----- Original Message -----
From: "David Reid" <r...@snmp.com>
To: "Johannes Merkle" <johannes.mer...@secunet.com>
Cc: <opsawg@ietf.org>
Sent: Wednesday, November 20, 2013 8:15 PM
Subject: Re: [OPSAWG] draft-hmac-sha-256-128-usm-snmp-00


> > >>
> > >> The new protocol is a straightforward adaptation of the protocols
> > >> HMAC-MD5-96 and HMAC-SHA-96 from RFC 3414 to the SHA-256 based
HMAC
> > >> with truncation to 128 bits. Comments and suggestions are
welcome.
> > >
> > > Would it be valuable to also add SHA-512?
> > >
> > > We actually implemented all 4 bit lengths of SHA2. I think that's
overkill.
> > > But 512 might be valuable.
> > >
> >
> > HMAC-SHA-256-128 already provides a very high level of security. So
> > I'm not sure if a SHA-512-based HMAC is really needed.
>
> That's fine with me. I have not specifically seen demand for 512, but
> wasn't sure what the broader market would want.

SHA-384 is in Suite B, which is the argument I see advanced on the TLS
list for its inclusion in ciphersuites (and which is where I learn most
of my security:-(

Separately, I have seen it stated that SHA-512 is no better than
SHA-384.

Tom Petch


> > The next thing I'm going to do is to write down the MIB spec. As
soon
> > as I find time for it...
>
> OK. I'll be happy to review it when it's ready.
>
> -David Reid
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg
>


_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to