Re: [openpgp] AEAD Chunk Size

Derek Atkins <derek@ihtfp.com> Wed, 27 March 2019 15:50 UTC

Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F37641202F4 for <openpgp@ietfa.amsl.com>; Wed, 27 Mar 2019 08:50:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level:
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_CSS=0.1, URIBL_CSS_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ihtfp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kELoz_M7v2x3 for <openpgp@ietfa.amsl.com>; Wed, 27 Mar 2019 08:50:47 -0700 (PDT)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A01A1202EF for <openpgp@ietf.org>; Wed, 27 Mar 2019 08:50:47 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id D10D4E2045; Wed, 27 Mar 2019 11:50:45 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 22243-09; Wed, 27 Mar 2019 11:50:39 -0400 (EDT)
Received: from securerf.ihtfp.org (99-46-190-172.lightspeed.tukrga.sbcglobal.net [99.46.190.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id 61E29E2044; Wed, 27 Mar 2019 11:50:39 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1553701839; bh=300oHuK2POq99Y8jZoEkr/+gkupzekQq9K8j3sIF5II=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=qCC2I85k4MH2EgejpXik/L4W+9BaBcxtCPYUoAC6Ia+zu8L5T4bhYULnjPuJyiXtl ITCY3CIjKJ1szIQ13OwTFV3alvNY1zb3DR4Q2Xr9ALSo+9UmnNwyG39r+6coeWi9UK WwV3LqKnfPFIs5OjWCTEftx3h8wGD+SjLnT6TTT4=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.15.2/8.15.2/Submit) id x2RFoWOw020640; Wed, 27 Mar 2019 11:50:32 -0400
From: Derek Atkins <derek@ihtfp.com>
To: Tobias Mueller <muelli@cryptobitch.de>
Cc: "Neal H. Walfield" <neal@walfield.org>, Werner Koch <wk@gnupg.org>, openpgp@ietf.org, Vincent Breitmoser <look@my.amazin.horse>
References: <87d0n174w6.fsf@wheatstone.g10code.de> <87mumh33nc.wl-neal@walfield.org> <3GFS71V7BTJNZ.29C5TO8OY0O44@my.amazin.horse> <sjmy35isypu.fsf@securerf.ihtfp.org> <87r2bax5u2.wl-neal@walfield.org> <sjmlg1hskdq.fsf@securerf.ihtfp.org> <87pnqtwot9.wl-neal@walfield.org> <0f7f492bf18145f96e70886ba19ba290.squirrel@mail2.ihtfp.org> <87lg1gwelf.wl-neal@walfield.org> <61e3fb9d194d0b47f21be8e176daa0b9b6c5d0a5.camel@cryptobitch.de> <87sgvkihd1.wl-neal@walfield.org> <241225ce914a1843b48dab304c760151fe05b764.camel@cryptobitch.de> <87imwfj3oq.wl-neal@walfield.org> <65e588255c689d329546c3908dac112896d029ca.camel@cryptobitch.de>
Date: Wed, 27 Mar 2019 11:50:32 -0400
In-Reply-To: <65e588255c689d329546c3908dac112896d029ca.camel@cryptobitch.de> (Tobias Mueller's message of "Tue, 26 Mar 2019 18:45:09 +0100")
Message-ID: <sjmva04mi47.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/D1hilFiNuckN4J7uB4DY7UPiKos>
Subject: Re: [openpgp] AEAD Chunk Size
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Mar 2019 15:50:49 -0000

Tobias Mueller <muelli@cryptobitch.de> writes:

[snip]
> Note that there is *a single output* rather than multiple and that it
> doesn't allow for releasing partial plaintexts or authenticated
> prefixes.
> Do you see that any chunking protocol on top of that which is allowed
> for releasing plaintext early is not immediately covered by this
> definition?

In my mind, each chunk is its own AEAD ciphertext.  So the chunking is
happening *during* AEAD encryption, and not after encryption.  I.e., the
chunking and AEAD encryption should be tied together such that the chunk
header is part of the AEAD protection and the chunk data is the AEAD
encrypted data.

This approach does, IMHO, map directly into the RFC definition.

-derek

-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant