Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp1257200ybd; Wed, 26 Jun 2019 14:13:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqxyviMU3qIJyIJ6I9IfkgBtMGc6bz08H3XLXCSRrP/Pf56LuKXHdbotQzzyDx5IQbyT2Y5c X-Received: by 2002:a17:902:74c7:: with SMTP id f7mr142959plt.329.1561583605682; Wed, 26 Jun 2019 14:13:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561583605; cv=none; d=google.com; s=arc-20160816; b=icrs2JjiD97BGPYK4Y2eQbBN631Cgzs5h+HR4resSfEQl66I0JnO1TKJ1X+4h2vGUD wZYjYr39xt0+Ge0UjyOCvDqES9u4d4z7lQrnbaZRX26RNwBh61Cn8POd8CqeI6moWNei KWjB4qUVZM8ApDigLaVUlXEAodDOC8hiCki+RyAKu+nJAw6OMQFFL/pCBkWRWLYwitz0 AiWynTLfEl2MLgB/qfiWNZMoH8jl1lq41l5Nt6MisWsxAQsXI+ZBttUQjWj6lUGuCvu/ ApyftLK2LVzuYKQblbag4+eTLiMTSk/imK2ckom+yLUrMJOCn+Eb83d/yU061V9Rp3hM uCQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=9zZBcP42w+FfUJSSMob2Wy5TEGFIi2CbH0dibBo9nDw=; b=GxjPYQQHDaWIiQKuOw/nBejLQgczpf9E6kalzomJRgNpeO8nyi3QWoXOz4/7kOCzgc ZI1K56+iEEhtgT7nEiyi9cutplzc0MCXec98QM7xwARhc8sZ3UfDU47NnFcSpor2Oo+0 0rLRLN9SwOFKJMtPdbMk6sJBJQRhCKEe3xZMd8xxU4kCM1TQ/QKZdgAmi+U0eJ3j9+c0 p9j2M+vQjtRDCIp7SAro9cqwWwpwHnYO9zw/UpVhFbft6D4jFg89WZTF83ojlb4av5NY lMzKzAgIj9vMKqsVPwt4dlu7j/hwT/BTtwiPW9TNx+3oL90A1wijka7wqoqSslb6/CjG c66g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KJtmiDbD; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gn3si190468plb.321.2019.06.26.14.13.05; Wed, 26 Jun 2019 14:13:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KJtmiDbD; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726360AbfFZVLk (ORCPT + 99 others); Wed, 26 Jun 2019 17:11:40 -0400 Received: from mail-oi1-f194.google.com ([209.85.167.194]:33560 "EHLO mail-oi1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726227AbfFZVLk (ORCPT ); Wed, 26 Jun 2019 17:11:40 -0400 Received: by mail-oi1-f194.google.com with SMTP id f80so246433oib.0 for ; Wed, 26 Jun 2019 14:11:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9zZBcP42w+FfUJSSMob2Wy5TEGFIi2CbH0dibBo9nDw=; b=KJtmiDbD3Gc05H7ywz8pvyuRgtlvuMu5l+H/IgMtcVFt4t5CEbKEdYW6HUGaaNp7PP WWUtNj8EHRF9arWAiY4wvP6sGjvWKaAHdVsPRVGmhE3//+AEAKAHIMbcI52ZOgaPwF/z lU+3oRSVHnfLTxr0DKqev8217LkS0A92FyYqdPXosOQyA7HJv9Bpog6KjZKI1xxK1f+B oHnKY1aqfZBpWpIiis9i8u2Qdz4Qoj3TiKMiw9CnL1Nt18gSzPMq1ovoqXoxDpgap+rt stB7Yonfo3gqiR+FILATjmcpgv7RrowO6XzfnVpgCMvgNV/CMi6aFNXeMIhk3DeQ8ZIX aUig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9zZBcP42w+FfUJSSMob2Wy5TEGFIi2CbH0dibBo9nDw=; b=XHhHpjMd1d2Ktm17J5IlzaW3yGe/mqv4IgPrrcdAO0go+uh8Ixa9PbDK1Z4QenAhtB ShxTMtPOGo62VFnDX3D3If9uXEOSquOvfmhisFlh+xKMpIZsdSkZKGgosDi7+OjgaAgO BG6PlrGp/WSKkne8rrT26U7PhhCMWAwCpVwko5oQRFGorSbP//u8ct/mtEShaa22drT4 c18U9SEulQ5ajWQtluKK89uB/EvJ3qlg9yJWvkY0L7tQt5kfV/HKgL6zfKNiwlGcpZ07 prOsvXWR4eI8o5RyQHmHlcSo0bOpJxGY7QvGEDokkOfOiG08x0Yc7iufiK/DWmOUf3qq XFoA== X-Gm-Message-State: APjAAAXQncubBBrgBUMRgFZPzV4gCMZ1hS37mr+wabp1ouB/VQSaA03j dT9a6Qx0JBJz/JQvzXNkOShkmB5gPqJPgyfvsGQ= X-Received: by 2002:aca:c795:: with SMTP id x143mr267503oif.50.1561583499563; Wed, 26 Jun 2019 14:11:39 -0700 (PDT) MIME-Version: 1.0 References: <20190625145254.28510-1-ard.biesheuvel@linaro.org> <20190625171234.GB81914@gmail.com> In-Reply-To: From: Samuel Neves Date: Wed, 26 Jun 2019 22:11:03 +0100 Message-ID: Subject: Re: [PATCH] crypto: morus - remove generic and x86 implementations To: Milan Broz Cc: Ard Biesheuvel , Eric Biggers , "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , Ondrej Mosnacek , Geert Uytterhoeven Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org , On Wed, Jun 26, 2019 at 8:40 AM Milan Broz wrote: > > On 26/06/2019 09:15, Ard Biesheuvel wrote: > > > Thanks for the insight. So I guess we have consensus that MORUS should > > be removed. How about aegis128l and aegis256, which have been > > disregarded in favor of aegis128 by CAESAR (note that I sent an > > accelerated ARM/arm64 version of aegis128 based on the ARMv8 crypto > > instructions, in case you missed it) > > Well, there are similar cases, see that Serpent supports many keysizes, even 0-length key (!), > despite the AES finalists were proposed only for 128/192/256 bit keys. > (It happened to us several times during tests that apparent mistype in Serpent key length > was accepted by the kernel...) I'm not sure the Serpent case is comparable. In Serpent, the key can be any size below 256 bits, but internally the key is simply padded to 256 bits and the algorithm is fundamentally the same. There are no speed differences between different keys sizes. On the other hand, AEGIS128, AEGIS256, and AEGIS128L are different algorithms, with different state sizes and state update functions. The existing cryptanalysis of AEGIS consists solely of [1] (which is the paper that directly inspired the MORUS cryptanalysis), which does not look at AEGIS128L at all. In effect, to my knowledge there are no known cryptanalytic results on AEGIS128L, which I imagine to be one of the main reasons why it did not end up in the CAESAR portfolio. But AEGIS128L is by far the fastest option, and a user is probably going to be naturally tempted to use it instead of the other variants. [1] https://eprint.iacr.org/2018/292