[messaging] Two-pass DH instead commitment

Van Gegel torfone at ukr.net
Tue Feb 23 00:16:11 PST 2016


Argon2 is not a panacea in our case because we have to use hardware with limited resources (memory) while adversary can use near unlimited resources for mounting MitM. 
I suppose that with n-bits commitment and m-bit short authenticator attacker must do 2^(m+n) probes (exponent+PKDF each) for success MitM. While m+n near 32 - 48 bits is this more hard comparing with the obtaining keypair on the second pass of 224+32 two-passed DH described above? 

And whether there is a suitable C implementation (library) for DH with Aranha Curve2213?  

--- Original message --- 
From: "Ben Harris" <mail at bharr.is> 
Date: 23 February 2016, 02:01:22 

On 23 February 2016 at 08:02, Van Gegel < torfone at ukr.net > wrote: 
Another problem: what is the minimum bit length of the hash (commitment) is required for reliable verification by 32-bit short fingerprints of secret? Note: data transfer price is very high in our case. 

  If data is so expensive, you might want to look at M-221 or E-222 as smaller curves. [ https://safecurves.cr.yp.to/ ] 
If you used a memory/cpu hard function (PBKDF/scrypt/argon) to generate the 32-bit fingerprint then you could lower the size of the hash commitment. It would come down to the type of adversary you want to protect from. You could use a 64-bit commitment and a memory hard function that takes 1 second to calculate for instance and get a very high level of protection. It is a tradeoff, as with most things in life. 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20160223/544748b1/attachment.html>


More information about the Messaging mailing list