Re: [jose] I-D Action: draft-ietf-jose-json-web-encryption-09.txt

"Manger, James H" <James.H.Manger@team.telstra.com> Fri, 26 April 2013 07:32 UTC

Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 780D921F8555 for <jose@ietfa.amsl.com>; Fri, 26 Apr 2013 00:32:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.901
X-Spam-Level:
X-Spam-Status: No, score=-0.901 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9tDuO+AC5c0U for <jose@ietfa.amsl.com>; Fri, 26 Apr 2013 00:32:45 -0700 (PDT)
Received: from ipxcvo.tcif.telstra.com.au (ipxcvo.tcif.telstra.com.au [203.35.135.208]) by ietfa.amsl.com (Postfix) with ESMTP id 9D7AC21F97C9 for <jose@ietf.org>; Fri, 26 Apr 2013 00:32:42 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.87,556,1363093200"; d="scan'208";a="132157798"
Received: from unknown (HELO ipcavi.tcif.telstra.com.au) ([10.97.217.200]) by ipocvi.tcif.telstra.com.au with ESMTP; 26 Apr 2013 17:32:41 +1000
X-IronPort-AV: E=McAfee;i="5400,1158,7056"; a="180205803"
Received: from wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) by ipcavi.tcif.telstra.com.au with ESMTP; 26 Apr 2013 17:32:40 +1000
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) with mapi; Fri, 26 Apr 2013 17:32:40 +1000
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: John Bradley <ve7jtb@ve7jtb.com>, "jose@ietf.org" <jose@ietf.org>
Date: Fri, 26 Apr 2013 17:32:39 +1000
Thread-Topic: [jose] I-D Action: draft-ietf-jose-json-web-encryption-09.txt
Thread-Index: Ac5CCejdywkfLxV3S3KABOzbVsDo4QAPzBFg
Message-ID: <255B9BB34FB7D647A506DC292726F6E1150CD91AEA@WSMSG3153V.srv.dir.telstra.com>
References: <20130424002901.19246.69134.idtracker@ietfa.amsl.com> <014201ce416a$82761a80$87624f80$@augustcellars.com> <4E1F6AAD24975D4BA5B1680429673943676ACD2E@TK5EX14MBXC284.redmond.corp.microsoft.com> <74C39AC5-0C6B-4DC1-A273-3996D97D90A9@vigilsec.com> <53360D8F-6AB2-4F8F-A73D-CDDD5FE2E00E@ve7jtb.com>
In-Reply-To: <53360D8F-6AB2-4F8F-A73D-CDDD5FE2E00E@ve7jtb.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [jose] I-D Action: draft-ietf-jose-json-web-encryption-09.txt
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2013 07:32:45 -0000

> From: jose-bounces@ietf.org [mailto:jose-bounces@ietf.org] On Behalf Of John Bradley
> Sent: Friday, 26 April 2013 9:08 AM
>
> I think there were two issues identified.
>
> ...
> 2.  Encrypting the same plaintext multiple times with the same IV and CMK but changing the AAD.   The problem with this is slightly less clear.   There will be multiple tags generated one for each different AAD.  To produce the tag you encrypt the final hash value with the block is xored with the IV block encrypted with the CMK.  
>
> I don't personally know of an attack that can exploit having multiple tags xored with the same value.   My take on it from Mc Grew's comment on the list was it is probably not a good thing.   I think Mike and I both took from the conversation that producing multiple tag values that are xord with the same encrypted value is not something that was recommended.
>
> If I have that wrong now would be a good time to say that the practice is OK.   


Rename "IV" to "Nonce" (as it is labelled in RFC 5116 "Authenticated Encryption" for instance) and the problem is clearer: the point of a nonce is that it is only used once (per key).

JOSE cannot keep its current multiple recipient mode as it breaks the general model of an AEAD algorithm. RFC 5116 section 2.1: "Each nonce provided to distinct invocations of the Authenticated Encryption operation MUST be distinct, for any particular value of the key, unless each and every nonce is zero-length". Regardless of whether or not using GCM with same-nonce-and-plaintext-different-AAD is ok, it will not be ok with other AEAD algs, such as SIV [RFC 5297]. Considering any authentication tag to be part of the ciphertext (JOSE issue #11) would avoid this sort of crypto craziness.

--
James Manger