical-align:super;white-space:pre-wrap">32</span><s=
pan style=3D"font-size:10pt;font-family:arial;color:rgb(0,0,0);background-c=
olor:transparent;vertical-align:baseline;white-space:pre-wrap"> (measured i=
n iteration-bytes)</span></p><br><span style=3D"font-size:10pt;font-family:=
arial;color:rgb(0,0,0);background-color:transparent;vertical-align:baseline=
;white-space:pre-wrap">We ultimately recommend the ID variant with T=3D1 an=
d maximum M as a default setting for all environments, which is secure agai=
nst side-channel attacks and prohibit adversarial advantage on dedicated br=
uteforce hardware.</span></span><br><div><span><span style=3D"font-size:10p=
t;font-family:arial;color:rgb(0,0,0);background-color:transparent;vertical-=
align:baseline;white-space:pre-wrap"><br></span></span></div><div><span id=
=3D"gmail-docs-internal-guid-5c91a66b-0f63-b70b-9647-1107436bf4f4"><h2 dir=
=3D"ltr" style=3D"line-height:1.38;margin-top:18pt;margin-bottom:6pt"><span=
 style=3D"font-family:arial;color:rgb(0,0,0);background-color:transparent;f=
ont-weight:400;vertical-align:baseline;white-space:pre-wrap"><font size=3D"=
4">References</font></span></h2><p dir=3D"ltr" style=3D"line-height:1.38;ma=
rgin-top:0pt;margin-bottom:0pt"><span style=3D"font-family:arial;color:rgb(=
0,0,0);background-color:transparent;vertical-align:baseline;white-space:pre=
-wrap"><font size=3D"4">[</font></span><span style=3D"font-size:11pt;font-f=
amily:arial;color:rgb(0,0,0);background-color:transparent;vertical-align:ba=
seline;white-space:pre-wrap">1] </span><a href=3D"http://eprint.iacr.org/20=
16/115.pdf" style=3D"text-decoration:none"><span style=3D"font-size:11pt;fo=
nt-family:arial;background-color:transparent;text-decoration:underline;vert=
ical-align:baseline;white-space:pre-wrap">=E2=80=9CEfficiently Computing Da=
ta-Independent Memory-Hard Functions=E2=80=9D</span></a></p><p dir=3D"ltr" =
style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"=
font-size:11pt;font-family:arial;color:rgb(0,0,0);background-color:transpar=
ent;vertical-align:baseline;white-space:pre-wrap">[2] </span><span style=3D=
"text-decoration:underline;font-size:11pt;font-family:arial;background-colo=
r:transparent;vertical-align:baseline;white-space:pre-wrap"><a href=3D"http=
://eprint.iacr.org/2016/759.pdf" style=3D"text-decoration:none">=E2=80=9CTo=
wards Practical Attacks on Argon2i and Balloon Hashing=E2=80=9D </a></span>=
</p><div><br></div></span></div></div><div class=3D"gmail_extra"><br><div c=
lass=3D"gmail_quote">On Mon, Mar 27, 2017 at 12:46 PM,  <span dir=3D"ltr">&=
lt;<a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">internet-d=
rafts@ietf.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Crypto Forum of the IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The memory-hard Argon2 password hash and proof-of-work function<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Alex=
 Biryukov<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Daniel Dinu<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Dmitry Khovratovich<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Simon Josefsson<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-irt=
f-cfrg-argon2-02.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 26<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2017-03-27<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document describes the Argon2 memory-hard function for pa=
ssword<br>
=C2=A0 =C2=A0hashing and proof-of-work applications.=C2=A0 We provide an im=
plementer<br>
=C2=A0 =C2=A0oriented description together with sample code and test vector=
s.=C2=A0 The<br>
=C2=A0 =C2=A0purpose is to simplify adoption of Argon2 for Internet protoco=
ls.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-irtf-cfrg-argon2/" rel=3D=
"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-=
irtf-cfrg-argon2/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-irtf-cfrg-argon2-02" rel=3D"no=
referrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft-irtf-cfr=
g-argon2-02</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-argon2-02"=
 rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc=
/html/draft-irtf-cfrg-<wbr>argon2-02</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-irtf-cfrg-argon2-02" r=
el=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?<wbr>url2=
=3Ddraft-irtf-cfrg-argon2-02</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
<br>
______________________________<wbr>_________________<br>
Cfrg mailing list<br>
<a href=3D"mailto:Cfrg@irtf.org">Cfrg@irtf.org</a><br>
<a href=3D"https://www.irtf.org/mailman/listinfo/cfrg" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.irtf.org/mailman/<wbr>listinfo/cfrg</a><br>
</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div class=
=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div>Best regards,<=
/div><div>Dmitry Khovratovich</div></div>
</div>

--001a113ea1465d10b2054bb4201b--

