Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp1751788ybd; Thu, 27 Jun 2019 00:43:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqwEl1jE/QVu/WuWLXrs1ttSWJF4pXCoJopFgHtd9e+gTCzPnZn9Az6n+DZ5mObBj5RlwqbY X-Received: by 2002:a17:902:b43:: with SMTP id 61mr3069753plq.322.1561621430815; Thu, 27 Jun 2019 00:43:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561621430; cv=none; d=google.com; s=arc-20160816; b=eFuwHY59fFK9Blgy8KIUrE+dKiJMYMaHZEQt6+HQjsZUoArrXw4P0grtjUCsBeS5bt wKyxgGc3SKffg3uIYbS9g89L9RmopaT2mK3i/Va2MnoJTy0kTftE8EHmLvawLphUSu3m 0/Jm864gao3K07n+N2O4zpI7y8bVI2fosX9QnqotH5E0rrKi4JONz/Gl/4NInH83K1+/ zmRX3XhIRgVWHTm95Z3LiYGFCAICRGUUEsBonh5QoQzd/Csg61Enfn0cX1SXHPwpoDOU z8yDRfdBBRLPC22oJkOGO4l0XTEdzJqEcAzN6iRcn4SnFQH62U+vPkwrPxMbyak/3GSJ tmBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=3fBAKQwI2PJSj30Ng8shpFsxQD/XkP/I50yquaAKmYY=; b=xijIXA/d7p50iSC2tdhM38lDHU57MA0KeN35/xeIATpIhmmhQIFTdXmrtA0s0tuXt3 hx7ne+Jec+GZP3ZFa3TWnSRDquNhj5/zcDh0O+sTxSE7LcmTozIv7X5+uaCNCxoZiKKs o4mFI+IAduaPzVxg5XavZDfEkz/mhA2lz3meK9ry7ucmjHrBMbqHSwkP/3R4l3klx2cB JX/L4HxARD9egL7Aa9MlipGM6zKIWhujKvArIDcKuvWxS9Y4f61xLzNQ9dikMS77tjex T3sA9nGrCPfPWhfnAifro8HNZ2B1Yo+Uz8xNGfLqO32sLtgSdynklgOPefQ8WTf5eU8A IWvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=p53tJzIK; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p35si1583909pgl.106.2019.06.27.00.43.31; Thu, 27 Jun 2019 00:43:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=p53tJzIK; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726059AbfF0HnA (ORCPT + 99 others); Thu, 27 Jun 2019 03:43:00 -0400 Received: from mail-io1-f67.google.com ([209.85.166.67]:46558 "EHLO mail-io1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726054AbfF0HnA (ORCPT ); Thu, 27 Jun 2019 03:43:00 -0400 Received: by mail-io1-f67.google.com with SMTP id i10so2587719iol.13 for ; Thu, 27 Jun 2019 00:42:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3fBAKQwI2PJSj30Ng8shpFsxQD/XkP/I50yquaAKmYY=; b=p53tJzIK8exdP2U56hWQMXucOC3azqeklOBdkBLPnkIStncMupi3aUOpC3sKMW/PKo Gx9RK3T4fHTLTqETsUNqTkZi+r3F+fj/K8MrTluQOYzRylGNTWl//APYId727jRDmG9i XZG6s47T/gv39J/HukK7qiDhPQZ1MPCIe83Jv1DSEDqTd2rld//P1FZga+LkDVPpRshn lGfA8RTs7+B/82ahbvjT4XGObdPplLdMhXImVmwoseYfP5djAolBQdYaukuSmb66RRrc MVXXlJu6CoIrLbba1nr/byaHPALwaNDLVCESJKGzc07SZwfS7bPhLHknDMY81auAIQnO nt3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3fBAKQwI2PJSj30Ng8shpFsxQD/XkP/I50yquaAKmYY=; b=uHjgdqdeZiNmHXc1eNNo+U9pCjiFa0AGjupaa45JYAav/zy0v7CJKkgXPT0qnhINw4 VJzgboUMRxoTBLSmKlhFlAE1PN4gZRMDsPHaUuivRFflIi1QXLhPT3KCeuIgOBKQ6PhX F0FPwXUsREVh4gOWArCT1U1SeQBafTkdL0UrU2CcsGkIX8YbDYNyOLIrt2/WbZycAyGQ J8OmgLRew+d95I7/GwbNOeKSGdV9c6piQqTNXSpFpx0wqYK0bvOLUBn5SPBokDkvEJ46 ueW5fPovdN7t6C2aUA86Mp4B+JD1uUfF+r++rK1apSl7zbYMFPFXQUOx6ac3y1NaKR/W il7g== X-Gm-Message-State: APjAAAWYCNrcT6sTzo52HeoScVF0rURZMIQJ6n2L5i8EtDRFsfkpl769 fy5BYSM6P81FxIvfyoFG6SGsJ+ZKVaniFAqcpHBRaw== X-Received: by 2002:a05:6602:98:: with SMTP id h24mr3022644iob.49.1561621379461; Thu, 27 Jun 2019 00:42:59 -0700 (PDT) MIME-Version: 1.0 References: <20190625145254.28510-1-ard.biesheuvel@linaro.org> <20190625171234.GB81914@gmail.com> In-Reply-To: From: Ard Biesheuvel Date: Thu, 27 Jun 2019 09:42:45 +0200 Message-ID: Subject: Re: [PATCH] crypto: morus - remove generic and x86 implementations To: Samuel Neves Cc: Milan Broz , Eric Biggers , "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , Ondrej Mosnacek , Geert Uytterhoeven Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, 26 Jun 2019 at 23:11, Samuel Neves wrote: > > , On Wed, Jun 26, 2019 at 8:40 AM Milan Broz wrote: > > > > On 26/06/2019 09:15, Ard Biesheuvel wrote: > > > > > Thanks for the insight. So I guess we have consensus that MORUS should > > > be removed. How about aegis128l and aegis256, which have been > > > disregarded in favor of aegis128 by CAESAR (note that I sent an > > > accelerated ARM/arm64 version of aegis128 based on the ARMv8 crypto > > > instructions, in case you missed it) > > > > Well, there are similar cases, see that Serpent supports many keysizes, even 0-length key (!), > > despite the AES finalists were proposed only for 128/192/256 bit keys. > > (It happened to us several times during tests that apparent mistype in Serpent key length > > was accepted by the kernel...) > > I'm not sure the Serpent case is comparable. In Serpent, the key can > be any size below 256 bits, but internally the key is simply padded to > 256 bits and the algorithm is fundamentally the same. There are no > speed differences between different keys sizes. > > On the other hand, AEGIS128, AEGIS256, and AEGIS128L are different > algorithms, with different state sizes and state update functions. The > existing cryptanalysis of AEGIS consists solely of [1] (which is the > paper that directly inspired the MORUS cryptanalysis), which does not > look at AEGIS128L at all. In effect, to my knowledge there are no > known cryptanalytic results on AEGIS128L, which I imagine to be one of > the main reasons why it did not end up in the CAESAR portfolio. But > AEGIS128L is by far the fastest option, and a user is probably going > to be naturally tempted to use it instead of the other variants. > Indeed. So that would actually argue for removing the optimized x86 implementation, but tbh, I'd rather remove aegis128l and aegis256 entirely, given that no recommendations exist for its use in any particular context, and given the CAESAR outcome, that is unlikely to change in the future.