Re: [cryptography] Compositing Ciphers?

2013-09-13 Thread Tony Arcieri
On Fri, Sep 6, 2013 at 5:53 PM, Natanael wrote: > Apparently it's called "cascade encryption" or "cascade encipherment" More generally it's known as a product cipher, which underlies things like Feistel Networks which were used to compose algorithms like DES: https://en.wikipedia.org/wiki/Prod

Re: [cryptography] Compositing Ciphers?

2013-09-13 Thread Collin RM Stocks
On 09/06/2013 08:27 PM, Jeffrey Walton wrote: Hi All, With all the talk of the NSA poisoning NIST, would it be wise to composite ciphers? (NY Times, Guardian, Dr. Green's blog, et seq). I've been thinking about running a fast inner stream cipher (Salsa20 without a MAC) and wrapping it in AES

Re: [cryptography] Compositing Ciphers?

2013-09-07 Thread Sandy Harris
Jeffrey Walton wrote: > With all the talk of the NSA poisoning NIST, would it be wise to > composite ciphers? (NY Times, Guardian, Dr. Green's blog, et seq). > > I've been thinking about running a fast inner stream cipher (Salsa20 > without a MAC) and wrapping it in AES with an authenticated encr

Re: [cryptography] Compositing Ciphers?

2013-09-07 Thread Nico Williams
We have a purely (now mostly) all-symmetric key protocol: Needham-Schroeder -- Kerberos. Guess what: it doesn't scale, not without a strong dose of PK (and other things). Worse, its trusted third parties can do more than MITM/impersonate you like PKI's: they get to see your session keys (unless y

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread ianG
On 7/09/13 04:24 AM, Nico Williams wrote: On Fri, Sep 6, 2013 at 8:05 PM, Jeffrey Walton wrote: I'm more worried about key exchange or agreement. At a technical level, key exchange/agreement has probably the biggest impact on the overall architecture of the cryptographic solution. It's no

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Thor Lancelot Simon
On Sat, Sep 07, 2013 at 02:53:22AM +0200, Natanael wrote: > http://blog.cryptographyengineering.com/2012/02/multiple-encryption.html > Apparently it's called "cascade encryption" or "cascade encipherment", > and the implementations are apparently called "robust combiners". And > by the way, Truecry

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Jeffrey Walton
On Fri, Sep 6, 2013 at 8:58 PM, Nico Williams wrote: > On Fri, Sep 6, 2013 at 7:27 PM, Jeffrey Walton wrote: >> I've been thinking about running a fast inner stream cipher (Salsa20 >> without a MAC) and wrapping it in AES with an authenticated encryption >> mode (or CBC mode with {HMAC|CMAC}). >

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Nico Williams
On Fri, Sep 6, 2013 at 8:05 PM, Jeffrey Walton wrote: > I'm more worried about key exchange or agreement. The list of things to get right is long. The hardest is getting the implementation right -- don't do all that work just to succumb to a remotely exploitable buffer overflow. Next up is phys

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Jeffrey Walton
On Fri, Sep 6, 2013 at 8:53 PM, Natanael wrote: > http://blog.cryptographyengineering.com/2012/02/multiple-encryption.html > Apparently it's called "cascade encryption" or "cascade encipherment", > and the implementations are apparently called "robust combiners". And > by the way, Truecrypt alread

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Nico Williams
On Fri, Sep 6, 2013 at 7:27 PM, Jeffrey Walton wrote: > I've been thinking about running a fast inner stream cipher (Salsa20 > without a MAC) and wrapping it in AES with an authenticated encryption > mode (or CBC mode with {HMAC|CMAC}). My own very subjective opinion is that assuming all of: cons

Re: [cryptography] Compositing Ciphers?

2013-09-06 Thread Natanael
http://blog.cryptographyengineering.com/2012/02/multiple-encryption.html Apparently it's called "cascade encryption" or "cascade encipherment", and the implementations are apparently called "robust combiners". And by the way, Truecrypt already lets you pick your chosen combo of AES and two other ci

[cryptography] Compositing Ciphers?

2013-09-06 Thread Jeffrey Walton
Hi All, With all the talk of the NSA poisoning NIST, would it be wise to composite ciphers? (NY Times, Guardian, Dr. Green's blog, et seq). I've been thinking about running a fast inner stream cipher (Salsa20 without a MAC) and wrapping it in AES with an authenticated encryption mode (or CBC mode