On Mar 10, 2014, at 12:05 PM, Stephen Kent <[email protected]> wrote:

> Paul
>> On Mar 8, 2014, at 8:08 AM, Black, David <[email protected]> wrote:
>> 
>>>> The next draft changes AES-128-CBC to AES-CBC, and says:
>>>> 
>>>> In the following sections, all AES modes are for 128-bit AES. 192-bit AES
>>>> MAY be supported for those modes, but the requirements here are for 128-bit
>>>> AES.
>>> What about 256-bit AES keys?  They should also be a "MAY".
>> Why not “SHOULD” for 192 and 256 bit keys?
>> 
>>      paul
> It's good to remember the reason that 256-bits keys for AES were specified,
> i.e., as a hedge against someone building a quantum computer. So, unless the
> data being encrypted is expected to have a lifetime far enough into the future
> as to merit protection against that concern, the extra time needed to perform
> AES-256 vs. AES-128 does not seem justified.
> 
> Steve

That’s a good argument for a user choosing to use AES-128 rather than AES-256.  
But it doesn’t really address why “SHOULD implement” isn’t justified — the 
implementation cost is trivial and if it isn’t used it has no performance 
impact.

        paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to