Re: [openpgp] SHA3 algorithm ids.

"Robert J. Hansen" <rjh@sixdemonbag.org> Wed, 19 August 2015 14:19 UTC

Return-Path: <rjh@sixdemonbag.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED1D01A898B for <openpgp@ietfa.amsl.com>; Wed, 19 Aug 2015 07:19:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zDhbhEkHbcqc for <openpgp@ietfa.amsl.com>; Wed, 19 Aug 2015 07:19:37 -0700 (PDT)
Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2001:4f8:3:36:211:85ff:fe63:a549]) by ietfa.amsl.com (Postfix) with ESMTP id 7912C1A21BA for <openpgp@ietf.org>; Wed, 19 Aug 2015 07:19:37 -0700 (PDT)
Received: from [10.10.142.30] (wsip-70-167-255-237.dc.dc.cox.net [70.167.255.237]) (Authenticated sender: rjh-sixdemonbag) by shards.monkeyblade.net (Postfix) with ESMTPSA id D7F6E589463 for <openpgp@ietf.org>; Wed, 19 Aug 2015 07:19:36 -0700 (PDT)
To: openpgp@ietf.org
References: <87y4hmi19i.fsf@vigenere.g10code.de> <55D43E0F.6080201@brainhub.org> <9A043F3CF02CD34C8E74AC1594475C73F4ADF89F@uxcn10-5.UoA.auckland.ac.nz>
From: "Robert J. Hansen" <rjh@sixdemonbag.org>
Message-ID: <55D49077.5020205@sixdemonbag.org>
Date: Wed, 19 Aug 2015 10:19:35 -0400
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0
MIME-Version: 1.0
In-Reply-To: <9A043F3CF02CD34C8E74AC1594475C73F4ADF89F@uxcn10-5.UoA.auckland.ac.nz>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 19 Aug 2015 07:19:37 -0700 (PDT)
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/znn_zf-LsVoeeMg833DeiM9Eyv8>
Subject: Re: [openpgp] SHA3 algorithm ids.
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Aug 2015 14:19:39 -0000

> And that's pretty much what the -224 hashes are, forgettable (and 
> -384 only slightly less so).  There's an obvious need for -256, and 
> then you need -512 for people who need hashes that go to 11, but 
> what's the point of -224 and -384 in OpenPGP?

IIRC, early drafts of DSA2 required a 224-bit hash for DSA-2048 and
didn't allow for the possibility of a truncated 256-bit hash.  Later
revisions corrected this oversight.  That's where it got into the spec:
because at the time it got into the spec, SHA-224 was required for
conformance.