> -----Original Message-----
> From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Dave Garrett
> Sent: Wednesday, September 23, 2015 6:41 PM
> To: tls@ietf.org
> Subject: [TLS] Obscure ciphers in TLS 1.3
> 
> https://tlswg.github.io/tls13-spec/#cipher-suites
> https://www.iana.org/assignments/tls-parameters/tls-
> parameters.xhtml#tls-parameters-4
> 
> When I updated the lists in the TLS 1.3 draft, I just put everything in that 
> is
> currently in the registry and usable. I'd like to now start a discussion on 
> what
> should be allowed. Specifically, I have questions about ARIA and Camellia, as
> well as 8-bit authentication tag variants of AES-CCM or anything else.
> 
> How relevant is this ARIA attack?
> https://eprint.iacr.org/2010/168

That's not relevant to the use of ARIA -- against 256 bit ARIA, it breaks 8 of 
16 rounds; against 192 bit ARIA, it breaks 7 of 14 rounds.  That gives us a 
factor-of-2 safety margin for both key sizes, which is rather a lot.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to