Re: Better S2K functions for OpenPGP?

Ian G <iang@systemics.com> Sun, 13 December 2009 03:09 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id nBD39e3H082077 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 12 Dec 2009 20:09:40 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id nBD39eOx082076; Sat, 12 Dec 2009 20:09:40 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from fiddle.it (slice.reviewedpress.com [67.207.137.25] (may be forged)) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id nBD39d6D082063 for <ietf-openpgp@imc.org>; Sat, 12 Dec 2009 20:09:39 -0700 (MST) (envelope-from iang@systemics.com)
Received: from [IPv6:::1] (localhost [127.0.0.1]) by fiddle.it (Postfix) with ESMTP id 21F44406C2; Sun, 13 Dec 2009 03:09:37 +0000 (UTC)
Message-ID: <4B245AF1.5000408@systemics.com>
Date: Sun, 13 Dec 2009 04:09:37 +0100
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
CC: ietf-openpgp@imc.org
Subject: Re: Better S2K functions for OpenPGP?
References: <20091209151735.2444a67b@feanor.vpn.dfranke.us>
In-Reply-To: <20091209151735.2444a67b@feanor.vpn.dfranke.us>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 09/12/2009 21:17, Daniel Franke wrote:
> The discussion currently going on gnupg-dev about increasing the
> default iteration count for the S2K prompted me to wonder whether
> OpenPGP couldn't benefit from some more modern key-derivation
> algorithms.


Has it ever been broken?  Has anyone lost anything?

It's IMO not worth changing a standard unless there is a clear and 
present danger.

iang