Re: [TLS] Inclusion of OCB mode in TLS 1.3

Nikos Mavrogiannopoulos <nmav@redhat.com> Mon, 19 January 2015 08:11 UTC

Return-Path: <nmav@redhat.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 585711AD1BF for <tls@ietfa.amsl.com>; Mon, 19 Jan 2015 00:11:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.713
X-Spam-Level:
X-Spam-Status: No, score=-4.713 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wir-DJ5w6obg for <tls@ietfa.amsl.com>; Mon, 19 Jan 2015 00:11:01 -0800 (PST)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD48A1AD17F for <tls@ietf.org>; Mon, 19 Jan 2015 00:11:00 -0800 (PST)
Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t0J8Axb2005128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 19 Jan 2015 03:10:59 -0500
Received: from dhcp-2-127.brq.redhat.com (dhcp-2-127.brq.redhat.com [10.34.2.127]) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t0J8AvfC002713 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Mon, 19 Jan 2015 03:10:58 -0500
Message-ID: <1421655057.2854.5.camel@redhat.com>
From: Nikos Mavrogiannopoulos <nmav@redhat.com>
To: Manuel Pégourié-Gonnard <mpg@polarssl.org>
Date: Mon, 19 Jan 2015 09:10:57 +0100
In-Reply-To: <54BA315A.7020804@polarssl.org>
References: <54B5501A.4070402@azet.org> <D0DA96DB.58455%paul@marvell.com> <54B58F5B.2010704@cs.tcd.ie> <54B6815A.7060102@azet.org> <CABcZeBOkabo85Hv73MM1koeGnVYDJtPHc6uwk5b1BkPDRu=RGg@mail.gmail.com> <54B9352C.70203@azet.org> <54BA315A.7020804@polarssl.org>
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.26
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/gE792Y5a3IB9Dz3VqXSFFvoj7VE>
Cc: TLS Mailing List <tls@ietf.org>
Subject: Re: [TLS] Inclusion of OCB mode in TLS 1.3
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Jan 2015 08:11:02 -0000

On Sat, 2015-01-17 at 10:54 +0100, Manuel Pégourié-Gonnard wrote:
> On 16/01/2015 16:58, Aaron Zauner wrote:
> > I came up with the following list of cipher-suites applicable to >= TLS 1.2:
> > 
> > (EC)DHE:
> > TLS_DHE_RSA_WITH_AES_128_OCB	
> > TLS_DHE_RSA_WITH_AES_256_OCB
> > TLS_ECDHE_RSA_WITH_AES_128_OCB
> > TLS_ECDHE_RSA_WITH_AES_256_OCB
> > TLS_ECDHE_ECDSA_WITH_AES_128_OCB
> > TLS_ECDHE_ECDSA_WITH_AES_256_OCB
> > 
> > PSK:
> > TLS_DHE_PSK_WITH_AES_128_OCB
> > TLS_DHE_PSK_WITH_AES_256_OCB	
> > TLS_ECDHE_PSK_WITH_AES_128_OCB
> > TLS_ECDHE_PSK_WITH_AES_256_OCB
> > 
> I think it would make sense to also include pure PSK (no DH) suite for very
> constrained devices that can't afford the asymetric crypto.

Plain PSK can also be used to establish an additional channel in an
existing TLS connection (which may already already be under PFS).

regards,
Nikos