[146628] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Suite B after today's news

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Thu Sep 5 22:37:17 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 06 Sep 2013 14:35:14 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: jon@callas.org, pgut001@cs.auckland.ac.nz
In-Reply-To: <5AAE674B-8487-4966-9646-CA5C772E156F@callas.org>
Cc: danmcd@kebe.com, cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Jon Callas <jon@callas.org> writes:

>How do you feel (heh, I typoed that as "feal") about the other AEAD modes?

If it's not a stream cipher and doesn't fail catastrophically with IV reuse
then it's probably as good as any other mode.  Problem is that at the moment
modes like AES-CTR are being promulgated as fashion statements without any
consideration about operational deployment, when what we should be promoting
is something that's safely and effectively deployable.  Someblockcipher-CBC +
HMAC is a nice safe bet, run your HMAC, do a constant-time compare of the
result, toss the encrypted data if you get a verify failure, otherwise
decrypt, it's pretty straightforward.

Peter.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post