Re: [saag] A case against algorithm agility (long)

Benjamin Kaduk <kaduk@MIT.EDU> Sun, 04 May 2014 03:10 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1B141A0140 for <saag@ietfa.amsl.com>; Sat, 3 May 2014 20:10:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.252
X-Spam-Level:
X-Spam-Status: No, score=-3.252 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LbVyot-RfUHS for <saag@ietfa.amsl.com>; Sat, 3 May 2014 20:10:56 -0700 (PDT)
Received: from dmz-mailsec-scanner-5.mit.edu (dmz-mailsec-scanner-5.mit.edu [18.7.68.34]) by ietfa.amsl.com (Postfix) with ESMTP id 88A7C1A0103 for <saag@ietf.org>; Sat, 3 May 2014 20:10:56 -0700 (PDT)
X-AuditID: 12074422-f79186d00000135a-a7-5365afbd515f
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-5.mit.edu (Symantec Messaging Gateway) with SMTP id A9.C0.04954.DBFA5635; Sat, 3 May 2014 23:10:53 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id s443AqL4001269; Sat, 3 May 2014 23:10:52 -0400
Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id s443AnPv010668 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 3 May 2014 23:10:51 -0400
Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id s443An9p018434; Sat, 3 May 2014 23:10:49 -0400 (EDT)
Date: Sat, 3 May 2014 23:10:49 -0400 (EDT)
From: Benjamin Kaduk <kaduk@MIT.EDU>
To: ianG <iang@iang.org>
In-Reply-To: <53650F27.6040607@iang.org>
Message-ID: <alpine.GSO.1.10.1405032309040.9713@multics.mit.edu>
References: <53650F27.6040607@iang.org>
User-Agent: Alpine 1.10 (GSO 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrDIsWRmVeSWpSXmKPExsUixCmqrLt3fWqwQdtTLouFXQfYLKb0dzI5 MHnMXH2E1WPJkp9MAUxRXDYpqTmZZalF+nYJXBmH/k5iLtjBWrF7wRLWBsZlLF2MnBwSAiYS z+YeZYWwxSQu3FvP1sXIxSEkMJtJ4t+Rf6wQzgZGiSNzlkFlDjJJrPr+GKxdSKBeYuKR92A2 i4CWxKo9MxhBbDYBFYmZbzYCNXBwiAhISBz8kA8SZhYQlLjUv4UJxBYWsJbo7J0PtplTQENi d+sBsDivgIPEnQWXocarSzy7eowNxBYV0JFYvX8KC0SNoMTJmU9YIGZaSpz7c51tAqPgLCSp WUhSCxiZVjHKpuRW6eYmZuYUpybrFicn5uWlFuma6uVmluilppRuYgQFKruL0g7GnweVDjEK cDAq8fCeuJUcLMSaWFZcmXuIUZKDSUmUd83k1GAhvqT8lMqMxOKM+KLSnNTiQ4wSHMxKIrxy 04FyvCmJlVWpRfkwKWkOFiVx3rfWVsFCAumJJanZqakFqUUwWRkODiUJ3u51QI2CRanpqRVp mTklCGkmDk6Q4TxAw1euBRleXJCYW5yZDpE/xagoJc6bBtIsAJLIKM2D64UlkleM4kCvCPPu AWnnASYhuO5XQIOZgAaLOyaDDC5JREhJNTD6Rm1cPVlxVd1n8ZtSdQFhjeVmn22+37pSsuj9 kj8cJduqdM4edVV88l/wjeLt46z9C17+4+Vesyj9UOsNiRVyTxwWzz0R+X72wcCQXqU/CpWK j59siH/3In9mo9n3764Rm+svpB3ZG+Ap0xMhxMgoNHFW/M3sGQnhn3iz+mLFFxS9MHbrYQtQ YinOSDTUYi4qTgQAwBnauv8CAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/saag/cc1_y4kWyxPZt0WBUnqIsq7VcQM
Cc: saag@ietf.org
Subject: Re: [saag] A case against algorithm agility (long)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 May 2014 03:10:58 -0000

On Sat, 3 May 2014, ianG wrote:

> 4.  Marginality.  Any benefits from tweaking/swapping/improving blackbox
> algorithms are marginal and/or esoteric.  For the most part, any cipher
> gets you 99.999% of the grade.  Same with any HMAC, any mode properly
> implemented.  The only people who can or will crack weaker algorithms
> (DES?  RC4) are people who will also bypass the crypto, and are already
> doing it.

My apologies for cherry-picking just a single point, but commercial DES 
crackers are in the $200, 1-day range these days.  That there is even a 
commercial market for it suggests that they are in use, and not just by 
people who could by pass the crypto.

-Ben Kaduk