[tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

Yawning Angel yawning at schwanenlied.me
Thu May 19 18:40:25 UTC 2016


On Thu, 19 May 2016 17:21:47 +0000
Deirdre Connolly <durumcrustulum at gmail.com> wrote:

> Not sure if this has been noted before on this thread, but the
> BoringSSL team is working on something very similar:
> 
> https://boringssl-review.googlesource.com/#/c/7962/

Skimming the code:

 * The protocol level stuff is not useful at all because the sort of
   problems that need to be solved (or changes) with the Tor
   wire protocol for any sort of PQ handshake are rather different than
   "just adding another TLS key exchange mechanism".

 * Their hybrid construct is unauthenticated (handled separately by TLS,
   with a signature), and is `X25519SharedSecret | NHSharedSecret`,
   passed into a KDF.

 * They have their own special snowflake newhope variant (The code is
   based on the `ref` version, with Google copyrights bolted on top),
   functional changes are:

    * CTR-AES128 instead of SHAKE is used to sample `a` (same
      algorithm, doesn't have the sampling optimization or attempt to
      hide the rejection sampling timing variation).

    * SHA256 is used instead of SHA3-256 to generate `mu` from `nu`.

    * RAND_bytes() is called for noise sampling instead of using
      ChaCha20 or CTR-AES256.

    I don't find these changes to be particularly interesting.  Any
    system where using AES-CTR like this makes sense will benefit more
    from using a vectorized NTT/reconciliation.

Regards,

-- 
Yawning Angel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20160519/9416c536/attachment.sig>


More information about the tor-dev mailing list