Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread William Allen Simpson
On 7/16/13 11:15 AM, Matthew Green wrote: http://www.isg.rhul.ac.uk/tls/RC4biases.pdf Thanks for bringing this pre-print link to my attention! In summary, don't use RC4. Don't use it carelessly with IVs. And don't use RC4. RC4 is available in many libraries and platforms. For the

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Tor Erling Bjørstad
[2013-07-17, William Allen Simpson] On 7/16/13 11:15 AM, Matthew Green wrote: Consider using Salsa20 instead. It would be helpful for folks to read the entire thread before making off the wall comments. Yes, folks have mentioned Salsa20. It doesn't seem as amenable to PPP packets as I would

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread ianG
Hi Bill, On 17/07/13 10:50 AM, William Allen Simpson wrote: Yes, folks have mentioned Salsa20. It doesn't seem as amenable to PPP packets as I would like. I don't quite know what that means, but reading quickly: http://tools.ietf.org/html/draft-simpson-ppp-arc4-00 it seems you are doing the

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Tanja Lange
[0] I haven't found them for XSalsa as yet. Don't know about ChaCha. They are both included in http://bench.cr.yp.to/primitives-stream.html with reference implementations and efficient implementaiton. The supercop test framework (downloadable from eBACS) checks other implementations

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Nico Williams
On Wed, Jul 17, 2013 at 7:42 AM, ianG i...@iang.org wrote: On 17/07/13 10:50 AM, William Allen Simpson wrote: Thing is, you don't just need an encryption algorithm, you also need IV, MAC, Padding concepts. (I agree that using a stream cipher obviates any messing Padding needs and the 'mode'

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Peter Maxwell
On 17 July 2013 08:50, William Allen Simpson william.allen.simp...@gmail.com wrote: In summary, don't use RC4. Don't use it carelessly with IVs. And don't use RC4. RC4 is available in many libraries and platforms. For the immediate future, it is most easily and likely implemented. We

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Thor Lancelot Simon
On Wed, Jul 17, 2013 at 03:50:50AM -0400, William Allen Simpson wrote: On 7/16/13 11:15 AM, Matthew Green wrote: http://www.isg.rhul.ac.uk/tls/RC4biases.pdf Thanks for bringing this pre-print link to my attention! In summary, don't use RC4. Don't use it carelessly with IVs. And don't use

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread Sandy Harris
William Allen Simpson william.allen.simp...@gmail.com wrote: We need something yesterday, not next year. ... Yes, folks have mentioned Salsa20. ... So, let's talk about what to choose for something fast and modern to implement in the next decade We cannot recommend a dozen EU

[cryptography] authentication protocol proposal

2013-07-17 Thread Krisztián Pintér
hello, admittedly, i got a little bit hyped about Keccak, especially its versatility. so i thought why not devise an authenitcation / key stretching / key derivation / secure storage protocol that uses solely Keccak to achieve all of its goals? i put together a brief (5 page) document describing

Re: [cryptography] authentication protocol proposal

2013-07-17 Thread Nico Williams
Subject [cryptography] authentication protocol proposa For authentication of what/whom, with what credentials, to what target(s)? Ah, users with passwords to some node with a password verifier. On Wed, Jul 17, 2013 at 4:54 PM, Krisztián Pintér pinte...@gmail.com wrote: hello, some benefits:

Re: [cryptography] 100 Gbps line rate encryption

2013-07-17 Thread William Allen Simpson
On 7/17/13 4:29 AM, Tor Erling Bjørstad wrote: Salsa20/12 or /20. Not because there's anything wrong with the ChaCha variant, but because Salsa20 is good enough and also better established. Note e.g. that Salsa20 is what's used in NaCl [1] (released well after ChaCha was proposed). Thank you