X448 Key Exchange
Joseph S. Testa II
jtesta at positronsecurity.com
Fri Sep 21 22:01:03 AEST 2018
Hmm... crickets. Does this imply that X448 in OpenSSH is not ever a
possibility?
- Joe
On 09/14/2018 09:20 AM, Joseph S. Testa II wrote:
> On 09/13/2018 08:18 PM, Damien Miller wrote:
>> We have any plans to add more crypto options to OpenSSH without a strong
>> justification, and I don't see one for X448-SHA512 ATM.
>
> What I like about it is that it offers ~224 bit security level, whereas
> X25519 offers ~128 bits (according to RFC7748). Hence, pairing X448
> with AES256 would provide a full chain of security in the ~224 bit
> level, no?
>
> It also provides an alternative to the NIST P-curves (like P-521), which
> some people suspect are back-doored by the NSA. P-521 in ECDSA has been
> supported by OpenSSH for awhile now.
>
>
>> It's hard to imagine a world where X25519-SHA256 is broken but
>> X448-SHA512 is unaffected.
>
> Ok, but still... X448 provides a higher security margin that pairs well
> with AES256. That's a benefit users can enjoy immediately.
>
>
>> AFAIK The most likely ways that X25519-SHA256
>> could fail are:
>>
>> 1) discovery of weaknesses in prime field EC crypto. This would almost
>> certainly affect both X25519/X448.
>
> The same could happen with the NIST P-curves, which OpenSSH already
> supports.
>
>
>> 2) working quantum computers. Exciting times, everything breaks.
>>
>> 3) a weakness in SHA256. Online key agreement protocols like SSH KEX are
>> the last thing affected by collisions, because the attacker has such a
>> limited window in which to generate one and limited degrees of freedom
>> to manipulate the colliding data.
>
> (Did you mean SHA-512 here?)
>
> Again, this can happen with the P-curves/SHA-256/384/512/ECDSA that is
> already supported.
>
> While we're daydreaming about this, what about SHA3-512? (note the "3")
>
>
>> Personally, I'm more interested in a post-quantum KEX than another of the
>> same species...
>
> I'm very interested in this too. They're not exclusive to each other,
> however.
>
> I haven't stayed on top of post-quantum crypto lately, but isn't that
> still years away? X448, on the other hand, is fully defined and was
> recently put into TLS 1.3.
>
> It wouldn't be hard to convince me that X448 is still a little too new;
> perhaps we could wait a year and see how well it does with the new
> scrutiny it gets from being in the TLS spec. If it survives its
> field-testing, then we could move forward. And/or we make X448 a
> last-priority KEX for a year or two and patiently see what happens.
>
> Again, if this gets the green light, I'll be happy to write the initial
> implementation.
>
> Thanks,
> - Joe
>
--
Joseph S. Testa II
Founder & Principle Security Consultant
Positron Security
More information about the openssh-unix-dev
mailing list