All of lore.kernel.org
 help / color / mirror / Atom feed
From: Milan Broz <gmazyland@gmail.com>
To: Christoph Anton Mitterer <calestyo@scientia.net>, dm-crypt@saout.de
Subject: Re: [dm-crypt] some questions on dm-crypt/cryptsetup and LUKS2+integrity
Date: Tue, 16 Oct 2018 09:10:26 +0200	[thread overview]
Message-ID: <c3ff545f-f1c2-f42f-cfff-13e3ea40acc3@gmail.com> (raw)
In-Reply-To: <8adc63ffd10cd4ef1f18ab1f01cbaaf1a4cc3cb2.camel@scientia.net>

Hi,

On 15/10/2018 17:11, Christoph Anton Mitterer wrote:
>> 2) Use new native AEAD algorithms with 128bit nonces (in kernel 4.18
>> and later)
>> (aegis128,aegis256,aegis128l,morus640,morus1280), for example
>>
>>  "--cipher aegis128-random --key-size 128 --integrity aead" or
>>  "--cipher aegis256-random --key-size 256 --integrity aead" or
> <  "--cipher morus640-random --key-size 128 --integrity aead" ...
> 
> 1) Should these work by now with the current cryptsetup? Or will one
> require 2.1?

These should work with 2.0.4 (most of it even with older releases).
You just need kernel with modules enabled.

> 2a) AFAIU, AEGIS will always have either key-sizes of 128 or 256 bit,
> right?
> I'm also assuming that larger key size will give a better security
> margin,right?
> But what's the 128L?

It just another variant with internal state size of 1024 bits.

This is table from Ondra's master thesis that focused on
these dm-crypt AEAD extensions (https://is.muni.cz/th/qvh3t/)

                  AEGIS-128L AEGIS-128 AEGIS-256
Input block size    256 bits  128 bits  128 bits
Nonce size          128 bits  128 bits  256 bits
Key size            128 bits  128 bits  256 bits
Tag size            128 bits  128 bits  128 bits
State size         1024 bits  640 bits  768 bits


> 2b) And MORUS will have either 640 bit for the internal state with
> "only" 128 bit keys... OR... the 1280 bit internal state with either
> 128 or 256 bit keys, right?

Yes, but see the link above, it is described there as well.

> Again, I'm assuming that larger internal state and larger key size will
> give a better security margin, right?

It depends. It needs some time people really analyze these in detail.
Larger internal state does not unconditionally imply better properties.

> 
> 3) Is there any comparison (in terms of security) between AEGIS and
> MORUS?

I hope there will be more analysis as CAESAR crypto competition
is nearing its end.

My main intention for dm-crypt is just to show that we need to use
AEAD (authenticated encryption) in future, and the best algorithm we had
now is CAESAR candidates (and recently some SIV variants but someone need
to implement them in kernel).

I am not a theoretic crypto analyst but an engineer that tries to use that
in real world. There is some risk in it, but someone should at least try :-)

Seriously, it can happen that something will be broken in future or something
better will appear. I would like to see much more active discussions between
academic world and practitioners and more innovations here.
(And innovation means also some fails. :)

m.

  reply	other threads:[~2018-10-16  7:10 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-08-16 15:52 [dm-crypt] some questions on dm-crypt/cryptsetup and LUKS2+integrity Christoph Anton Mitterer
2018-08-17 12:23 ` Milan Broz
2018-08-17 13:26   ` Christoph Anton Mitterer
2018-08-19 10:07     ` Milan Broz
2018-08-19 17:27       ` Christoph Anton Mitterer
2018-09-03  7:48         ` Milan Broz
2018-09-04 12:49           ` Christoph Anton Mitterer
2018-09-04 15:53             ` Arno Wagner
2018-09-04 17:14               ` Milan Broz
2018-10-15 15:11                 ` Christoph Anton Mitterer
2018-10-16  7:10                   ` Milan Broz [this message]
2018-11-19 21:03                     ` Christoph Anton Mitterer
2018-11-20 10:08                       ` Ondrej Kozina
2018-11-20 13:57                         ` Christoph Anton Mitterer
2018-11-20 16:05                           ` Milan Broz
2018-11-20 17:07                             ` Christoph Anton Mitterer
2018-11-20 17:54                               ` Milan Broz
2019-01-14  5:48                                 ` Christoph Anton Mitterer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c3ff545f-f1c2-f42f-cfff-13e3ea40acc3@gmail.com \
    --to=gmazyland@gmail.com \
    --cc=calestyo@scientia.net \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.