sframe-wg / sframe

Internet draft for SFrame
Other
7 stars 10 forks source link

Address minor cryptographic points from EKR #142

Closed bifurcation closed 1 year ago

bifurcation commented 1 year ago

In his response to the SFrame adoption call, @ekr made a couple of points regarding the cryptographic constructions in SFrame, which still apply to the current draft. They are presented here in blockquotes, with my comments below.

I do think it would be useful to explain the extent to which this depends on SRTP for security, if at all.

SFrame doesn't depend on SRTP for security, so I don't think any comment is needed here.

A 4 byte tag is pretty short.

Audio packets are pretty short, so media folks are sensitive to percentage overhead -- I have had to argue some folks up from zero. You can also read "4 byte tag" as "2^{-32} expected forgery rate", which is a pretty small disruption in the scheme of an audio stream.

What's the reason for specifying anything with SHA-512 as the KDF?

Cargo-cult level-matching. Looking at other cipher suites with AES-256 and SHA-based KDFs, MLS uses SHA-512, but TLS and IKE use SHA-384. I would be open to suggestions here.

bifurcation commented 1 year ago

Interim 2023-09-13: