Landon:

Thank you for your contributions. One of these suggestions I support and the other I think you still have more homework on.

On Jan 18, 2006, at 1:26 PM, Landon Noll wrote:

Please be so kind as to add this to rationale:

        The goal of the standard is to propose a mode of encryption
        that does not expand data and gives some protection against
        copy and paste operations from one sector  Additional goal
        is to specify the parameters that  are necessary so that one
        implementation will be able to decrypt what was encrypted
        with another implementation.

I think this is a well reasoned sentence and I believe it should be worked into the document. Thanks.

As well as:

        There are a numerious attacks that the LRW-AES does not protect
        against. There numerious to make a system compliant with the
        standard in a completely insecure way.  Explaining these issues
        is outside the scope of this standard.  The intent of this
        standard is to encourage implementers to use common sense and
        to try and comply with FIPS/CC.

I will tell you my problem with this paragraph (as an individual contributor) and then give you some suggestions more productive ways of bringing this issue back to the committee (as the chair). The negative may sound harsh, but it is not, and I hope you do not take it that way.

The problems with the paragraph include: The words "numerous attacks" is subjective and vague. The second sentence is not a sentence. After reading the last sentence, I have not seen the value it has given to the reader beyond the obvious. To highlight this I will dissect the final sentence. This is a compound statement, each of which are:

The intent of this standard is to encourage implementers to use common sense

and

The intent of this standard is to encourage implementers to try and comply with FIPS/CC.

Neither of these statements are "the intent" of this standard. I may be quibbling about words, but this is what we are here for because at the end of the day, all that is left on the paper will be these words. We need to be critical of these words.

To make a productive contribution to move this idea forward, I would ask you to do one or more of the following three options.

1) Find a similar statement in other standards. CBC, Counter, OCB, etc. all have issues that some can call "numerous attacks". Use the stuff on the NIST site as a preferred source. Find how others have taken care of this in their text. If you find a vague statement like I you have suggested in a sanctioned standards document I will provide a formal apology. Concrete examples will be a far more productive.

2) Once we are done, NIST will be looking at making this also an US standard. NIST's criteria is based on two issues. Adoption by relevant vendors, and the lack of credible criticism. If you write such a paper, I would suggest (in addition to sharing it with this group if you like) that you submit this to known cryptography conference. If it is accepted, then you have a significant contribution to the community.

3) If you believe you are being stonewalled by the editor, make a formal motion and force a vote and live by the result. This is the most risky without doing items 1 or 2 beforehand.

Thank you for your contributions.

Jim

Reply via email to