Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-06

Luke Howard <lukeh@padl.com> Wed, 15 April 2015 15:13 UTC

Return-Path: <lukeh@padl.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 716F21AC40D for <kitten@ietfa.amsl.com>; Wed, 15 Apr 2015 08:13:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qgSULyKVbdph for <kitten@ietfa.amsl.com>; Wed, 15 Apr 2015 08:13:53 -0700 (PDT)
Received: from us.padl.com (us.padl.com [216.154.215.154]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A0D91AC405 for <kitten@ietf.org>; Wed, 15 Apr 2015 08:13:53 -0700 (PDT)
Received: by us.padl.com with ESMTP id t3FFDRof022169; Wed, 15 Apr 2015 11:13:29 -0400
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
Content-Type: multipart/alternative; boundary="Apple-Mail=_B105D76B-7EBE-4DE1-999F-F8FFA96950A8"
From: Luke Howard <lukeh@padl.com>
X-Priority: 3
In-Reply-To: <trinity-4f1ce1f7-6610-4a7e-aca8-c3205d929e2e-1429091657571@3capp-gmx-bs24>
Date: Thu, 16 Apr 2015 01:13:26 +1000
Message-Id: <46448841-4ABE-4176-88B1-94C2B26583C4@padl.com>
References: <alpine.GSO.1.10.1503301227280.22210@multics.mit.edu> <551D6C35.4080108@mit.edu> <alpine.GSO.1.10.1504081626110.22210@multics.mit.edu> <5525B044.8070509@mit.edu> <CAC2=hnfbLoRAQLwDQhL7pVYMS8kqfc1rAA6Ha1np1h1WnhT5aw@mail.gmail.com> <55271546.6020505@mit.edu> <597E759F-7941-4619-BCE0-DF604221EBB5@padl.com> <trinity-4f1ce1f7-6610-4a7e-aca8-c3205d929e2e-1429091657571@3capp-gmx-bs24>
To: D.Rogers@gmx.net
X-Mailer: Apple Mail (2.2098)
X-SMTP-Vilter-Version: 1.3.6
X-Spamd-Symbols: AWL,BAYES_00,HTML_MESSAGE,USER_IN_WHITELIST
X-SMTP-Vilter-Spam-Backend: spamd
X-Spam-Threshold: 5.0
X-Spam-Probability: -20.5
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/nPF8rl6wOGh0yoeWsj2B_mJDmXk>
Cc: "kitten@ietf.org" <kitten@ietf.org>, "mjjenki@tycho.ncsc.mil" <mjjenki@tycho.ncsc.mil>
Subject: Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-06
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Apr 2015 15:13:54 -0000

> On 15 Apr 2015, at 7:54 pm, D.Rogers@gmx.net wrote:
> 
> Starting from a larger set and truncating to the same end result does improve security, it may reduce it.


My understanding is that as long as the hash function has strong diffusion this is not a problem. The different SHA-2 variants are all truncated versions of SHA-512 (with different initial values). Also, not relevant here (because HMAC is used) but truncating hashes can actually improve security by avoiding length extension attacks.

Feel free to correct me as I’m not a cryptographer, I don’t even play one on TV… :)

— Luke