Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add "improving the sphinx mix network" #29

Closed
david415 opened this issue May 14, 2017 · 1 comment
Closed

add "improving the sphinx mix network" #29

david415 opened this issue May 14, 2017 · 1 comment

Comments

@david415
Copy link
Member

http://www.cs.ru.nl/~bmennink/pubs/16cans.pdf

@Yawning
Copy link

Yawning commented May 14, 2017

The paper is somewhat flawed.

The core of their premise appears to hinge upon the assumption that people implementing Sphinx (and the original paper) suggest using Anderson/Biham's experimental setup from the original BEAR/LION paper, which is flat out wrong. They're also seem to have missed the point of the BEAR/LION paper, in that BEAR/LION/LIONESS are generic constructs, and the experimental setup in the 90s with SHA-1/SEAL was part of an experimental performance evaluation setup.

Other notes:

  • The LRW construct they propose is utterly unusable for a lot of use cases due to the rather short limit on AD/plaintext size (1023/1023 - alpha respectively).
  • SHA-3 (or more specifically Keccak-f 1600) is ridiculously slow.
  • AEZ has a per-key usage cap of 2^48 bytes (2^44 blocks). I'm not sure why they're freaking out over birthday bound issues.
  • AEZv4's problem with E() was fixed. (http://web.cs.ucdavis.edu/~rogaway/aez/bug.pdf)

The one useful thing they're doing is "Have the per hop mac that authenticates the header, also cover the payload". But at that point, I question the need for a fragile/wide-block construct for payload encryption in general.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants