On 02/10/2015 07:33 PM, Ben Harris wrote:

> This has the same security properties as Noise, but only uses ECC and Keccak. Keccak-f just to avoid any confusion (i.e. the permutation only, it uses different api and domain properties to Keccak).

Ah right, good catch.

forget() is weaker than Axolotl, as forget is just erasing state bits to prevent inverting the permutation (breaking a previous message). Axolotl creates new ephemerals to prevent breaking future messages too.

Yes, which is why I wrote:
[Mike] Once the connections are set up, you can ratchet them at will, either in 
a simple way (using forget()) or by incorporating new DH ephemerals as in 
Axlotl.
I was thinking that you could exchange ephemerals, then header(g^xy) and forget() in some order.

Using Keyak as the AEAD cipher for bodies is great. But using it for everything might present some issues with lost messages (can't skip a message without having the body) and the concurrency stuff you mention.

Hm, yes. It would only really work for protocols which run over TCP or similar.

It would be interesting to look at an Axolotl-sponge that modifies Axolotl to suit a sponge construction like Keyak. One example is simplifying header encryption into two sequential calls to DuplexWrap instead of two decryptions with separate keys.

Yeah, the simpler header encryption was really what I was after.

Cheers,
-- Mike
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to