Re: I-D ACTION:draft-ietf-ipsec-ciph-sha-256-00.txt

Shoichi Sakane <sakane@kame.net> Wed, 12 December 2001 19:10 UTC

Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by above.proper.com (8.11.6/8.11.3) with ESMTP id fBCJAZ226443; Wed, 12 Dec 2001 11:10:36 -0800 (PST)
Received: by lists.tislabs.com (8.9.1/8.9.1) id NAA19714 Wed, 12 Dec 2001 13:28:04 -0500 (EST)
To: ipsec@lists.tislabs.com
Subject: Re: I-D ACTION:draft-ietf-ipsec-ciph-sha-256-00.txt
In-Reply-To: Your message of "Mon, 19 Nov 2001 08:29:07 -0500" <200111191329.IAA26802@ietf.org>
References: <200111191329.IAA26802@ietf.org>
X-Mailer: Cue version 0.6 (011026-1440/sakane)
Mime-Version: 1.0
Content-Type: Text/Plain; charset="us-ascii"
Message-Id: <20011213033745S.sakane@kame.net>
Date: Thu, 13 Dec 2001 03:37:45 +0900
From: Shoichi Sakane <sakane@kame.net>
X-Dispatcher: imput version 20000228(IM140)
Lines: 15
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk

> 	Title		: The HMAC-SHA-256-96 Algorithm and Its Use With IPsec
> 	Author(s)	: S. Frankel, S. Kelly
> 	Filename	: draft-ietf-ipsec-ciph-sha-256-00.txt
> 	Pages		: 8
> 	Date		: 16-Nov-01

the section 5 in RFC2104 says,

   We recommend that
   the output length t be not less than half the length of the hash
   output (to match the birthday attack bound) and not less than 80 bits
   (a suitable lower bound on the number of bits that need to be
   predicted by an attacker).

is that ok to truncate into 96bit ?