Re: [openpgp] Replacing the OpenPGP Encryption Mode is Harmful and Pointless

Bruce Walzer <bwalzer@59.ca> Mon, 18 July 2022 21:45 UTC

Return-Path: <bwalzer@59.ca>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58FC0C157B40 for <openpgp@ietfa.amsl.com>; Mon, 18 Jul 2022 14:45:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 89E4M8xOiHAL for <openpgp@ietfa.amsl.com>; Mon, 18 Jul 2022 14:45:33 -0700 (PDT)
Received: from mail.59.ca (mail.59.ca [205.200.229.83]) (using TLSv1.3 with cipher TLS_CHACHA20_POLY1305_SHA256 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA512) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 240E4C157B3A for <openpgp@ietf.org>; Mon, 18 Jul 2022 14:45:32 -0700 (PDT)
Received: from [10.0.0.2] (helo=ohm.59.ca) by mail.59.ca with esmtpsa (TLS1.3) tls TLS_CHACHA20_POLY1305_SHA256 (Exim 4.94.2) (envelope-from <bwalzer@59.ca>) id 1oDYYH-0009yR-Om; Mon, 18 Jul 2022 16:45:17 -0500
Date: Mon, 18 Jul 2022 16:45:16 -0500
From: Bruce Walzer <bwalzer@59.ca>
To: Daniel Huigens <d.huigens@protonmail.com>
Cc: openpgp@ietf.org
Message-ID: <YtXUbGzZ2H3Rn9mF@ohm.59.ca>
References: <YtFLcfKMEC/vRXY+@watt.59.ca> <8z4hYvgxLiNrfVMLCTfxUFCm6MVzugdNOvjPdvn4qoRF76lESafW0nqnQthrtCGbGK3ire9lqAmrJetJHHCYJiHhxXXgkCWKB5zmPc6Ax-g=@protonmail.com> <YtG/rE5D71hJtFyM@ohm.59.ca> <bZNA5Kqg_5MZFIzOuRnGvoTx8_tPdvasQ8U7v1tCQQXfVJu5QZOqpoq1TTqeXi_TMjHzDFEKtfIV--pC7vIO0t0nswB2vv1AqqSrfY_c8CY=@protonmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <bZNA5Kqg_5MZFIzOuRnGvoTx8_tPdvasQ8U7v1tCQQXfVJu5QZOqpoq1TTqeXi_TMjHzDFEKtfIV--pC7vIO0t0nswB2vv1AqqSrfY_c8CY=@protonmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/ooMF3C69MtTQelbSMBXL_M8jbzI>
Subject: Re: [openpgp] Replacing the OpenPGP Encryption Mode is Harmful and Pointless
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2022 21:45:35 -0000

On Mon, Jul 18, 2022 at 09:59:08AM +0000, Daniel Huigens wrote:
[...]
> Yes, AEAD is more efficient than OCFB-MDC in both our implementations.
> OCB, for example, is a single-pass algorithm, which means it looks at
> the data only once, while OCFB-MDC has to go over the data twice.

I am not sure why it would be required to go over the data twice for OCFB-MDC. Since it is streamable, I don't know how that would even be possible.

Bruce