[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Editorial: Use of MAY in draft-ietf-ipsec-ikev2-algorithms



It MAY be simple, but it is wrong, so it SHOULD NOT be used.  WEP offers
128-bit keys, but only 24-bit security (or 12, depending on your definition)

-----Original Message-----
From: owner-ipsec@lists.tislabs.com
[mailto:owner-ipsec@lists.tislabs.com]On Behalf Of David Wagner
Sent: Monday, June 16, 2003 6:39 AM
To: ipsec@lists.tislabs.com
Subject: Re: Editorial: Use of MAY in draft-ietf-ipsec-ikev2-algorithms


Yoav Nir wrote:
>Why not make the requirement about effective strength?  That way, if ever
it
>turns out that AES_128 can be broken in 2**90 steps, it automatically
>becomes a SHOULD NOT.

I don't recommend this.

I can just see the debates this might spawn.  Cryptographers
already can't agree whether the Courtois-Pieprzyk attack works or
not, and that might be a 2^80 attack on AES -- if it works
(which nobody knows).

I'd recommend to keep it simple.  KISS.  Isn't it easier to simply write
that implementors SHOULD NOT use key sizes shorter than the default
key size?