[cryptography] workaround for length extension attacks (was: Doubts over necessity of SHA-3 cryptography standard)
Marsh Ray
marsh at extendedsubset.com
Wed Apr 18 21:00:50 PDT 2012
On 04/14/2012 06:39 AM, David Adamson wrote:
>
> NSA designed SHA-2 to stay in libraries for a long time. Length
> extension is not an issue for SHA-2 anymore with SHA-512/256. That is
> a double-pipe hash function perfectly secure against length-extension
> attack. On 64-bit platforms SHA512 and SHA512/256 is almost as fast as
> Skein and Blake (one of which will be the next SHA-3), and according
> to [1], "Furthermore, even the fastest finalists will probably offer
> only a small performance advantage over the current SHA-256 and
> SHA-512 implementations."
And they seem to be significantly less efficient in hardware than SHA-2.
Gee, it's almost as if the NSA knows a thing or two about designing and
implementing hash functions! :-)
> However, since SHA-2 and (to be SHA-3) are 2, 3 or even 4 times slower
> than MD5 or SHA-1, and NIST running the SHA-3 competition changed
> their own initial goal SHA-3 to be significantly faster than SHA-2, I
> expect in the following period several other influential international
> players in the area of standardizing cryptographic primitives to use
> that strategic mistake done by NIST, and to push for a hash standard
> that will be significantly faster than SHA-2 and SHA-3.
> [...]
> Now I expect EU to use the opportunity and finally back up a
> hash function that industry will prefer. But I see also that Russia,
> China and Japan can also use the NIST's screw up with the performance
> of SHA-3 and will try to take over the industrial primacy with their
> own hash function.
Honest question: why should we think they can do it?
Everyone was invited to take part in the SHA-3 competition, and many
international teams did. In fact, most of the finalists aren't US teams.
Of all the hundreds of entrants there are 5 left. It seems that most were
weeded out because they were less-that-maximally efficient or had attacks
on their security.
Beating SHA-2-256 or SHA-2-512/256 is turning out to be harder than anyone
expected.
> At the end, supremacy in setting up cryptographic
> standards is what will bring reputation, trust and strategic
> positioning in the world that in the following years will digest
> exabytes per hour.
No one spends more money on info systems than the US Government. Vendors
can implement whatever they want in the own (or extensible) protocols, but
if USG requires SHA-3, it's going to be implemented in gear designed for
sale in N. America.
Still, China is an increasing market too and their rulers are not afraid
of "intelligent design". We have them to thank for killing off proprietary
incompatible cellphone chargers. They simply mandated that all mobiles
charge via mini-USB.
> http://en.wikipedia.org/wiki/USB#Mobile_device_charger_standards
We may be seeing signs of a fork in data security protocols too.
> http://www.nytimes.com/2012/03/27/technology/symantec-dissolves-alliance-with-huawei-of-china.html?_r=1
> SO: I expect a new hash competition (run by EU, Russia, China or
> Japan) where US SHA-3 standard will be a reference point and the goal
> will be to design 256 and 512 bits hash function that is 3-4 times
> faster than SHA-3.
Alternatively, NIST could say "we've learned so much about hash functions
over the past few years that we're going to allow designers another round
of submissions."
- Marsh
_______________________________________________
cryptography mailing list
cryptography at randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the Testlist
mailing list