On 10/22/2015 07:20 PM, Tao Effect wrote:
> From this blog post: 
> http://blog.cryptographyengineering.com/2015/10/a-riddle-wrapped-in-curve.html
>  
> <http://blog.cryptographyengineering.com/2015/10/a-riddle-wrapped-in-curve.html>
> 
> To quote Matthew Green:
> 
> <BEGIN>

> In other words, Koblitz and Menezes are saying that if you accept the weak 
> curve hypothesis into your heart, the solution is not to replace the NIST 
> elliptic curves 
> <https://www.ietf.org/mail-archive/web/cfrg/current/msg06426.html> with 
> anything at all, but rather, to leave the building as rapidly as possible and 
> perhaps not shut the door on the way out. No joke.
> 
> On the gripping hand, this sounds very much like the plan NSA is currently 
> implementing. Perhaps we should be worried.
> 
> </END>

I've seen no technical reason to suspect the weak curve hypothesis.  That
said, if it is actually true, then in the year it gets announced, 99.99%
of all the experts looking (and I don't even call myself an expert on
ECC) will have seen no reason to suspect the weak curve hypothesis.
It's that last *one* guy who has the insight that you have to wonder
about; those of us who don't see it are a dime a dozen, even in a
universe where it exists.

Of course, this action of the NSA's has dramatically focused the
attention of guys who *could* have this insight, so if it exists
expect an announcement soon.  Actually I'd have expected it by
now, because it's been a few months and if anybody was that close....

However, I don't think it does exist.  I think that if this were
being done for technical reasons - ie, if ECC is *really* weak or
has a large class of weak curves, or if someone is *really* close
to developing serious quantum-computer cryptography capabilities -
we'd have heard about *something* from some other source.  I mean,
there are lots of hard-math people who work on crypto now, and lots
of hard-physics people working on quantum computing, and at last
count I think less than a third of them work directly for governments.
Furthermore, the ones who do work for governments are less productive
because they mostly refuse to collaborate across borders.  The odds
that a break so significant would be completely unknown outside of
government agencies seems small.

Which IMO leaves non-technical reasons.  It could be a subterfuge
to try to hinder crypto adoption, or to get that focused analytical
attention on ECC, or an attempt to get people to stop using something
they don't know how to break. Heck, it could even be a legitimate
attempt to protect the security of the nation's infrastructure; you
just never know with these guys.

It could be the agency's move to quit a field where they've been
caught with their hand in the cookie jar. It could be somebody
"marking territory" by changing something - anything ! - just so
it doesn't look like they're not being proactive.  It could be
somebody making a power grab because they want an excuse to work
on something they won't get to work on unless there are new ciphers
to develop. It could be ....  the list goes on.  The quote with
which the article opened is particularly appropriate, and one could
speculate about the reasons operating within one of the world's most
opaque and unresponsive bureaucracies for days.

                                Bear

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Curves mailing list
Curves@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/curves

Reply via email to