
From nobody Tue Sep  1 07:38:09 2020
Return-Path: <b.viguier@cs.ru.nl>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F03B53A0934; Tue,  1 Sep 2020 07:38:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.845
X-Spam-Level: 
X-Spam-Status: No, score=-2.845 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.948, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gd9-bwIfweH3; Tue,  1 Sep 2020 07:38:05 -0700 (PDT)
Received: from smtp1.science.ru.nl (smtp1.science.ru.nl [131.174.16.143]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87BBF3A0935; Tue,  1 Sep 2020 07:38:03 -0700 (PDT)
Received: from [192.168.2.4] (77-172-0-215.fixed.kpn.net [77.172.0.215]) (authen=benoit) by smtp1.science.ru.nl (8.15.2/5.32) with ESMTPSA id 081Ec038031425; Tue, 1 Sep 2020 16:38:00 +0200
References: <bc188f7e-cb30-3aaa-b6a7-88655c841751@cs.ru.nl>
To: Thomas Pornin <thomas.pornin@nccgroup.com>, Alexey Melnikov <alexey.melnikov@isode.com>, "draft-irtf-cfrg-kangarootwelve@ietf.org" <draft-irtf-cfrg-kangarootwelve@ietf.org>, crypto-panel@irtf.org
From: =?UTF-8?Q?Beno=c3=aet_Viguier?= <b.viguier@cs.ru.nl>
X-Forwarded-Message-Id: <bc188f7e-cb30-3aaa-b6a7-88655c841751@cs.ru.nl>
Message-ID: <ff010917-47ac-dbc6-8439-663373ddeb87@cs.ru.nl>
Date: Tue, 1 Sep 2020 16:38:00 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0
MIME-Version: 1.0
In-Reply-To: <bc188f7e-cb30-3aaa-b6a7-88655c841751@cs.ru.nl>
Content-Type: multipart/alternative; boundary="------------91C37B32E74FD46B889DE46C"
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/g5G7Cmks9kDwGG5r_0w4u313HoQ>
Subject: Re: [Crypto-panel] EXTERNAL: Re: Request for review: draft-irtf-cfrg-kangarootwelve-02
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Sep 2020 14:38:08 -0000

This is a multi-part message in MIME format.
--------------91C37B32E74FD46B889DE46C
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit

Dear Thomas, Dear Alexey, Dear Crypto Panel members,

We would like to thank you for your time into reviewing our draft
and providing us with your constructive comments.

We apologize for the delays (corona & vacations...) and provide you here
with
our modifications to the draft:
https://github.com/cfrg/draft-irtf-cfrg-kangarootwelve/commit/70eff423aa57e9e34121951da2764b5ed73df988
.

On 7/17/20 11:57 PM, Thomas Pornin wrote:
>
> Here is my review of draft-irtf-cfrg-kangarootwelve-02:
>
>  
>
> General comments:
>
>  
>
> The function is well described. The specification is not self-contained
>
> since it relies on FIPS 202, but that's not a problem in my opinion (there
>
> already are other RFCs that reference FIPS 202).
>
>  
>
> The function already exists and is specified in a note published on
>
> eprint since 2016, so there is no point in changing it now; this is an
>
> RFC that describes an existing situation, not one that introduces new
>
> stuff (otherwise, I would insist, for aesthetical reasons, on making
>
> length_encode() use little-endian instead of the current big-endian).
>
Additionally we added links to the publications at the ACNS
conference 2014 and 2018 for KangarooTwelve and the Sakura tree hashing.
>
> Some poor soul, somewhere, will want to make a MAC out of K12 and will
>
> try to use it in HMAC. This is probably not a very good idea, though
>
> it won't be weak. HMAC requires knowledge of the "block size" of the
>
> algorithm, so that block size should be specified somewhere. Intuitively,
>
> I suppose the "block size" is 168 bytes, but it would be better to state
>
> it explicitly somewhere.
>
>  
>
> Also, some guidance about a better way to turn K12 into a MAC would be
>
> helpful. Normally, a simple K12(key || data) would be enough, provided
>
> that the concatenation of 'key' and 'data' is unambiguous. It is
>
> tempting to use the key as customization string, but then, you do not
>
> have a customization string anymore. A related question is whether the
>
> MAC output length should be part of the input/customization string.
>
We added a paragraph on that subject in the Security Consideration section.
We present HopMAC(K, M, C, L) = K12( Key, K12(M, C, 32), L) to describe
a way to build a MAC from K12.

> Particular comments:
>
>  
>
> page 2: "splits the input message in fragments" -> "splits ... into
> fragments"
>
> (also page 3)
>
Edited.
>
>  page 3: "does not have overhead": this is a bold statement. What is meant
>
> here is that the tree hashing mode of K12 does not introduce _additional_
>
> overhead (due to the tree hashing mode) compared with, say, SHAKE; but
>
> there remains the elementary overhead which makes it so that, for
> instance,
>
> hashing 10 bytes is not less expensive than hashing 120 bytes.
>
>  
>
> Speaking of overhead, it may be worth pointing out that the tree mode
>
> implies maintaining two separate Keccak contexts (at least for inputs
>
> longer than 8192 bytes), hence double the RAM usage; this may matter
>
> for constrained embedded devices (i.e. low-end smartcards and
>
> microcontrollers, where 200 bytes of RAM are a lot).
>
>  
>
> page 4: "from n to m exclusive" is a bit confusing since byte at index m
>
> is excluded, but byte at index n is included. Maybe: "selection of
> bytes from
>
> index n (inclusive) to m (exclusive)"? Also say somewhere that the first
>
> byte of a string has index 0 (i.e. this is C/Rust, not Pascal).
>
Edited.
>
> page 4: "x**y denotes x multiplied by itself y times" -> this would
>
> actually be x**(y+1) (if you multiply x by itself _once_, you get x*x).
>
Edited.
>
> page 4: "the number of output bytes requested" -> this lacks a verb;
>
> probably: "is the requested number of output bytes"
>
Edited.
>
> page 5: "First the message is padded with zeroes to the closest
> multiple of
>
> 168 bytes.  Then a byte `80` is XORed to the last byte of the padded
>
> message.  and the resulting string is split into a sequence of 168-byte
>
> blocks."
>
> -> This could be made clearer, first to indicate that it is the length,
>
> in bytes, of the padded message which is to be a multiple of 168; also,
>
> that the "closest" is really a rounding-up (e.g. with a 169-byte input,
>
> we really need to append 167 other bytes, even though 168 is arguably
>
> much closer to 169 than 336). There should be an explicit specification
>
> about what to do if the input size already has a size multiple of 168:
>
> should we add 168 extra bytes of value zero, or none at all? Note that,
>
> in the latter case, there must be a special case for an input of length
>
> 0: if the padded input consists of no byte at all, then it becomes
>
> difficult to XOR 0x80 into "the last byte".
>
We clarify that the length of the F function is positive.
This resolve the problem of inputs consisting of no bytes.
In the definition of KangarooTwelve in section 2.2, there are no calls to F
with input of length 0.

We clarify the rounding up to the next multiple of 168.

> (Three paragraphs later, we learn that the input length is at least
>
> 1 byte, which avoids any issue related to a zero-length input; this
>
> should probably be explained a bit earlier in the text.)
>
Edited.
>
>  page 11: "against all attacks" (end of first paragraph of section 5):
>
> this lacks a final dot.
>
Edited.
>
>  
>
> Thomas
>
We are open to any additional feedback.

-- 
Kind regards,

Benoît Viguier
Software Engineer - PhD Student | Cryptography & Formal Methods
Radboud University | Mercator 1, Toernooiveld 212
6525 EC Nijmegen, the Netherlands | www.viguier.nl


--------------91C37B32E74FD46B889DE46C
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    Dear Thomas, Dear Alexey, Dear Crypto Panel members,
    <div class="moz-forward-container">
      <p>We would like to thank you for your time into reviewing our
        draft<br>
        and providing us with your constructive comments.</p>
      <p>We apologize for the delays (corona &amp; vacations...) and
        provide you here with<br>
        our modifications to the draft: <a moz-do-not-send="true"
href="https://github.com/cfrg/draft-irtf-cfrg-kangarootwelve/commit/70eff423aa57e9e34121951da2764b5ed73df988">https://github.com/cfrg/draft-irtf-cfrg-kangarootwelve/commit/70eff423aa57e9e34121951da2764b5ed73df988</a>
        .<br>
      </p>
      <div class="moz-cite-prefix">On 7/17/20 11:57 PM, Thomas Pornin
        wrote:<br>
      </div>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <meta http-equiv="Content-Type" content="text/html;
          charset=UTF-8">
        <meta name="Generator" content="Microsoft Word 15 (filtered
          medium)">
        <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US">Here is my review
              of draft-irtf-cfrg-kangarootwelve-02:<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">General comments:<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">The function is
              well described. The specification is not self-contained<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">since it relies on
              FIPS 202, but that's not a problem in my opinion (there<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">already are other
              RFCs that reference FIPS 202).<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">The function
              already exists and is specified in a note published on<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">eprint since 2016,
              so there is no point in changing it now; this is an<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">RFC that describes
              an existing situation, not one that introduces new<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">stuff (otherwise, I
              would insist, for aesthetical reasons, on making<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">length_encode() use
              little-endian instead of the current big-endian).</span></p>
        </div>
      </blockquote>
      Additionally we added links to the publications at the ACNS<br>
      conference 2014 and 2018 for KangarooTwelve and the Sakura tree
      hashing.
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p>Some
              poor soul, somewhere, will want to make a MAC out of K12
              and will<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">try to use it in
              HMAC. This is probably not a very good idea, though<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">it won't be weak.
              HMAC requires knowledge of the "block size" of the<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">algorithm, so that
              block size should be specified somewhere. Intuitively,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">I suppose the
              "block size" is 168 bytes, but it would be better to state<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">it explicitly
              somewhere.<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">Also, some guidance
              about a better way to turn K12 into a MAC would be<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">helpful. Normally,
              a simple K12(key || data) would be enough, provided<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">that the
              concatenation of 'key' and 'data' is unambiguous. It is<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">tempting to use the
              key as customization string, but then, you do not<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">have a
              customization string anymore. A related question is
              whether the<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">MAC output length
              should be part of the input/customization string.</span></p>
        </div>
      </blockquote>
      We added a paragraph on that subject in the Security Consideration
      section.<br>
      We present HopMAC(K, M, C, L) = K12( Key, K12(M, C, 32), L) to
      describe<br>
      a way to build a MAC from K12.<br>
      <br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">Particular
              comments:<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">page 2: "splits the
              input message in fragments" -&gt; "splits ... into
              fragments"<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">(also page 3)</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p>page 3:
              "does not have overhead": this is a bold statement. What
              is meant<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">here is that the
              tree hashing mode of K12 does not introduce _additional_<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">overhead (due to
              the tree hashing mode) compared with, say, SHAKE; but<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">there remains the
              elementary overhead which makes it so that, for instance,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">hashing 10 bytes is
              not less expensive than hashing 120 bytes.<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">Speaking of
              overhead, it may be worth pointing out that the tree mode<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">implies maintaining
              two separate Keccak contexts (at least for inputs<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">longer than 8192
              bytes), hence double the RAM usage; this may matter<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">for constrained
              embedded devices (i.e. low-end smartcards and<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">microcontrollers,
              where 200 bytes of RAM are a lot).<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">page 4: "from n to
              m exclusive" is a bit confusing since byte at index m<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">is excluded, but
              byte at index n is included. Maybe: "selection of bytes
              from<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">index n (inclusive)
              to m (exclusive)"? Also say somewhere that the first<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">byte of a string
              has index 0 (i.e. this is C/Rust, not Pascal).</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p>page 4:
              "x**y denotes x multiplied by itself y times" -&gt; this
              would<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">actually be
              x**(y+1) (if you multiply x by itself _once_, you get
              x*x).</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">page 4: "the number
              of output bytes requested" -&gt; this lacks a verb;<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">probably: "is the
              requested number of output bytes"</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">page 5: "First the
              message is padded with zeroes to the closest multiple of<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">168 bytes.  Then a
              byte `80` is XORed to the last byte of the padded<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">message.  and the
              resulting string is split into a sequence of 168-byte<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">blocks."<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">-&gt; This could be
              made clearer, first to indicate that it is the length,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">in bytes, of the
              padded message which is to be a multiple of 168; also,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">that the "closest"
              is really a rounding-up (e.g. with a 169-byte input,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">we really need to
              append 167 other bytes, even though 168 is arguably<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">much closer to 169
              than 336). There should be an explicit specification<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">about what to do if
              the input size already has a size multiple of 168:<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">should we add 168
              extra bytes of value zero, or none at all? Note that,<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">in the latter case,
              there must be a special case for an input of length<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">0: if the padded
              input consists of no byte at all, then it becomes<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">difficult to XOR
              0x80 into "the last byte".</span></p>
        </div>
      </blockquote>
      We clarify that the length of the F function is positive.<br>
      This resolve the problem of inputs consisting of no bytes.<br>
      In the definition of KangarooTwelve in section 2.2, there are no
      calls to F<br>
      with input of length 0.
      <p>We clarify the rounding up to the next multiple of 168.</p>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">(Three paragraphs
              later, we learn that the input length is at least<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">1 byte, which
              avoids any issue related to a zero-length input; this<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">should probably be
              explained a bit earlier in the text.)</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p>page
              11: "against all attacks" (end of first paragraph of
              section 5):<o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">this lacks a final
              dot.</span></p>
        </div>
      </blockquote>
      Edited.<br>
      <blockquote type="cite"
        cite="mid:07110745-BDB1-456C-9C5D-D9071C75CCCD@nccgroup.com">
        <div class="WordSection1">
          <p class="MsoPlainText"><span lang="EN-US"><o:p></o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US"><o:p> </o:p></span></p>
          <p class="MsoPlainText"><span lang="EN-US">Thomas<br>
            </span></p>
        </div>
      </blockquote>
      <p>We are open to any additional feedback.<br>
      </p>
      <pre class="moz-signature" cols="72">-- 
Kind regards,

Benoît Viguier
Software Engineer - PhD Student | Cryptography &amp; Formal Methods
Radboud University | Mercator 1, Toernooiveld 212
6525 EC Nijmegen, the Netherlands | <a class="moz-txt-link-abbreviated" href="http://www.viguier.nl" moz-do-not-send="true">www.viguier.nl</a></pre>
    </div>
  </body>
</html>

--------------91C37B32E74FD46B889DE46C--


From nobody Tue Sep  8 06:19:44 2020
Return-Path: <leonid.reyzin@gmail.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D2483A1289 for <crypto-panel@ietfa.amsl.com>; Tue,  8 Sep 2020 06:19:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level: 
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[BAYES_05=-0.5,  FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ah3TjpgVxJSF for <crypto-panel@ietfa.amsl.com>; Tue,  8 Sep 2020 06:19:41 -0700 (PDT)
Received: from mail-io1-f42.google.com (mail-io1-f42.google.com [209.85.166.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D0FE3A1282 for <crypto-panel@irtf.org>; Tue,  8 Sep 2020 06:19:41 -0700 (PDT)
Received: by mail-io1-f42.google.com with SMTP id r25so6028802ioj.0 for <crypto-panel@irtf.org>; Tue, 08 Sep 2020 06:19:41 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kL6GfUaCl1/Und87v81NGU22/UVs04t7Fnu3+bwvxKQ=; b=VZU/txKE73r20jsJgXffWCFz344reYxt1Bc2wWC2EGqbg6PKdpKgxdihqvzkzF0s2I SyheQShix03VSY9caZWyHyEuY6D50WfZkoCUKDzjfFtp11aMwRQrmP8M1Ca/QntOp+xF /ZhsYoimg5GCBkT3wgbtOtozbxedjZOf590oTW6Pfcnnbc6WS0OWlXqcd/RjSe6SOhQs TJn2nxLCM8pv3oM3IOagyY6geTVGUs9mMSu79WTgciH1b+h6pCe04EH9fdxUWCohuKOC CquG2dl/ra+UYhdZdx2OPF+iIIQmqirHZXV2yyeDVCqLaSLxvnSg8LvswbEpTFYtfEyd 8aKg==
X-Gm-Message-State: AOAM532Ewt82ibNppTs7fJxhA5yDtRT4GgOPIfeKYBN31SF5C8nrDNgq n19tF/TFE9daER/YiANkGWvC4dsxzIVQvPCRxJ8=
X-Google-Smtp-Source: ABdhPJzxcHTo5tIVab6TwHie2A1RgV0RpnIpbsO5qUBkgH+TcWoKm5hY7Iwmwq0LnoOS2P5KPVgaCu6SgD3LMS34pBQ=
X-Received: by 2002:a05:6602:cb:: with SMTP id z11mr20221464ioe.96.1599571180132;  Tue, 08 Sep 2020 06:19:40 -0700 (PDT)
MIME-Version: 1.0
References: <CAFDDyk96JKFWHOz3H_knO-twgNtJcg-_6uj3XHxdmdRHiaLccQ@mail.gmail.com> <cbb91213-2c48-5be2-c4db-7a648fc4f2b0@cs.tcd.ie> <02b7d60b-6f57-4773-c362-ab01bdb0a06a@isode.com> <CAL+7JtQjMgHBhaq5ZyiOFQVw9yLCR0H9uiJAkjaYo2UiLxhMng@mail.gmail.com>
In-Reply-To: <CAL+7JtQjMgHBhaq5ZyiOFQVw9yLCR0H9uiJAkjaYo2UiLxhMng@mail.gmail.com>
From: Leonid Reyzin <reyzin@cs.bu.edu>
Date: Tue, 8 Sep 2020 09:19:14 -0400
Message-ID: <CAHZ6D0uVqTyvxkdypo34n7PRPb7TOuZKm4qtZHOVAUj-v3ACtQ@mail.gmail.com>
To: Chloe Martindale <chloemartindale@gmail.com>
Cc: Alexey Melnikov <alexey.melnikov@isode.com>, crypto-panel@irtf.org,  draft-irtf-cfrg-vrf@ietf.org
Content-Type: multipart/alternative; boundary="000000000000fc1ee505aecd2f5a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/rWl5XawJeit5XLlWtHZa81uS3mw>
Subject: Re: [Crypto-panel] Request for review: draft-irtf-cfrg-vrf-07
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Sep 2020 13:19:42 -0000

--000000000000fc1ee505aecd2f5a
Content-Type: text/plain; charset="UTF-8"

Hi Everyone,

Just a ping on this -- the VRF draft has been waiting for the Crypto Review
Panel. I don't know if there's been any progress? Thanks in advance!

 Leo


On Fri, Jun 19, 2020 at 1:04 PM Chloe Martindale <chloemartindale@gmail.com>
wrote:

> I can do it, but I won't be able to look at it until 2 weeks from now
> because of deadlines - I hope that's not too late?
>
> All the best,
> Chloe
>
> On Fri, 19 Jun 2020, 16:42 Alexey Melnikov, <alexey.melnikov@isode.com>
> wrote:
>
>> Dear Crypto Panel members,
>>
>> Nick, Stanislav and I would like to ask Crypto Review Panel members for
>> a review of
>> <https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=1>
>> ("Verifiable Random Functions").
>>
>> Chairs are about to start RGLC on the document, so we would like to
>> solicit some reviews before that.
>>
>>
>> One or two reviews would be appreciated.
>>
>>
>> Thank you,
>>
>> Alexey (on behalf of chairs)
>>
>> _______________________________________________
>> Crypto-panel mailing list
>> Crypto-panel@irtf.org
>> https://www.irtf.org/mailman/listinfo/crypto-panel
>>
>

--000000000000fc1ee505aecd2f5a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Everyone,<div><br></div><div>Just a ping on this -- the=
 VRF draft has been waiting for the Crypto=C2=A0Review Panel. I don&#39;t k=
now if there&#39;s been any progress? Thanks in advance!</div><div><br></di=
v><div>=C2=A0Leo</div><div><br></div></div><br><div class=3D"gmail_quote"><=
div dir=3D"ltr" class=3D"gmail_attr">On Fri, Jun 19, 2020 at 1:04 PM Chloe =
Martindale &lt;<a href=3D"mailto:chloemartindale@gmail.com">chloemartindale=
@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div dir=3D"auto">I can do it, but I won&#39;t be able to look a=
t it until 2 weeks from now because of deadlines - I hope that&#39;s not to=
o late?<div dir=3D"auto"><br></div><div dir=3D"auto">All=C2=A0the best,</di=
v><div dir=3D"auto">Chloe</div></div><br><div class=3D"gmail_quote"><div di=
r=3D"ltr" class=3D"gmail_attr">On Fri, 19 Jun 2020, 16:42 Alexey Melnikov, =
&lt;<a href=3D"mailto:alexey.melnikov@isode.com" target=3D"_blank">alexey.m=
elnikov@isode.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">Dear Crypto Panel members,<br>
<br>
Nick, Stanislav and I would like to ask Crypto Review Panel members for <br=
>
a review of <br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?includ=
e_text=3D1" rel=3D"noreferrer noreferrer" target=3D"_blank">https://datatra=
cker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=3D1</a>&gt; <br>
(&quot;Verifiable Random Functions&quot;).<br>
<br>
Chairs are about to start RGLC on the document, so we would like to <br>
solicit some reviews before that.<br>
<br>
<br>
One or two reviews would be appreciated.<br>
<br>
<br>
Thank you,<br>
<br>
Alexey (on behalf of chairs)<br>
<br>
_______________________________________________<br>
Crypto-panel mailing list<br>
<a href=3D"mailto:Crypto-panel@irtf.org" rel=3D"noreferrer" target=3D"_blan=
k">Crypto-panel@irtf.org</a><br>
<a href=3D"https://www.irtf.org/mailman/listinfo/crypto-panel" rel=3D"noref=
errer noreferrer" target=3D"_blank">https://www.irtf.org/mailman/listinfo/c=
rypto-panel</a><br>
</blockquote></div>
</blockquote></div>

--000000000000fc1ee505aecd2f5a--


From nobody Fri Sep 11 10:41:26 2020
Return-Path: <watsonbladd@gmail.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8AC33A162E for <crypto-panel@ietfa.amsl.com>; Fri, 11 Sep 2020 10:41:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oxI-kop7xbEf for <crypto-panel@ietfa.amsl.com>; Fri, 11 Sep 2020 10:41:21 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D47B3A1632 for <crypto-panel@irtf.org>; Fri, 11 Sep 2020 10:41:21 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id b12so6648401lfp.9 for <crypto-panel@irtf.org>; Fri, 11 Sep 2020 10:41:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=T+2IbGaE08veQXkQSNNirZb3zLL1nmdW7pvdgUkYGec=; b=Um00wUzlMd0qMnRD7dQ1AaR0vSPEmbs8FzUGipvNvv8KPvZPXqhmSQXEhR9F0pDNqk 4Gj81MfEIzv+6xlTt2oxr32AmdDVDJCqyOZLX6pVoqLaNLxKUzyYQSXcTS3Yaiojmc4x d6GYTOGkh/yYM7U1i1uxy1y1z8F/RQUm+KpeAKzHp+m/4hjEvVWvoNw124SiPk0JTzDT EAnZbdhX3+hzllfa4yM50Ri/jYL6FrpQ2JoWGn8T1XXKq5Q3fmAE112k1VOoiU3KC1tj drvdqKpjYJAMwobs43Z3DuDOHsRyU0RcrmIyw8gMSNsjlMKEQroSB+qKJH2bn2snZsDc L4RQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=T+2IbGaE08veQXkQSNNirZb3zLL1nmdW7pvdgUkYGec=; b=lKUtnirFj7rDmhC/r8DSing0trOTmn5tuJO/ZRQ9zLHQ4mMGt7VbWH4/pmcYCgsng5 Hcr7hIaezaIf90naWOl2mo1IggEyGL/To270iSQeVtjajaNORhwQXRrJ010Gxt/lwqcN UilnsTa9/YoUHy4B88tX4XGxbjoVFT5rreCfZfoJsiYU1GMHMStLBIj0rfGiYxj4bOS/ P5P3rXHas+rTN/1Xi3Bnmsjj5gJ3dzWpRaaN5/A1nP3r5RrDAckpQTMRvwsYzVQ/8GgO oS4vQsV2fbBU68wnnhRTKPF3x1gN3UhL9y6sIrdLoVtT0kkzkywq7GJNNx4MQdeia5zD M7Wg==
X-Gm-Message-State: AOAM5324dCoRtwLdcSMfJeUU61L1JnUB7WSsS0UHIBC3OGiPNU9iCiJO kkGRwddIsHe/TM7//Z6j4mbHLuRLkpEvkY9yA6g=
X-Google-Smtp-Source: ABdhPJwznTaETjzOXXuSI/dzSjvBlInyQH7wH5+4ui5SXC5tQnyPN8ZjF6pAd8qGwZrLqGszaeKke8sSbBMwOQedc8E=
X-Received: by 2002:a19:e041:: with SMTP id g1mr584028lfj.337.1599846078914; Fri, 11 Sep 2020 10:41:18 -0700 (PDT)
MIME-Version: 1.0
References: <159709115024.10897.5395496576031260366@ietfa.amsl.com> <CACsn0cmX=DWCP5gpmPbzS=UjXfkBP9ObNpmEXPddsZJHbbhC-g@mail.gmail.com> <CAMr0u6k0f52E0i0ds9gR-xJ=M69RCV1vcYZJXi4Ycyc8QtBV3w@mail.gmail.com> <A0F53C47-3D85-4070-8ED4-A86E50899D13@vigilsec.com> <5f6565e7-49cb-32c4-1873-bac014cee965@isode.com> <80792d11-5400-1c79-ac60-d28d2ae803f0@isode.com> <CAMr0u6=Qokwbe6uUPQbBk3ZO4yUzm+UJT6uUPdjaK20tR837cQ@mail.gmail.com> <BN7PR11MB26415022F5F2FB219554DC6DC15F0@BN7PR11MB2641.namprd11.prod.outlook.com> <BN7PR11MB26418931A9921C0C121703D3C1590@BN7PR11MB2641.namprd11.prod.outlook.com> <CACsn0cke00kmWXNyQ1emWoLjkY47Xx+iFaKiXwdR=gJCPcya7Q@mail.gmail.com> <AM0PR05MB4786942F46EC45406959E23183560@AM0PR05MB4786.eurprd05.prod.outlook.com>
In-Reply-To: <AM0PR05MB4786942F46EC45406959E23183560@AM0PR05MB4786.eurprd05.prod.outlook.com>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Fri, 11 Sep 2020 13:41:07 -0400
Message-ID: <CACsn0cnAeZ6yOrU+Z6Gjv5102dE2Ep1eo2-kz2bYmbcSAxyUGw@mail.gmail.com>
To: =?UTF-8?B?QmrDtnJuIEhhYXNl?= <bjoern.haase@endress.com>
Cc: "Scott Fluhrer (sfluhrer)" <sfluhrer=40cisco.com@dmarc.ietf.org>,  "crypto-panel@irtf.org" <crypto-panel@irtf.org>, "<cfrg@ietf.org>" <cfrg@ietf.org>, Russ Housley <housley@vigilsec.com>, "cfrg-chairs@ietf.org" <cfrg-chairs@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/MqfbDY4--a0gifr9yNcHpRp1Rfw>
Subject: Re: [Crypto-panel] [Cfrg] Fwd: I-D Action: draft-irtf-cfrg-spake2-12.txt
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Sep 2020 17:41:24 -0000

I have just uploaded version -13 which contains suggested text from
Michel by way of Bjorn.

Given we have per-user M and N as an option I decided not to add
per-protocol, but if Scott thinks it's a good idea I'm happy to add
it: not sure it will be used.

On Mon, Aug 24, 2020 at 9:03 AM Bj=C3=B6rn Haase <bjoern.haase@endress.com>=
 wrote:
>
> Dear Watson,
>
> If I understood correctly Manuel and Michel's proof, the reduction to the=
 GAP version of CDH problem refers only to the "perfect-forward security" a=
spect of the SPAKE2 proofs.
>
> To my best knowledge, the game-based proof regarding the "only one passwo=
rd guess per session" feature does rely on "Discrete Logarithm Password-bas=
ed Chosen-basis Computational Diffie-Hellman assumption" (DLPWBCDH) (i.e. w=
ithout the "GAP").
>
> IIRC there is some small margin between the CDH and DLPWBCDH but there is=
 no need for the GAP assumption when carrying out the proof in the game-bas=
ed models, except for the forward-security aspect which to my knowledge req=
uires the DDH oracle.
>
> For the UC proofs, OTOTH the GAP assumption appears to be mandatory, IIUC=
, since this proof strategy also implies forward security.
>
> I'm in close contact with Michel for the CPace draft preparation and I'll=
 ask him what specific wording he would be recommending for your document, =
the next time I'll be talking to him.
>
> Yours,
>
> Bj=C3=B6rn.
>
>
>
> Mit freundlichen Gr=C3=BC=C3=9Fen I Best Regards
>
> Dr. Bj=C3=B6rn Haase
>
>
> Senior Expert Electronics | TGREH Electronics Hardware
>
> Endress+Hauser Liquid Analysis
>
> Endress+Hauser Conducta GmbH+Co.KG | Dieselstrasse 24 | 70839 Gerlingen |=
 Germany
> Phone: +49 7156 209 377 | Fax: +49 7156 209 221
> bjoern.haase@endress.com |  www.ehla.endress.com
>
>
>
>
>
> Endress+Hauser Conducta GmbH+Co.KG
> Amtsgericht Stuttgart HRA 201908
> Sitz der Gesellschaft: Gerlingen
> Pers=C3=B6nlich haftende Gesellschafterin:
> Endress+Hauser Conducta Verwaltungsgesellschaft mbH
> Sitz der Gesellschaft: Gerlingen
> Amtsgericht Stuttgart HRA 201929
> Gesch=C3=A4ftsf=C3=BChrer: Dr. Manfred Jagiella
>
>
> Gem=C3=A4ss Datenschutzgrundverordnung sind wir verpflichtet, Sie zu info=
rmieren, wenn wir personenbezogene Daten von Ihnen erheben.
> Dieser Informationspflicht kommen wir mit folgendem Datenschutzhinweis (h=
ttps://www.endress.com/de/cookies-endress+hauser-website) nach.
>
>
>
>
>
> Disclaimer:
>
> The information transmitted is intended only for the person or entity to =
which it is addressed and may contain confidential, proprietary, and/or pri=
vileged material. Any review, retransmission, dissemination or other use of=
, or taking of any action in reliance upon, this information by persons or =
entities other than the intended recipient is prohibited. If you receive th=
is in error, please contact the sender and delete the material from any com=
puter. This e-mail does not constitute a contract offer, a contract amendme=
nt, or an acceptance of a contract offer unless explicitly and conspicuousl=
y designated or stated as such.
>
>
>
> -----Urspr=C3=BCngliche Nachricht-----
> Von: Cfrg <cfrg-bounces@irtf.org> Im Auftrag von Watson Ladd
> Gesendet: Montag, 24. August 2020 14:42
> An: Scott Fluhrer (sfluhrer) <sfluhrer=3D40cisco.com@dmarc.ietf.org>
> Cc: crypto-panel@irtf.org; <cfrg@ietf.org> <cfrg@ietf.org>; Russ Housley =
<housley@vigilsec.com>; cfrg-chairs@ietf.org
> Betreff: Re: [Cfrg] [Crypto-panel] Fwd: I-D Action: draft-irtf-cfrg-spake=
2-12.txt
>
> On Sun, Aug 23, 2020 at 3:20 PM Scott Fluhrer (sfluhrer)
> <sfluhrer=3D40cisco.com@dmarc.ietf.org> wrote:
> >
> > I looked through it (the Crypto20 crypto conference was last week, that=
 kept me busy); it looked good, with two nits:
>
> Thank you very much for reviewing it so quickly!
>
> >
> >
> >
> > Section 3.1 states =E2=80=9CLets G be a group in which the computationa=
l Diffie-Hellman (CDH) problem is hard=E2=80=9D.  Actually, if you go throu=
gh the security proof, it appears that the slightly stronger =E2=80=9CS-PCC=
DH assumption=E2=80=9D is required.  While it is plausible that, for any gr=
oup where the CDH assumption holds, so does the S-PCCDH assumption, however=
, this is not proven.
>
> So recently https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3=
A%2F%2Feprint.iacr.org%2F2019%2F1194.pdf&amp;data=3D02%7C01%7Cbjoern.haase%=
40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81=
adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DTwffvrezUzSnJeaPaahlF08H7=
44LL1mxocrTksHdvo0%3D&amp;reserved=3D0 reduces to Gap
> Diffie-Hellman. I think I should revise that sentence of 3.1 and
> discuss in security considerations section exactly what is assumed and
> that elliptic curves in the draft are widely conjectured to satisfy
> it. Hopefully this won't confuse anyone more than necessary.
>
> > This draft still relies on a fixed (per group) M and N values; as we ha=
ve argued before, having a global N and M value menas that breaking one dis=
crete problem would mean breaking the entire system globally, and so that a=
rguably too attractive as a target.  Assuming that the authors aren=E2=80=
=99t willing to use a Hash2Curve method to generate N, M values, I would re=
commend that a paragraph be added to the document outlining the situation (=
and perferably giving a procedure where individual protocols can select the=
ir own N, M values)
>
> Section 5: https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A=
%2F%2Ftools.ietf.org%2Fid%2Fdraft-irtf-cfrg-spake2-11.html%23rfc.section.5&=
amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d84=
82b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp=
;sdata=3DTSxHJGOCsecYGoYp4OwBajfg%2FXt%2F9aLbokD%2F7iKprK0%3D&amp;reserved=
=3D0
> has M and N per user, following one of the papers in the references.
> I think a per-protocol option makes sense to add, but it would be nice
> to know if it would be used.
>
>
> >
> >
> >
> > From: Scott Fluhrer (sfluhrer)
> > Sent: Monday, August 17, 2020 7:50 AM
> > To: Stanislav V. Smyshlyaev <smyshsv@gmail.com>; Russ Housley <housley@=
vigilsec.com>; crypto-panel@irtf.org
> > Cc: Alexey Melnikov <alexey.melnikov@isode.com>; cfrg-chairs@ietf.org
> > Subject: RE: [Crypto-panel] Fwd: [Cfrg] I-D Action: draft-irtf-cfrg-spa=
ke2-12.txt
> >
> >
> >
> > I=E2=80=99ll take a quick look at it.
> >
> >
> >
> > From: Crypto-panel <crypto-panel-bounces@irtf.org> On Behalf Of Stanisl=
av V. Smyshlyaev
> > Sent: Monday, August 17, 2020 4:40 AM
> > To: Russ Housley <housley@vigilsec.com>; crypto-panel@irtf.org
> > Cc: Alexey Melnikov <alexey.melnikov@isode.com>; cfrg-chairs@ietf.org
> > Subject: Re: [Crypto-panel] Fwd: [Cfrg] I-D Action: draft-irtf-cfrg-spa=
ke2-12.txt
> >
> >
> >
> > Dear Russ, dear Crypto Panel experts,
> >
> >
> >
> > Any volunteers for a quick review of the updated version of the SPAKE2 =
draft (before commencing a RGLC)?
> >
> >
> >
> > Regards,
> >
> > Stanislav
> >
> >
> >
> > On Tue, 11 Aug 2020 at 20:02, Alexey Melnikov <alexey.melnikov@isode.co=
m> wrote:
> >
> > On 11/08/2020 17:47, Alexey Melnikov wrote:
> >
> > Hi Russ,
> >
> > On 11/08/2020 17:43, Russ Housley wrote:
> >
> > > We recommend the following two protocols to be selected as =C2=ABreco=
mmended by the CFRG for usage in IETF protocols=C2=BB: one balanced PAKE - =
CPace, and one augmented PAKE - OPAQUE.
> >
> >
> >
> > What was the point of the selection process if we are going to publish =
the ones that were not selected too?
> >
> > It is needed by Kitten WG for one of Kerberos documents. The idea is to=
 publish it with a disclaimer that it predated PAKE selection process and w=
as not selected as one of the finalists.
> >
> > To clarify: we don't intend to publish any other PAKE candidates that w=
eren't finalists.
> >
> > Best Regards,
> >
> > Alexey
> >
> >
> >
> > Russ
> >
> >
> >
> >
> >
> >
> >
> > On Aug 11, 2020, at 10:57 AM, Stanislav V. Smyshlyaev <smyshsv@gmail.co=
m> wrote:
> >
> >
> >
> > Dear Crypto Panel experts,
> >
> >
> >
> > Could someone please take a quick look at the updated version (taking i=
nto account the reviews made during the PAKE selection process)?
> >
> >
> >
> > Regards,
> >
> > Stanislav (on behalf of CFRG chairs)
> >
> >
> >
> > ---------- =D0=9F=D0=B5=D1=80=D0=B5=D1=81=D1=8B=D0=BB=D0=B0=D0=B5=D0=BC=
=D0=BE=D0=B5 =D1=81=D0=BE=D0=BE=D0=B1=D1=89=D0=B5=D0=BD=D0=B8=D0=B5 -------=
--
> > =D0=9E=D1=82: Watson Ladd <watsonbladd@gmail.com>
> > =D0=94=D0=B0=D1=82=D0=B0: =D0=BF=D0=BD, 10 =D0=B0=D0=B2=D0=B3. 2020 =D0=
=B3. =D0=B2 23:29
> > =D0=A2=D0=B5=D0=BC=D0=B0: Re: [Cfrg] I-D Action: draft-irtf-cfrg-spake2=
-12.txt
> > =D0=9A=D0=BE=D0=BC=D1=83: <cfrg@ietf.org>
> >
> >
> >
> > This fixes the comment on missing identities received during the PAKE
> > competition which was the only one I found.
> >
> > I think it's ready for RGLC.
> >
> > On Mon, Aug 10, 2020 at 4:27 PM <internet-drafts@ietf.org> wrote:
> > >
> > >
> > > A New Internet-Draft is available from the on-line Internet-Drafts di=
rectories.
> > > This draft is a work item of the Crypto Forum RG of the IRTF.
> > >
> > >         Title           : SPAKE2, a PAKE
> > >         Authors         : Watson Ladd
> > >                           Benjamin Kaduk
> > >         Filename        : draft-irtf-cfrg-spake2-12.txt
> > >         Pages           : 16
> > >         Date            : 2020-08-10
> > >
> > > Abstract:
> > >    This document describes SPAKE2 which is a protocol for two parties
> > >    that share a password to derive a strong shared key with no risk o=
f
> > >    disclosing the password.  This method is compatible with any group=
,
> > >    is computationally efficient, and SPAKE2 has a security proof.  Th=
is
> > >    document predated the CFRG PAKE competition and it was not selecte=
d.
> > >
> > >
> > > The IETF datatracker status page for this draft is:
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fd=
atatracker.ietf.org%2Fdoc%2Fdraft-irtf-cfrg-spake2%2F&amp;data=3D02%7C01%7C=
bjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b7=
34da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DlfQZ%2Bk58AZ=
tuJDwwoL3kp9h%2B1t6eVh%2BO4IhcPF%2BJA9k%3D&amp;reserved=3D0
> > >
> > > There are also htmlized versions available at:
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ft=
ools.ietf.org%2Fhtml%2Fdraft-irtf-cfrg-spake2-12&amp;data=3D02%7C01%7Cbjoer=
n.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4=
ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DM%2B1R6InBuduuxEe=
hA%2Fmz99McvXt8KnILIj9S2bRBifs%3D&amp;reserved=3D0
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fd=
atatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-irtf-cfrg-spake2-12&amp;data=3D02%=
7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52da=
f2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3D9Irix=
LVgOePrXOr4FXNIgwa8x9Jgpldlq5tr55o%2FGgI%3D&amp;reserved=3D0
> > >
> > > A diff from the previous version is available at:
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fw=
ww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-irtf-cfrg-spake2-12&amp;data=3D02%7C01=
%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a9=
3b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DTI3p%2F1E=
M4Un4No8%2BEY6KsExVBQyMXIlg6OzWoZFi8%2FU%3D&amp;reserved=3D0
> > >
> > >
> > > Please note that it may take a couple of minutes from the time of sub=
mission
> > > until the htmlized version and diff are available at tools.ietf.org.
> > >
> > > Internet-Drafts are also available by anonymous FTP at:
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dftp%3A%2F%2Fftp=
.ietf.org%2Finternet-drafts%2F&amp;data=3D02%7C01%7Cbjoern.haase%40endress.=
com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7=
C1%7C1%7C637338697691624309&amp;sdata=3DJLdVl7lCQLtmHJiKclYtzm81ubwwTgRe29P=
JMfhIPtY%3D&amp;reserved=3D0
> > >
> > >
> > > _______________________________________________
> > > Cfrg mailing list
> > > Cfrg@irtf.org
> > > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fw=
ww.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%4=
0endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81a=
dc92b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiA=
uWTpgeZXxZPIlj3z8%3D&amp;reserved=3D0
> >
> >
> >
> > --
> > "Man is born free, but everywhere he is in chains".
> > --Rousseau.
> >
> > _______________________________________________
> > Cfrg mailing list
> > Cfrg@irtf.org
> > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww=
.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40e=
ndress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc=
92b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuW=
TpgeZXxZPIlj3z8%3D&amp;reserved=3D0
> >
> > _______________________________________________
> > Crypto-panel mailing list
> > Crypto-panel@irtf.org
> > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww=
.irtf.org%2Fmailman%2Flistinfo%2Fcrypto-panel&amp;data=3D02%7C01%7Cbjoern.h=
aase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6=
a3f81adc92b7e%7C1%7C1%7C637338697691634306&amp;sdata=3Dw0Bf%2F8e3bInXUJ8Fck=
Oi5dK%2FRPdY879EkrXP02iaSR4%3D&amp;reserved=3D0
> >
> >
> >
> > _______________________________________________
> > Cfrg mailing list
> > Cfrg@irtf.org
> > https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww=
.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40e=
ndress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc=
92b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuW=
TpgeZXxZPIlj3z8%3D&amp;reserved=3D0
>
>
>
> --
> "Man is born free, but everywhere he is in chains".
> --Rousseau.
>
> _______________________________________________
> Cfrg mailing list
> Cfrg@irtf.org
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40end=
ress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92=
b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTp=
geZXxZPIlj3z8%3D&amp;reserved=3D0



--=20
"Man is born free, but everywhere he is in chains".
--Rousseau.


From nobody Sat Sep 12 03:49:50 2020
Return-Path: <smyshsv@gmail.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B2843A0D85 for <crypto-panel@ietfa.amsl.com>; Sat, 12 Sep 2020 03:49:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ec2WoTKwqeqn for <crypto-panel@ietfa.amsl.com>; Sat, 12 Sep 2020 03:49:44 -0700 (PDT)
Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com [IPv6:2a00:1450:4864:20::52c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16EAC3A0D76 for <crypto-panel@irtf.org>; Sat, 12 Sep 2020 03:49:44 -0700 (PDT)
Received: by mail-ed1-x52c.google.com with SMTP id ay8so12852816edb.8 for <crypto-panel@irtf.org>; Sat, 12 Sep 2020 03:49:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=e0K+crhLX5+fO44fY0h/yxADYGFfgOCtrlZvIGR4PJc=; b=VVyn78sq6v1LpapfPO8Om55AYCdqcvmZ7urZI8r6SUpMTbPPVTDkLt3SpAdPnXcQeX yvUSx1+oq6nSL4YSaXhwMDAJGIP8hjqvUSsfW4nkr5je60MKkVarXjT3pIwk8U4+f5cl alcsn3sEIBvYqptCzvk/nyUIKecq0RS64+UlrguqBjhR6hGq5dr4SubCbwC/DQCogh5e z0ycknT4C6X84/i9OqawG7W99zZcSf18o4GKFLq81U8JeXEizVgtWXW9TwDFcc5FcORQ e+IpFL8W7UO/PjGAQO2+SK7qhyZdCMaHj9KK+UkYvYm/7tQRwLkvmaZaQSZjKnBgW0hP 1oJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=e0K+crhLX5+fO44fY0h/yxADYGFfgOCtrlZvIGR4PJc=; b=evui+gFhm5JdVN09IaOBaII7wIKLC+hOtmEbqloT4jizoNJRWtfRFH4Ndl3xbaYqEK RiUIqDVwaaoFnN13piroW8+O83L5K1eu9o31dNg+JzRMApuOQ66vFfQTcI8FK0s2jwqV 85pr7R9CToHkODFTtUsrSSnN/wl8PbrjWSVZy8F4mY4hLVO0N9clbZ8HuVA8e5ughRRm 0Id9c6vcoa+mA13ctbH6FBYXE8z65MXMFZ1YK8bw+/eCDUKAkWc3SGPnexq7weZU1TRU 0ZVSVDzooJpkx7jJ2c46OT3Q9GZ016AIlmdNq7sZtzFuYmaLnWfq9BXheRFZwWqIrMqB LQkw==
X-Gm-Message-State: AOAM533r5maXiss4B+jJvQKZ0Q3mV+CHhTTmHSmB2+rmisbNsEE8qsou rlMpQIi3ckfjn5/iXzxwCwWW7vbHfYFA+JtFKK4=
X-Google-Smtp-Source: ABdhPJy0zrIf3RNTmJQoJQLe24TSmy9F4krMTLPqfXccA0gWMSv34PsqMrg/y+zjmMFUhe2+3F8/MPGL/WlF7U60dfA=
X-Received: by 2002:a05:6402:615:: with SMTP id n21mr7294849edv.59.1599907782475;  Sat, 12 Sep 2020 03:49:42 -0700 (PDT)
MIME-Version: 1.0
References: <159709115024.10897.5395496576031260366@ietfa.amsl.com> <CACsn0cmX=DWCP5gpmPbzS=UjXfkBP9ObNpmEXPddsZJHbbhC-g@mail.gmail.com> <CAMr0u6k0f52E0i0ds9gR-xJ=M69RCV1vcYZJXi4Ycyc8QtBV3w@mail.gmail.com> <A0F53C47-3D85-4070-8ED4-A86E50899D13@vigilsec.com> <5f6565e7-49cb-32c4-1873-bac014cee965@isode.com> <80792d11-5400-1c79-ac60-d28d2ae803f0@isode.com> <CAMr0u6=Qokwbe6uUPQbBk3ZO4yUzm+UJT6uUPdjaK20tR837cQ@mail.gmail.com> <BN7PR11MB26415022F5F2FB219554DC6DC15F0@BN7PR11MB2641.namprd11.prod.outlook.com> <BN7PR11MB26418931A9921C0C121703D3C1590@BN7PR11MB2641.namprd11.prod.outlook.com> <CACsn0cke00kmWXNyQ1emWoLjkY47Xx+iFaKiXwdR=gJCPcya7Q@mail.gmail.com> <AM0PR05MB4786942F46EC45406959E23183560@AM0PR05MB4786.eurprd05.prod.outlook.com> <CACsn0cnAeZ6yOrU+Z6Gjv5102dE2Ep1eo2-kz2bYmbcSAxyUGw@mail.gmail.com>
In-Reply-To: <CACsn0cnAeZ6yOrU+Z6Gjv5102dE2Ep1eo2-kz2bYmbcSAxyUGw@mail.gmail.com>
From: "Stanislav V. Smyshlyaev" <smyshsv@gmail.com>
Date: Sat, 12 Sep 2020 13:49:30 +0300
Message-ID: <CAMr0u6n4sAowO9TiN3NNTZf-udr4P9Jx3aed=qqu0aAwOw1Nyg@mail.gmail.com>
To: Watson Ladd <watsonbladd@gmail.com>
Cc: "<cfrg@ietf.org>" <cfrg@ietf.org>, =?UTF-8?B?QmrDtnJuIEhhYXNl?= <bjoern.haase@endress.com>,  Russ Housley <housley@vigilsec.com>,  "Scott Fluhrer (sfluhrer)" <sfluhrer=40cisco.com@dmarc.ietf.org>,  "cfrg-chairs@ietf.org" <cfrg-chairs@ietf.org>, "crypto-panel@irtf.org" <crypto-panel@irtf.org>
Content-Type: multipart/alternative; boundary="0000000000000c43b605af1b8faa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/wE8FIPzTEKipLg3XSx0k3xZ6g-k>
Subject: Re: [Crypto-panel] [Cfrg] Fwd: I-D Action: draft-irtf-cfrg-spake2-12.txt
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Sep 2020 10:49:47 -0000

--0000000000000c43b605af1b8faa
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Scott, Bjoern, are you happy with the changes?

=D0=BF=D1=82, 11 =D1=81=D0=B5=D0=BD=D1=82. 2020 =D0=B3. =D0=B2 20:41, Watso=
n Ladd <watsonbladd@gmail.com>:

> I have just uploaded version -13 which contains suggested text from
>
> Michel by way of Bjorn.
>
>
>
> Given we have per-user M and N as an option I decided not to add
>
> per-protocol, but if Scott thinks it's a good idea I'm happy to add
>
> it: not sure it will be used.
>
>
>
> On Mon, Aug 24, 2020 at 9:03 AM Bj=C3=B6rn Haase <bjoern.haase@endress.co=
m>
> wrote:
>
> >
>
> > Dear Watson,
>
> >
>
> > If I understood correctly Manuel and Michel's proof, the reduction to
> the GAP version of CDH problem refers only to the "perfect-forward
> security" aspect of the SPAKE2 proofs.
>
> >
>
> > To my best knowledge, the game-based proof regarding the "only one
> password guess per session" feature does rely on "Discrete Logarithm
> Password-based Chosen-basis Computational Diffie-Hellman assumption"
> (DLPWBCDH) (i.e. without the "GAP").
>
> >
>
> > IIRC there is some small margin between the CDH and DLPWBCDH but there
> is no need for the GAP assumption when carrying out the proof in the
> game-based models, except for the forward-security aspect which to my
> knowledge requires the DDH oracle.
>
> >
>
> > For the UC proofs, OTOTH the GAP assumption appears to be mandatory,
> IIUC, since this proof strategy also implies forward security.
>
> >
>
> > I'm in close contact with Michel for the CPace draft preparation and
> I'll ask him what specific wording he would be recommending for your
> document, the next time I'll be talking to him.
>
> >
>
> > Yours,
>
> >
>
> > Bj=C3=B6rn.
>
> >
>
> >
>
> >
>
> > Mit freundlichen Gr=C3=BC=C3=9Fen I Best Regards
>
> >
>
> > Dr. Bj=C3=B6rn Haase
>
> >
>
> >
>
> > Senior Expert Electronics | TGREH Electronics Hardware
>
> >
>
> > Endress+Hauser Liquid Analysis
>
> >
>
> > Endress+Hauser Conducta GmbH+Co.KG | Dieselstrasse 24 | 70839 Gerlingen
> | Germany
>
> > Phone: +49 7156 209 377 | Fax: +49 7156 209 221
>
> > bjoern.haase@endress.com |  www.ehla.endress.com
>
> >
>
> >
>
> >
>
> >
>
> >
>
> > Endress+Hauser Conducta GmbH+Co.KG
>
> > Amtsgericht Stuttgart HRA 201908
>
> > Sitz der Gesellschaft: Gerlingen
>
> > Pers=C3=B6nlich haftende Gesellschafterin:
>
> > Endress+Hauser Conducta Verwaltungsgesellschaft mbH
>
> > Sitz der Gesellschaft: Gerlingen
>
> > Amtsgericht Stuttgart HRA 201929
>
> > Gesch=C3=A4ftsf=C3=BChrer: Dr. Manfred Jagiella
>
> >
>
> >
>
> > Gem=C3=A4ss Datenschutzgrundverordnung sind wir verpflichtet, Sie zu
> informieren, wenn wir personenbezogene Daten von Ihnen erheben.
>
> > Dieser Informationspflicht kommen wir mit folgendem Datenschutzhinweis =
(
> https://www.endress.com/de/cookies-endress+hauser-website) nach.
>
> >
>
> >
>
> >
>
> >
>
> >
>
> > Disclaimer:
>
> >
>
> > The information transmitted is intended only for the person or entity t=
o
> which it is addressed and may contain confidential, proprietary, and/or
> privileged material. Any review, retransmission, dissemination or other u=
se
> of, or taking of any action in reliance upon, this information by persons
> or entities other than the intended recipient is prohibited. If you recei=
ve
> this in error, please contact the sender and delete the material from any
> computer. This e-mail does not constitute a contract offer, a contract
> amendment, or an acceptance of a contract offer unless explicitly and
> conspicuously designated or stated as such.
>
> >
>
> >
>
> >
>
> > -----Urspr=C3=BCngliche Nachricht-----
>
> > Von: Cfrg <cfrg-bounces@irtf.org> Im Auftrag von Watson Ladd
>
> > Gesendet: Montag, 24. August 2020 14:42
>
> > An: Scott Fluhrer (sfluhrer) <sfluhrer=3D40cisco.com@dmarc.ietf.org>
>
> > Cc: crypto-panel@irtf.org; <cfrg@ietf.org> <cfrg@ietf.org>; Russ
> Housley <housley@vigilsec.com>; cfrg-chairs@ietf.org
>
> > Betreff: Re: [Cfrg] [Crypto-panel] Fwd: I-D Action:
> draft-irtf-cfrg-spake2-12.txt
>
> >
>
> > On Sun, Aug 23, 2020 at 3:20 PM Scott Fluhrer (sfluhrer)
>
> > <sfluhrer=3D40cisco.com@dmarc.ietf.org> wrote:
>
> > >
>
> > > I looked through it (the Crypto20 crypto conference was last week,
> that kept me busy); it looked good, with two nits:
>
> >
>
> > Thank you very much for reviewing it so quickly!
>
> >
>
> > >
>
> > >
>
> > >
>
> > > Section 3.1 states =E2=80=9CLets G be a group in which the computatio=
nal
> Diffie-Hellman (CDH) problem is hard=E2=80=9D.  Actually, if you go throu=
gh the
> security proof, it appears that the slightly stronger =E2=80=9CS-PCCDH as=
sumption=E2=80=9D
> is required.  While it is plausible that, for any group where the CDH
> assumption holds, so does the S-PCCDH assumption, however, this is not
> proven.
>
> >
>
> > So recently
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Feprin=
t.iacr.org%2F2019%2F1194.pdf&amp;data=3D02%7C01%7Cbjoern.haase%40endress.co=
m%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1=
%7C1%7C637338697691624309&amp;sdata=3DTwffvrezUzSnJeaPaahlF08H744LL1mxocrTk=
sHdvo0%3D&amp;reserved=3D0
> reduces to Gap
>
> > Diffie-Hellman. I think I should revise that sentence of 3.1 and
>
> > discuss in security considerations section exactly what is assumed and
>
> > that elliptic curves in the draft are widely conjectured to satisfy
>
> > it. Hopefully this won't confuse anyone more than necessary.
>
> >
>
> > > This draft still relies on a fixed (per group) M and N values; as we
> have argued before, having a global N and M value menas that breaking one
> discrete problem would mean breaking the entire system globally, and so
> that arguably too attractive as a target.  Assuming that the authors aren=
=E2=80=99t
> willing to use a Hash2Curve method to generate N, M values, I would
> recommend that a paragraph be added to the document outlining the situati=
on
> (and perferably giving a procedure where individual protocols can select
> their own N, M values)
>
> >
>
> > Section 5:
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftools=
.ietf.org%2Fid%2Fdraft-irtf-cfrg-spake2-11.html%23rfc.section.5&amp;data=3D=
02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C5=
2daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DTS=
xHJGOCsecYGoYp4OwBajfg%2FXt%2F9aLbokD%2F7iKprK0%3D&amp;reserved=3D0
>
> > has M and N per user, following one of the papers in the references.
>
> > I think a per-protocol option makes sense to add, but it would be nice
>
> > to know if it would be used.
>
> >
>
> >
>
> > >
>
> > >
>
> > >
>
> > > From: Scott Fluhrer (sfluhrer)
>
> > > Sent: Monday, August 17, 2020 7:50 AM
>
> > > To: Stanislav V. Smyshlyaev <smyshsv@gmail.com>; Russ Housley <
> housley@vigilsec.com>; crypto-panel@irtf.org
>
> > > Cc: Alexey Melnikov <alexey.melnikov@isode.com>; cfrg-chairs@ietf.org
>
> > > Subject: RE: [Crypto-panel] Fwd: [Cfrg] I-D Action:
> draft-irtf-cfrg-spake2-12.txt
>
> > >
>
> > >
>
> > >
>
> > > I=E2=80=99ll take a quick look at it.
>
> > >
>
> > >
>
> > >
>
> > > From: Crypto-panel <crypto-panel-bounces@irtf.org> On Behalf Of
> Stanislav V. Smyshlyaev
>
> > > Sent: Monday, August 17, 2020 4:40 AM
>
> > > To: Russ Housley <housley@vigilsec.com>; crypto-panel@irtf.org
>
> > > Cc: Alexey Melnikov <alexey.melnikov@isode.com>; cfrg-chairs@ietf.org
>
> > > Subject: Re: [Crypto-panel] Fwd: [Cfrg] I-D Action:
> draft-irtf-cfrg-spake2-12.txt
>
> > >
>
> > >
>
> > >
>
> > > Dear Russ, dear Crypto Panel experts,
>
> > >
>
> > >
>
> > >
>
> > > Any volunteers for a quick review of the updated version of the SPAKE=
2
> draft (before commencing a RGLC)?
>
> > >
>
> > >
>
> > >
>
> > > Regards,
>
> > >
>
> > > Stanislav
>
> > >
>
> > >
>
> > >
>
> > > On Tue, 11 Aug 2020 at 20:02, Alexey Melnikov <
> alexey.melnikov@isode.com> wrote:
>
> > >
>
> > > On 11/08/2020 17:47, Alexey Melnikov wrote:
>
> > >
>
> > > Hi Russ,
>
> > >
>
> > > On 11/08/2020 17:43, Russ Housley wrote:
>
> > >
>
> > > > We recommend the following two protocols to be selected as
> =C2=ABrecommended by the CFRG for usage in IETF protocols=C2=BB: one bala=
nced PAKE -
> CPace, and one augmented PAKE - OPAQUE.
>
> > >
>
> > >
>
> > >
>
> > > What was the point of the selection process if we are going to publis=
h
> the ones that were not selected too?
>
> > >
>
> > > It is needed by Kitten WG for one of Kerberos documents. The idea is
> to publish it with a disclaimer that it predated PAKE selection process a=
nd
> was not selected as one of the finalists.
>
> > >
>
> > > To clarify: we don't intend to publish any other PAKE candidates that
> weren't finalists.
>
> > >
>
> > > Best Regards,
>
> > >
>
> > > Alexey
>
> > >
>
> > >
>
> > >
>
> > > Russ
>
> > >
>
> > >
>
> > >
>
> > >
>
> > >
>
> > >
>
> > >
>
> > > On Aug 11, 2020, at 10:57 AM, Stanislav V. Smyshlyaev <
> smyshsv@gmail.com> wrote:
>
> > >
>
> > >
>
> > >
>
> > > Dear Crypto Panel experts,
>
> > >
>
> > >
>
> > >
>
> > > Could someone please take a quick look at the updated version (taking
> into account the reviews made during the PAKE selection process)?
>
> > >
>
> > >
>
> > >
>
> > > Regards,
>
> > >
>
> > > Stanislav (on behalf of CFRG chairs)
>
> > >
>
> > >
>
> > >
>
> > > ---------- =D0=9F=D0=B5=D1=80=D0=B5=D1=81=D1=8B=D0=BB=D0=B0=D0=B5=D0=
=BC=D0=BE=D0=B5 =D1=81=D0=BE=D0=BE=D0=B1=D1=89=D0=B5=D0=BD=D0=B8=D0=B5 ----=
-----
>
> > > =D0=9E=D1=82: Watson Ladd <watsonbladd@gmail.com>
>
> > > =D0=94=D0=B0=D1=82=D0=B0: =D0=BF=D0=BD, 10 =D0=B0=D0=B2=D0=B3. 2020 =
=D0=B3. =D0=B2 23:29
>
> > > =D0=A2=D0=B5=D0=BC=D0=B0: Re: [Cfrg] I-D Action: draft-irtf-cfrg-spak=
e2-12.txt
>
> > > =D0=9A=D0=BE=D0=BC=D1=83: <cfrg@ietf.org>
>
> > >
>
> > >
>
> > >
>
> > > This fixes the comment on missing identities received during the PAKE
>
> > > competition which was the only one I found.
>
> > >
>
> > > I think it's ready for RGLC.
>
> > >
>
> > > On Mon, Aug 10, 2020 at 4:27 PM <internet-drafts@ietf.org> wrote:
>
> > > >
>
> > > >
>
> > > > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
> > > > This draft is a work item of the Crypto Forum RG of the IRTF.
>
> > > >
>
> > > >         Title           : SPAKE2, a PAKE
>
> > > >         Authors         : Watson Ladd
>
> > > >                           Benjamin Kaduk
>
> > > >         Filename        : draft-irtf-cfrg-spake2-12.txt
>
> > > >         Pages           : 16
>
> > > >         Date            : 2020-08-10
>
> > > >
>
> > > > Abstract:
>
> > > >    This document describes SPAKE2 which is a protocol for two parti=
es
>
> > > >    that share a password to derive a strong shared key with no risk
> of
>
> > > >    disclosing the password.  This method is compatible with any
> group,
>
> > > >    is computationally efficient, and SPAKE2 has a security proof.
> This
>
> > > >    document predated the CFRG PAKE competition and it was not
> selected.
>
> > > >
>
> > > >
>
> > > > The IETF datatracker status page for this draft is:
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatat=
racker.ietf.org%2Fdoc%2Fdraft-irtf-cfrg-spake2%2F&amp;data=3D02%7C01%7Cbjoe=
rn.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da=
4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DlfQZ%2Bk58AZtuJD=
wwoL3kp9h%2B1t6eVh%2BO4IhcPF%2BJA9k%3D&amp;reserved=3D0
>
> > > >
>
> > > > There are also htmlized versions available at:
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftools=
.ietf.org%2Fhtml%2Fdraft-irtf-cfrg-spake2-12&amp;data=3D02%7C01%7Cbjoern.ha=
ase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a=
3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DM%2B1R6InBuduuxEehA%2=
Fmz99McvXt8KnILIj9S2bRBifs%3D&amp;reserved=3D0
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatat=
racker.ietf.org%2Fdoc%2Fhtml%2Fdraft-irtf-cfrg-spake2-12&amp;data=3D02%7C01=
%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a9=
3b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3D9IrixLVgO=
ePrXOr4FXNIgwa8x9Jgpldlq5tr55o%2FGgI%3D&amp;reserved=3D0
>
> > > >
>
> > > > A diff from the previous version is available at:
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
etf.org%2Frfcdiff%3Furl2%3Ddraft-irtf-cfrg-spake2-12&amp;data=3D02%7C01%7Cb=
joern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b73=
4da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;sdata=3DTI3p%2F1EM4Un=
4No8%2BEY6KsExVBQyMXIlg6OzWoZFi8%2FU%3D&amp;reserved=3D0
>
> > > >
>
> > > >
>
> > > > Please note that it may take a couple of minutes from the time of
> submission
>
> > > > until the htmlized version and diff are available at tools.ietf.org=
.
>
> > > >
>
> > > > Internet-Drafts are also available by anonymous FTP at:
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dftp%3A%2F%2Fftp.iet=
f.org%2Finternet-drafts%2F&amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%=
7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7=
C1%7C637338697691624309&amp;sdata=3DJLdVl7lCQLtmHJiKclYtzm81ubwwTgRe29PJMfh=
IPtY%3D&amp;reserved=3D0
>
> > > >
>
> > > >
>
> > > > _______________________________________________
>
> > > > Cfrg mailing list
>
> > > > Cfrg@irtf.org
>
> > > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40end=
ress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92=
b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTp=
geZXxZPIlj3z8%3D&amp;reserved=3D0
>
> > >
>
> > >
>
> > >
>
> > > --
>
> > > "Man is born free, but everywhere he is in chains".
>
> > > --Rousseau.
>
> > >
>
> > > _______________________________________________
>
> > > Cfrg mailing list
>
> > > Cfrg@irtf.org
>
> > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40end=
ress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92=
b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTp=
geZXxZPIlj3z8%3D&amp;reserved=3D0
>
> > >
>
> > > _______________________________________________
>
> > > Crypto-panel mailing list
>
> > > Crypto-panel@irtf.org
>
> > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcrypto-panel&amp;data=3D02%7C01%7Cbjoern.haa=
se%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3=
f81adc92b7e%7C1%7C1%7C637338697691634306&amp;sdata=3Dw0Bf%2F8e3bInXUJ8FckOi=
5dK%2FRPdY879EkrXP02iaSR4%3D&amp;reserved=3D0
>
> > >
>
> > >
>
> > >
>
> > > _______________________________________________
>
> > > Cfrg mailing list
>
> > > Cfrg@irtf.org
>
> > >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40end=
ress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92=
b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTp=
geZXxZPIlj3z8%3D&amp;reserved=3D0
>
> >
>
> >
>
> >
>
> > --
>
> > "Man is born free, but everywhere he is in chains".
>
> > --Rousseau.
>
> >
>
> > _______________________________________________
>
> > Cfrg mailing list
>
> > Cfrg@irtf.org
>
> >
> https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i=
rtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;data=3D02%7C01%7Cbjoern.haase%40end=
ress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92=
b7e%7C1%7C1%7C637338697691634306&amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTp=
geZXxZPIlj3z8%3D&amp;reserved=3D0
>
>
>
>
>
>
>
> --
>
> "Man is born free, but everywhere he is in chains".
>
> --Rousseau.
>
>

--0000000000000c43b605af1b8faa
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Scott, Bjoern, are you happy with the changes?</div><div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">=D0=BF=
=D1=82, 11 =D1=81=D0=B5=D0=BD=D1=82. 2020 =D0=B3. =D0=B2 20:41, Watson Ladd=
 &lt;<a href=3D"mailto:watsonbladd@gmail.com">watsonbladd@gmail.com</a>&gt;=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">I have just uploaded version -13 =
which contains suggested text from<br><br>Michel by way of Bjorn.<br><br><b=
r><br>Given we have per-user M and N as an option I decided not to add<br><=
br>per-protocol, but if Scott thinks it&#39;s a good idea I&#39;m happy to =
add<br><br>it: not sure it will be used.<br><br><br><br>On Mon, Aug 24, 202=
0 at 9:03 AM Bj=C3=B6rn Haase &lt;<a href=3D"mailto:bjoern.haase@endress.co=
m" target=3D"_blank">bjoern.haase@endress.com</a>&gt; wrote:<br><br>&gt;<br=
><br>&gt; Dear Watson,<br><br>&gt;<br><br>&gt; If I understood correctly Ma=
nuel and Michel&#39;s proof, the reduction to the GAP version of CDH proble=
m refers only to the &quot;perfect-forward security&quot; aspect of the SPA=
KE2 proofs.<br><br>&gt;<br><br>&gt; To my best knowledge, the game-based pr=
oof regarding the &quot;only one password guess per session&quot; feature d=
oes rely on &quot;Discrete Logarithm Password-based Chosen-basis Computatio=
nal Diffie-Hellman assumption&quot; (DLPWBCDH) (i.e. without the &quot;GAP&=
quot;).<br><br>&gt;<br><br>&gt; IIRC there is some small margin between the=
 CDH and DLPWBCDH but there is no need for the GAP assumption when carrying=
 out the proof in the game-based models, except for the forward-security as=
pect which to my knowledge requires the DDH oracle.<br><br>&gt;<br><br>&gt;=
 For the UC proofs, OTOTH the GAP assumption appears to be mandatory, IIUC,=
 since this proof strategy also implies forward security.<br><br>&gt;<br><b=
r>&gt; I&#39;m in close contact with Michel for the CPace draft preparation=
 and I&#39;ll ask him what specific wording he would be recommending for yo=
ur document, the next time I&#39;ll be talking to him.<br><br>&gt;<br><br>&=
gt; Yours,<br><br>&gt;<br><br>&gt; Bj=C3=B6rn.<br><br>&gt;<br><br>&gt;<br><=
br>&gt;<br><br>&gt; Mit freundlichen Gr=C3=BC=C3=9Fen I Best Regards<br><br=
>&gt;<br><br>&gt; Dr. Bj=C3=B6rn Haase<br><br>&gt;<br><br>&gt;<br><br>&gt; =
Senior Expert Electronics | TGREH Electronics Hardware<br><br>&gt;<br><br>&=
gt; Endress+Hauser Liquid Analysis<br><br>&gt;<br><br>&gt; Endress+Hauser C=
onducta GmbH+Co.KG | Dieselstrasse 24 | 70839 Gerlingen | Germany<br><br>&g=
t; Phone: +49 7156 209 377 | Fax: +49 7156 209 221<br><br>&gt; <a href=3D"m=
ailto:bjoern.haase@endress.com" target=3D"_blank">bjoern.haase@endress.com<=
/a> |=C2=A0 <a href=3D"http://www.ehla.endress.com" rel=3D"noreferrer" targ=
et=3D"_blank">www.ehla.endress.com</a><br><br>&gt;<br><br>&gt;<br><br>&gt;<=
br><br>&gt;<br><br>&gt;<br><br>&gt; Endress+Hauser Conducta GmbH+Co.KG<br><=
br>&gt; Amtsgericht Stuttgart HRA 201908<br><br>&gt; Sitz der Gesellschaft:=
 Gerlingen<br><br>&gt; Pers=C3=B6nlich haftende Gesellschafterin:<br><br>&g=
t; Endress+Hauser Conducta Verwaltungsgesellschaft mbH<br><br>&gt; Sitz der=
 Gesellschaft: Gerlingen<br><br>&gt; Amtsgericht Stuttgart HRA 201929<br><b=
r>&gt; Gesch=C3=A4ftsf=C3=BChrer: Dr. Manfred Jagiella<br><br>&gt;<br><br>&=
gt;<br><br>&gt; Gem=C3=A4ss Datenschutzgrundverordnung sind wir verpflichte=
t, Sie zu informieren, wenn wir personenbezogene Daten von Ihnen erheben.<b=
r><br>&gt; Dieser Informationspflicht kommen wir mit folgendem Datenschutzh=
inweis (<a href=3D"https://www.endress.com/de/cookies-endress+hauser-websit=
e" rel=3D"noreferrer" target=3D"_blank">https://www.endress.com/de/cookies-=
endress+hauser-website</a>) nach.<br><br>&gt;<br><br>&gt;<br><br>&gt;<br><b=
r>&gt;<br><br>&gt;<br><br>&gt; Disclaimer:<br><br>&gt;<br><br>&gt; The info=
rmation transmitted is intended only for the person or entity to which it i=
s addressed and may contain confidential, proprietary, and/or privileged ma=
terial. Any review, retransmission, dissemination or other use of, or takin=
g of any action in reliance upon, this information by persons or entities o=
ther than the intended recipient is prohibited. If you receive this in erro=
r, please contact the sender and delete the material from any computer. Thi=
s e-mail does not constitute a contract offer, a contract amendment, or an =
acceptance of a contract offer unless explicitly and conspicuously designat=
ed or stated as such.<br><br>&gt;<br><br>&gt;<br><br>&gt;<br><br>&gt; -----=
Urspr=C3=BCngliche Nachricht-----<br><br>&gt; Von: Cfrg &lt;<a href=3D"mail=
to:cfrg-bounces@irtf.org" target=3D"_blank">cfrg-bounces@irtf.org</a>&gt; I=
m Auftrag von Watson Ladd<br><br>&gt; Gesendet: Montag, 24. August 2020 14:=
42<br><br>&gt; An: Scott Fluhrer (sfluhrer) &lt;sfluhrer=3D<a href=3D"mailt=
o:40cisco.com@dmarc.ietf.org" target=3D"_blank">40cisco.com@dmarc.ietf.org<=
/a>&gt;<br><br>&gt; Cc: <a href=3D"mailto:crypto-panel@irtf.org" target=3D"=
_blank">crypto-panel@irtf.org</a>; &lt;<a href=3D"mailto:cfrg@ietf.org" tar=
get=3D"_blank">cfrg@ietf.org</a>&gt; &lt;<a href=3D"mailto:cfrg@ietf.org" t=
arget=3D"_blank">cfrg@ietf.org</a>&gt;; Russ Housley &lt;<a href=3D"mailto:=
housley@vigilsec.com" target=3D"_blank">housley@vigilsec.com</a>&gt;; <a hr=
ef=3D"mailto:cfrg-chairs@ietf.org" target=3D"_blank">cfrg-chairs@ietf.org</=
a><br><br>&gt; Betreff: Re: [Cfrg] [Crypto-panel] Fwd: I-D Action: draft-ir=
tf-cfrg-spake2-12.txt<br><br>&gt;<br><br>&gt; On Sun, Aug 23, 2020 at 3:20 =
PM Scott Fluhrer (sfluhrer)<br><br>&gt; &lt;sfluhrer=3D<a href=3D"mailto:40=
cisco.com@dmarc.ietf.org" target=3D"_blank">40cisco.com@dmarc.ietf.org</a>&=
gt; wrote:<br><br>&gt; &gt;<br><br>&gt; &gt; I looked through it (the Crypt=
o20 crypto conference was last week, that kept me busy); it looked good, wi=
th two nits:<br><br>&gt;<br><br>&gt; Thank you very much for reviewing it s=
o quickly!<br><br>&gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<b=
r><br>&gt; &gt; Section 3.1 states =E2=80=9CLets G be a group in which the =
computational Diffie-Hellman (CDH) problem is hard=E2=80=9D.=C2=A0 Actually=
, if you go through the security proof, it appears that the slightly strong=
er =E2=80=9CS-PCCDH assumption=E2=80=9D is required.=C2=A0 While it is plau=
sible that, for any group where the CDH assumption holds, so does the S-PCC=
DH assumption, however, this is not proven.<br><br>&gt;<br><br>&gt; So rece=
ntly <a href=3D"https://eur03.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Feprint.iacr.org%2F2019%2F1194.pdf&amp;amp;data=3D02%7C01%7Cbjoern.=
haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac=
6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DTwffvrezUzSnJea=
PaahlF08H744LL1mxocrTksHdvo0%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" ta=
rget=3D"_blank">https://eur03.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Feprint.iacr.org%2F2019%2F1194.pdf&amp;amp;data=3D02%7C01%7Cbjoern.=
haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac=
6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DTwffvrezUzSnJea=
PaahlF08H744LL1mxocrTksHdvo0%3D&amp;amp;reserved=3D0</a> reduces to Gap<br>=
<br>&gt; Diffie-Hellman. I think I should revise that sentence of 3.1 and<b=
r><br>&gt; discuss in security considerations section exactly what is assum=
ed and<br><br>&gt; that elliptic curves in the draft are widely conjectured=
 to satisfy<br><br>&gt; it. Hopefully this won&#39;t confuse anyone more th=
an necessary.<br><br>&gt;<br><br>&gt; &gt; This draft still relies on a fix=
ed (per group) M and N values; as we have argued before, having a global N =
and M value menas that breaking one discrete problem would mean breaking th=
e entire system globally, and so that arguably too attractive as a target.=
=C2=A0 Assuming that the authors aren=E2=80=99t willing to use a Hash2Curve=
 method to generate N, M values, I would recommend that a paragraph be adde=
d to the document outlining the situation (and perferably giving a procedur=
e where individual protocols can select their own N, M values)<br><br>&gt;<=
br><br>&gt; Section 5: <a href=3D"https://eur03.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fid%2Fdraft-irtf-cfrg-spake2-11.=
html%23rfc.section.5&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C=
8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1=
%7C637338697691624309&amp;amp;sdata=3DTSxHJGOCsecYGoYp4OwBajfg%2FXt%2F9aLbo=
kD%2F7iKprK0%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" target=3D"_blank">=
https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftools.i=
etf.org%2Fid%2Fdraft-irtf-cfrg-spake2-11.html%23rfc.section.5&amp;amp;data=
=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%=
7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sda=
ta=3DTSxHJGOCsecYGoYp4OwBajfg%2FXt%2F9aLbokD%2F7iKprK0%3D&amp;amp;reserved=
=3D0</a><br><br>&gt; has M and N per user, following one of the papers in t=
he references.<br><br>&gt; I think a per-protocol option makes sense to add=
, but it would be nice<br><br>&gt; to know if it would be used.<br><br>&gt;=
<br><br>&gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt;=
 &gt; From: Scott Fluhrer (sfluhrer)<br><br>&gt; &gt; Sent: Monday, August =
17, 2020 7:50 AM<br><br>&gt; &gt; To: Stanislav V. Smyshlyaev &lt;<a href=
=3D"mailto:smyshsv@gmail.com" target=3D"_blank">smyshsv@gmail.com</a>&gt;; =
Russ Housley &lt;<a href=3D"mailto:housley@vigilsec.com" target=3D"_blank">=
housley@vigilsec.com</a>&gt;; <a href=3D"mailto:crypto-panel@irtf.org" targ=
et=3D"_blank">crypto-panel@irtf.org</a><br><br>&gt; &gt; Cc: Alexey Melniko=
v &lt;<a href=3D"mailto:alexey.melnikov@isode.com" target=3D"_blank">alexey=
.melnikov@isode.com</a>&gt;; <a href=3D"mailto:cfrg-chairs@ietf.org" target=
=3D"_blank">cfrg-chairs@ietf.org</a><br><br>&gt; &gt; Subject: RE: [Crypto-=
panel] Fwd: [Cfrg] I-D Action: draft-irtf-cfrg-spake2-12.txt<br><br>&gt; &g=
t;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; I=E2=80=99ll take a q=
uick look at it.<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>=
&gt; &gt; From: Crypto-panel &lt;<a href=3D"mailto:crypto-panel-bounces@irt=
f.org" target=3D"_blank">crypto-panel-bounces@irtf.org</a>&gt; On Behalf Of=
 Stanislav V. Smyshlyaev<br><br>&gt; &gt; Sent: Monday, August 17, 2020 4:4=
0 AM<br><br>&gt; &gt; To: Russ Housley &lt;<a href=3D"mailto:housley@vigils=
ec.com" target=3D"_blank">housley@vigilsec.com</a>&gt;; <a href=3D"mailto:c=
rypto-panel@irtf.org" target=3D"_blank">crypto-panel@irtf.org</a><br><br>&g=
t; &gt; Cc: Alexey Melnikov &lt;<a href=3D"mailto:alexey.melnikov@isode.com=
" target=3D"_blank">alexey.melnikov@isode.com</a>&gt;; <a href=3D"mailto:cf=
rg-chairs@ietf.org" target=3D"_blank">cfrg-chairs@ietf.org</a><br><br>&gt; =
&gt; Subject: Re: [Crypto-panel] Fwd: [Cfrg] I-D Action: draft-irtf-cfrg-sp=
ake2-12.txt<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; =
&gt; Dear Russ, dear Crypto Panel experts,<br><br>&gt; &gt;<br><br>&gt; &gt=
;<br><br>&gt; &gt;<br><br>&gt; &gt; Any volunteers for a quick review of th=
e updated version of the SPAKE2 draft (before commencing a RGLC)?<br><br>&g=
t; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; Regards,<br><br>=
&gt; &gt;<br><br>&gt; &gt; Stanislav<br><br>&gt; &gt;<br><br>&gt; &gt;<br><=
br>&gt; &gt;<br><br>&gt; &gt; On Tue, 11 Aug 2020 at 20:02, Alexey Melnikov=
 &lt;<a href=3D"mailto:alexey.melnikov@isode.com" target=3D"_blank">alexey.=
melnikov@isode.com</a>&gt; wrote:<br><br>&gt; &gt;<br><br>&gt; &gt; On 11/0=
8/2020 17:47, Alexey Melnikov wrote:<br><br>&gt; &gt;<br><br>&gt; &gt; Hi R=
uss,<br><br>&gt; &gt;<br><br>&gt; &gt; On 11/08/2020 17:43, Russ Housley wr=
ote:<br><br>&gt; &gt;<br><br>&gt; &gt; &gt; We recommend the following two =
protocols to be selected as =C2=ABrecommended by the CFRG for usage in IETF=
 protocols=C2=BB: one balanced PAKE - CPace, and one augmented PAKE - OPAQU=
E.<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; What=
 was the point of the selection process if we are going to publish the ones=
 that were not selected too?<br><br>&gt; &gt;<br><br>&gt; &gt; It is needed=
 by Kitten WG for one of Kerberos documents. The idea is to publish it with=
 a disclaimer that it predated PAKE selection process and was not selected =
as one of the finalists.<br><br>&gt; &gt;<br><br>&gt; &gt; To clarify: we d=
on&#39;t intend to publish any other PAKE candidates that weren&#39;t final=
ists.<br><br>&gt; &gt;<br><br>&gt; &gt; Best Regards,<br><br>&gt; &gt;<br><=
br>&gt; &gt; Alexey<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><=
br>&gt; &gt; Russ<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br=
>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &=
gt; On Aug 11, 2020, at 10:57 AM, Stanislav V. Smyshlyaev &lt;<a href=3D"ma=
ilto:smyshsv@gmail.com" target=3D"_blank">smyshsv@gmail.com</a>&gt; wrote:<=
br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; Dear Cr=
ypto Panel experts,<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><=
br>&gt; &gt; Could someone please take a quick look at the updated version =
(taking into account the reviews made during the PAKE selection process)?<b=
r><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; Regards,=
<br><br>&gt; &gt;<br><br>&gt; &gt; Stanislav (on behalf of CFRG chairs)<br>=
<br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; ----------=
 =D0=9F=D0=B5=D1=80=D0=B5=D1=81=D1=8B=D0=BB=D0=B0=D0=B5=D0=BC=D0=BE=D0=B5 =
=D1=81=D0=BE=D0=BE=D0=B1=D1=89=D0=B5=D0=BD=D0=B8=D0=B5 ---------<br><br>&gt=
; &gt; =D0=9E=D1=82: Watson Ladd &lt;<a href=3D"mailto:watsonbladd@gmail.co=
m" target=3D"_blank">watsonbladd@gmail.com</a>&gt;<br><br>&gt; &gt; =D0=94=
=D0=B0=D1=82=D0=B0: =D0=BF=D0=BD, 10 =D0=B0=D0=B2=D0=B3. 2020 =D0=B3. =D0=
=B2 23:29<br><br>&gt; &gt; =D0=A2=D0=B5=D0=BC=D0=B0: Re: [Cfrg] I-D Action:=
 draft-irtf-cfrg-spake2-12.txt<br><br>&gt; &gt; =D0=9A=D0=BE=D0=BC=D1=83: &=
lt;<a href=3D"mailto:cfrg@ietf.org" target=3D"_blank">cfrg@ietf.org</a>&gt;=
<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; This f=
ixes the comment on missing identities received during the PAKE<br><br>&gt;=
 &gt; competition which was the only one I found.<br><br>&gt; &gt;<br><br>&=
gt; &gt; I think it&#39;s ready for RGLC.<br><br>&gt; &gt;<br><br>&gt; &gt;=
 On Mon, Aug 10, 2020 at 4:27 PM &lt;<a href=3D"mailto:internet-drafts@ietf=
.org" target=3D"_blank">internet-drafts@ietf.org</a>&gt; wrote:<br><br>&gt;=
 &gt; &gt;<br><br>&gt; &gt; &gt;<br><br>&gt; &gt; &gt; A New Internet-Draft=
 is available from the on-line Internet-Drafts directories.<br><br>&gt; &gt=
; &gt; This draft is a work item of the Crypto Forum RG of the IRTF.<br><br=
>&gt; &gt; &gt;<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Titl=
e=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: SPAKE2, a PAKE<br><br>&gt; &gt;=
 &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0: Watson Ladd<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Benjamin Kad=
uk<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Filename=C2=A0 =
=C2=A0 =C2=A0 =C2=A0 : draft-irtf-cfrg-spake2-12.txt<br><br>&gt; &gt; &gt;=
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0: 16<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Date=C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 2020-08-10<br><br>&gt; &gt; &gt;<b=
r><br>&gt; &gt; &gt; Abstract:<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 This docu=
ment describes SPAKE2 which is a protocol for two parties<br><br>&gt; &gt; =
&gt;=C2=A0 =C2=A0 that share a password to derive a strong shared key with =
no risk of<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 disclosing the password.=C2=
=A0 This method is compatible with any group,<br><br>&gt; &gt; &gt;=C2=A0 =
=C2=A0 is computationally efficient, and SPAKE2 has a security proof.=C2=A0=
 This<br><br>&gt; &gt; &gt;=C2=A0 =C2=A0 document predated the CFRG PAKE co=
mpetition and it was not selected.<br><br>&gt; &gt; &gt;<br><br>&gt; &gt; &=
gt;<br><br>&gt; &gt; &gt; The IETF datatracker status page for this draft i=
s:<br><br>&gt; &gt; &gt; <a href=3D"https://eur03.safelinks.protection.outl=
ook.com/?url=3Dhttps%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-irtf-cfrg-s=
pake2%2F&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a=
4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697=
691624309&amp;amp;sdata=3DlfQZ%2Bk58AZtuJDwwoL3kp9h%2B1t6eVh%2BO4IhcPF%2BJA=
9k%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" target=3D"_blank">https://eu=
r03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatatracker.ietf.=
org%2Fdoc%2Fdraft-irtf-cfrg-spake2%2F&amp;amp;data=3D02%7C01%7Cbjoern.haase=
%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f8=
1adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DlfQZ%2Bk58AZtuJDwwoL=
3kp9h%2B1t6eVh%2BO4IhcPF%2BJA9k%3D&amp;amp;reserved=3D0</a><br><br>&gt; &gt=
; &gt;<br><br>&gt; &gt; &gt; There are also htmlized versions available at:=
<br><br>&gt; &gt; &gt; <a href=3D"https://eur03.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-irtf-cfrg-spake2-1=
2&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077=
608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C6373386976916243=
09&amp;amp;sdata=3DM%2B1R6InBuduuxEehA%2Fmz99McvXt8KnILIj9S2bRBifs%3D&amp;a=
mp;reserved=3D0" rel=3D"noreferrer" target=3D"_blank">https://eur03.safelin=
ks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraf=
t-irtf-cfrg-spake2-12&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7=
C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C=
1%7C637338697691624309&amp;amp;sdata=3DM%2B1R6InBuduuxEehA%2Fmz99McvXt8KnIL=
Ij9S2bRBifs%3D&amp;amp;reserved=3D0</a><br><br>&gt; &gt; &gt; <a href=3D"ht=
tps://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatatrack=
er.ietf.org%2Fdoc%2Fhtml%2Fdraft-irtf-cfrg-spake2-12&amp;amp;data=3D02%7C01=
%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a9=
3b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3D9Irix=
LVgOePrXOr4FXNIgwa8x9Jgpldlq5tr55o%2FGgI%3D&amp;amp;reserved=3D0" rel=3D"no=
referrer" target=3D"_blank">https://eur03.safelinks.protection.outlook.com/=
?url=3Dhttps%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-irtf-cfrg-sp=
ake2-12&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4=
c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C6373386976=
91624309&amp;amp;sdata=3D9IrixLVgOePrXOr4FXNIgwa8x9Jgpldlq5tr55o%2FGgI%3D&a=
mp;amp;reserved=3D0</a><br><br>&gt; &gt; &gt;<br><br>&gt; &gt; &gt; A diff =
from the previous version is available at:<br><br>&gt; &gt; &gt; <a href=3D=
"https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ie=
tf.org%2Frfcdiff%3Furl2%3Ddraft-irtf-cfrg-spake2-12&amp;amp;data=3D02%7C01%=
7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93=
b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DTI3p%2=
F1EM4Un4No8%2BEY6KsExVBQyMXIlg6OzWoZFi8%2FU%3D&amp;amp;reserved=3D0" rel=3D=
"noreferrer" target=3D"_blank">https://eur03.safelinks.protection.outlook.c=
om/?url=3Dhttps%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-irtf-cfrg-spa=
ke2-12&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c=
38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C63733869769=
1624309&amp;amp;sdata=3DTI3p%2F1EM4Un4No8%2BEY6KsExVBQyMXIlg6OzWoZFi8%2FU%3=
D&amp;amp;reserved=3D0</a><br><br>&gt; &gt; &gt;<br><br>&gt; &gt; &gt;<br><=
br>&gt; &gt; &gt; Please note that it may take a couple of minutes from the=
 time of submission<br><br>&gt; &gt; &gt; until the htmlized version and di=
ff are available at <a href=3D"http://tools.ietf.org" rel=3D"noreferrer" ta=
rget=3D"_blank">tools.ietf.org</a>.<br><br>&gt; &gt; &gt;<br><br>&gt; &gt; =
&gt; Internet-Drafts are also available by anonymous FTP at:<br><br>&gt; &g=
t; &gt; <a href=3D"https://eur03.safelinks.protection.outlook.com/?url=3Dft=
p%3A%2F%2Fftp.ietf.org%2Finternet-drafts%2F&amp;amp;data=3D02%7C01%7Cbjoern=
.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4a=
c6a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DJLdVl7lCQLtmHJ=
iKclYtzm81ubwwTgRe29PJMfhIPtY%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" t=
arget=3D"_blank">https://eur03.safelinks.protection.outlook.com/?url=3Dftp%=
3A%2F%2Fftp.ietf.org%2Finternet-drafts%2F&amp;amp;data=3D02%7C01%7Cbjoern.h=
aase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6=
a3f81adc92b7e%7C1%7C1%7C637338697691624309&amp;amp;sdata=3DJLdVl7lCQLtmHJiK=
clYtzm81ubwwTgRe29PJMfhIPtY%3D&amp;amp;reserved=3D0</a><br><br>&gt; &gt; &g=
t;<br><br>&gt; &gt; &gt;<br><br>&gt; &gt; &gt; ____________________________=
___________________<br><br>&gt; &gt; &gt; Cfrg mailing list<br><br>&gt; &gt=
; &gt; <a href=3D"mailto:Cfrg@irtf.org" target=3D"_blank">Cfrg@irtf.org</a>=
<br><br>&gt; &gt; &gt; <a href=3D"https://eur03.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;amp=
;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b=
33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691634306&amp;am=
p;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3z8%3D&amp;amp;reserved=
=3D0" rel=3D"noreferrer" target=3D"_blank">https://eur03.safelinks.protecti=
on.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2Flistinfo%2Fcfr=
g&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077=
608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C6373386976916343=
06&amp;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3z8%3D&amp;amp;r=
eserved=3D0</a><br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&=
gt; &gt; --<br><br>&gt; &gt; &quot;Man is born free, but everywhere he is i=
n chains&quot;.<br><br>&gt; &gt; --Rousseau.<br><br>&gt; &gt;<br><br>&gt; &=
gt; _______________________________________________<br><br>&gt; &gt; Cfrg m=
ailing list<br><br>&gt; &gt; <a href=3D"mailto:Cfrg@irtf.org" target=3D"_bl=
ank">Cfrg@irtf.org</a><br><br>&gt; &gt; <a href=3D"https://eur03.safelinks.=
protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2Flistin=
fo%2Fcfrg&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98=
a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C63733869=
7691634306&amp;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3z8%3D&a=
mp;amp;reserved=3D0" rel=3D"noreferrer" target=3D"_blank">https://eur03.saf=
elinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2=
Flistinfo%2Fcfrg&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359=
743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C6=
37338697691634306&amp;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3=
z8%3D&amp;amp;reserved=3D0</a><br><br>&gt; &gt;<br><br>&gt; &gt; __________=
_____________________________________<br><br>&gt; &gt; Crypto-panel mailing=
 list<br><br>&gt; &gt; <a href=3D"mailto:Crypto-panel@irtf.org" target=3D"_=
blank">Crypto-panel@irtf.org</a><br><br>&gt; &gt; <a href=3D"https://eur03.=
safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailma=
n%2Flistinfo%2Fcrypto-panel&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress=
.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%=
7C1%7C1%7C637338697691634306&amp;amp;sdata=3Dw0Bf%2F8e3bInXUJ8FckOi5dK%2FRP=
dY879EkrXP02iaSR4%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" target=3D"_bl=
ank">https://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fww=
w.irtf.org%2Fmailman%2Flistinfo%2Fcrypto-panel&amp;amp;data=3D02%7C01%7Cbjo=
ern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734d=
a4ac6a3f81adc92b7e%7C1%7C1%7C637338697691634306&amp;amp;sdata=3Dw0Bf%2F8e3b=
InXUJ8FckOi5dK%2FRPdY879EkrXP02iaSR4%3D&amp;amp;reserved=3D0</a><br><br>&gt=
; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt;<br><br>&gt; &gt; _________________=
______________________________<br><br>&gt; &gt; Cfrg mailing list<br><br>&g=
t; &gt; <a href=3D"mailto:Cfrg@irtf.org" target=3D"_blank">Cfrg@irtf.org</a=
><br><br>&gt; &gt; <a href=3D"https://eur03.safelinks.protection.outlook.co=
m/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;amp;dat=
a=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d8482b33bd=
%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691634306&amp;amp;sd=
ata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3z8%3D&amp;amp;reserved=3D0" =
rel=3D"noreferrer" target=3D"_blank">https://eur03.safelinks.protection.out=
look.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fmailman%2Flistinfo%2Fcfrg&amp;=
amp;data=3D02%7C01%7Cbjoern.haase%40endress.com%7C8359743fd98a4c38077608d84=
82b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%7C1%7C637338697691634306&amp=
;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZXxZPIlj3z8%3D&amp;amp;reserve=
d=3D0</a><br><br>&gt;<br><br>&gt;<br><br>&gt;<br><br>&gt; --<br><br>&gt; &q=
uot;Man is born free, but everywhere he is in chains&quot;.<br><br>&gt; --R=
ousseau.<br><br>&gt;<br><br>&gt; __________________________________________=
_____<br><br>&gt; Cfrg mailing list<br><br>&gt; <a href=3D"mailto:Cfrg@irtf=
.org" target=3D"_blank">Cfrg@irtf.org</a><br><br>&gt; <a href=3D"https://eu=
r03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.org%2Fma=
ilman%2Flistinfo%2Fcfrg&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endress.com=
%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b7e%7C1%=
7C1%7C637338697691634306&amp;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAuWTpgeZX=
xZPIlj3z8%3D&amp;amp;reserved=3D0" rel=3D"noreferrer" target=3D"_blank">htt=
ps://eur03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.irtf.o=
rg%2Fmailman%2Flistinfo%2Fcfrg&amp;amp;data=3D02%7C01%7Cbjoern.haase%40endr=
ess.com%7C8359743fd98a4c38077608d8482b33bd%7C52daf2a93b734da4ac6a3f81adc92b=
7e%7C1%7C1%7C637338697691634306&amp;amp;sdata=3DoteAqHxVYJtxizv9OX5GP3qfiAu=
WTpgeZXxZPIlj3z8%3D&amp;amp;reserved=3D0</a><br><br><br><br><br><br><br><br=
>-- <br><br>&quot;Man is born free, but everywhere he is in chains&quot;.<b=
r><br>--Rousseau.<br><br></blockquote></div></div>

--0000000000000c43b605af1b8faa--


From nobody Mon Sep 14 04:36:23 2020
Return-Path: <chloemartindale@gmail.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6D9E3A08D6 for <crypto-panel@ietfa.amsl.com>; Mon, 14 Sep 2020 04:36:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wr-W5-M0sD60 for <crypto-panel@ietfa.amsl.com>; Mon, 14 Sep 2020 04:36:20 -0700 (PDT)
Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36A253A08CF for <crypto-panel@irtf.org>; Mon, 14 Sep 2020 04:36:20 -0700 (PDT)
Received: by mail-oi1-x231.google.com with SMTP id m7so16067172oie.0 for <crypto-panel@irtf.org>; Mon, 14 Sep 2020 04:36:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AbwnKuiTRBm7lSaGoqXyek2inZE2z3zuVLD/og3g2WM=; b=k66yVYCXWftUhDpqyrqFTavpIDPKp2b6WzvYBg23wm9KX8cQbbkAZ29cQu5w2eQVUh Rl+Y9KstRnXYiYRM/TCggYvlz1OT4cUxmfwp/DzStV+aUrq6K6RPKs9BiMiottAQb+VY ayiMoNT6tGxbzMUSH7CNgQBpZq7wjEZyc6w3Vd90cJ0sKt2yqb/aj6Rn7OEpluLPluxp kgXzeZGcJSsEGF82w13EwltMrJC50CHGnd6Qvm2dovd79mrRksYX/REeekBG2AboPGGV 0BRcCBB08o+6dEsuvHYBw0Poq0uezlTe7H/CZWk8azo+zJzZdUn78UP8bSFfHjUsJcqL s2PQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AbwnKuiTRBm7lSaGoqXyek2inZE2z3zuVLD/og3g2WM=; b=ibmOafSyCB0wfCQAkKFFCFmmx1qWdxZhiWLv46/AOIQ0Cz1cpf6r4jvKWBEfSPeGOE E2/FzI6IX0co7hZ1bIsiF2CyKfjgX8Wnsd4yCfd/fgMuDLwcyHNzjNWO838BOatlsM9E kccI6cMAFM3JYYmtZ4Fy8yesu+TPPkW8TSNMcAHiWImuHzr0orsrWj4Ea39xNU4A933f B9vkpxnwk7xbr9891QhkwBhEsmYUyJu9YXeqUKwPNTW7arbqgZsXATAhjE7rCSJ/499r gqAGsUps44ZxUTDEEZ8Sr1q2Yl+zvAdxwpZXZ85/+BG+sFSEhy1wENExezH6A4YQEeyu o2YA==
X-Gm-Message-State: AOAM531RfsVm/zgJNHyD30SlMrTrGniErm8K8y1sT02yDGvCTumns9NH T7+cqII9pruM9WmHOaQHMUkFEoj7FHSpLYeDKHY=
X-Google-Smtp-Source: ABdhPJy2h++oxCg4TpGLeEarQsNZ2XnAToJ0kPlkKpB+nWmuS9k4DvTDFvwpeHEfp7qbyZ3xd++sAZMpkJ0X2AzLmw0=
X-Received: by 2002:aca:acd5:: with SMTP id v204mr7926351oie.153.1600083379392;  Mon, 14 Sep 2020 04:36:19 -0700 (PDT)
MIME-Version: 1.0
References: <CAFDDyk96JKFWHOz3H_knO-twgNtJcg-_6uj3XHxdmdRHiaLccQ@mail.gmail.com> <cbb91213-2c48-5be2-c4db-7a648fc4f2b0@cs.tcd.ie> <02b7d60b-6f57-4773-c362-ab01bdb0a06a@isode.com> <CAL+7JtQjMgHBhaq5ZyiOFQVw9yLCR0H9uiJAkjaYo2UiLxhMng@mail.gmail.com> <CAHZ6D0uVqTyvxkdypo34n7PRPb7TOuZKm4qtZHOVAUj-v3ACtQ@mail.gmail.com>
In-Reply-To: <CAHZ6D0uVqTyvxkdypo34n7PRPb7TOuZKm4qtZHOVAUj-v3ACtQ@mail.gmail.com>
From: Chloe Martindale <chloemartindale@gmail.com>
Date: Mon, 14 Sep 2020 12:36:08 +0100
Message-ID: <CAL+7JtTqQX_uWbHoiNzRJcpGeYb97Ra=b+Zw9gG+-teWVPQDYQ@mail.gmail.com>
To: Leonid Reyzin <reyzin@cs.bu.edu>
Cc: Alexey Melnikov <alexey.melnikov@isode.com>, crypto-panel@irtf.org,  draft-irtf-cfrg-vrf@ietf.org
Content-Type: multipart/alternative; boundary="0000000000007096a805af4471fa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/yLJ1_9dhnfC6pEH1ocCEkpEzbQw>
Subject: Re: [Crypto-panel] Request for review: draft-irtf-cfrg-vrf-07
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Sep 2020 11:36:22 -0000

--0000000000007096a805af4471fa
Content-Type: text/plain; charset="UTF-8"

I'm sorry this is on me. I had promised to review it but I've been off for
several weeks (and wasn't able to work much before that) for health
reasons. I'm back today and naturally have a bit of a backlog but should be
able to get to this before the end of the month if that's ok.

All the best,
Chloe

On Tue, 8 Sep 2020 at 14:19, Leonid Reyzin <reyzin@cs.bu.edu> wrote:

> Hi Everyone,
>
> Just a ping on this -- the VRF draft has been waiting for the
> Crypto Review Panel. I don't know if there's been any progress? Thanks in
> advance!
>
>  Leo
>
>
> On Fri, Jun 19, 2020 at 1:04 PM Chloe Martindale <
> chloemartindale@gmail.com> wrote:
>
>> I can do it, but I won't be able to look at it until 2 weeks from now
>> because of deadlines - I hope that's not too late?
>>
>> All the best,
>> Chloe
>>
>> On Fri, 19 Jun 2020, 16:42 Alexey Melnikov, <alexey.melnikov@isode.com>
>> wrote:
>>
>>> Dear Crypto Panel members,
>>>
>>> Nick, Stanislav and I would like to ask Crypto Review Panel members for
>>> a review of
>>> <https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=1>
>>> ("Verifiable Random Functions").
>>>
>>> Chairs are about to start RGLC on the document, so we would like to
>>> solicit some reviews before that.
>>>
>>>
>>> One or two reviews would be appreciated.
>>>
>>>
>>> Thank you,
>>>
>>> Alexey (on behalf of chairs)
>>>
>>> _______________________________________________
>>> Crypto-panel mailing list
>>> Crypto-panel@irtf.org
>>> https://www.irtf.org/mailman/listinfo/crypto-panel
>>>
>>

--0000000000007096a805af4471fa
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I&#39;m sorry this is on me. I had promised to review=
 it but I&#39;ve been off for several weeks (and wasn&#39;t able to work mu=
ch before that) for health reasons. I&#39;m back today and naturally have a=
 bit of a backlog but should be able to get to this before the end of the m=
onth if that&#39;s ok.</div><div><br></div><div>All the best,</div><div>Chl=
oe<br></div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"=
gmail_attr">On Tue, 8 Sep 2020 at 14:19, Leonid Reyzin &lt;<a href=3D"mailt=
o:reyzin@cs.bu.edu">reyzin@cs.bu.edu</a>&gt; wrote:<br></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid=
 rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">Hi Everyone,<div><br><=
/div><div>Just a ping on this -- the VRF draft has been waiting for the Cry=
pto=C2=A0Review Panel. I don&#39;t know if there&#39;s been any progress? T=
hanks in advance!</div><div><br></div><div>=C2=A0Leo</div><div><br></div></=
div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On=
 Fri, Jun 19, 2020 at 1:04 PM Chloe Martindale &lt;<a href=3D"mailto:chloem=
artindale@gmail.com" target=3D"_blank">chloemartindale@gmail.com</a>&gt; wr=
ote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D=
"auto">I can do it, but I won&#39;t be able to look at it until 2 weeks fro=
m now because of deadlines - I hope that&#39;s not too late?<div dir=3D"aut=
o"><br></div><div dir=3D"auto">All=C2=A0the best,</div><div dir=3D"auto">Ch=
loe</div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gma=
il_attr">On Fri, 19 Jun 2020, 16:42 Alexey Melnikov, &lt;<a href=3D"mailto:=
alexey.melnikov@isode.com" target=3D"_blank">alexey.melnikov@isode.com</a>&=
gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Dear =
Crypto Panel members,<br>
<br>
Nick, Stanislav and I would like to ask Crypto Review Panel members for <br=
>
a review of <br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?includ=
e_text=3D1" rel=3D"noreferrer noreferrer" target=3D"_blank">https://datatra=
cker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=3D1</a>&gt; <br>
(&quot;Verifiable Random Functions&quot;).<br>
<br>
Chairs are about to start RGLC on the document, so we would like to <br>
solicit some reviews before that.<br>
<br>
<br>
One or two reviews would be appreciated.<br>
<br>
<br>
Thank you,<br>
<br>
Alexey (on behalf of chairs)<br>
<br>
_______________________________________________<br>
Crypto-panel mailing list<br>
<a href=3D"mailto:Crypto-panel@irtf.org" rel=3D"noreferrer" target=3D"_blan=
k">Crypto-panel@irtf.org</a><br>
<a href=3D"https://www.irtf.org/mailman/listinfo/crypto-panel" rel=3D"noref=
errer noreferrer" target=3D"_blank">https://www.irtf.org/mailman/listinfo/c=
rypto-panel</a><br>
</blockquote></div>
</blockquote></div>
</blockquote></div>

--0000000000007096a805af4471fa--


From nobody Mon Sep 14 05:25:49 2020
Return-Path: <leonid.reyzin@gmail.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6402C3A03FC for <crypto-panel@ietfa.amsl.com>; Mon, 14 Sep 2020 05:25:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.401
X-Spam-Level: 
X-Spam-Status: No, score=-1.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qMX_V7oFltiL for <crypto-panel@ietfa.amsl.com>; Mon, 14 Sep 2020 05:25:45 -0700 (PDT)
Received: from mail-io1-f52.google.com (mail-io1-f52.google.com [209.85.166.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE0383A03F1 for <crypto-panel@irtf.org>; Mon, 14 Sep 2020 05:25:45 -0700 (PDT)
Received: by mail-io1-f52.google.com with SMTP id m17so19793817ioo.1 for <crypto-panel@irtf.org>; Mon, 14 Sep 2020 05:25:45 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2oyqcf66yXPRuGS3yFGK6r5UZqSbLwcgOGJpHAtWr2w=; b=RXNndnWIAjMN+a99J/ISrMysq13ty5VBwbnvxo7SaWGe4I8sOxNKLNUN+M1KX06Q4h krWJECvwMCAKoj7QRgFRR+jqhyacAybZeeQTIHGm26FcmDMZURWQW+VRP4sGzBDUn4cH SOEK9EEYBmuC2MCxnKRlqzLfjGPioKlqT+eIQ0HlqXghzZjCIVcbyJfs+apHYcIEGrWJ e5nEKwDHtPLMQcz/LtlZNfFATKv3pTTU0TIi3VcHcHdZ3EJacdDujmyuF0CJZFcoVYpr LfgBkgei8F0VZRsG1fve9+k9h6raFkVO7j3l6lcmoEOCYkvRR/LUUI/Xy3wHYBd5Lkq7 KjwQ==
X-Gm-Message-State: AOAM531KcNnJJa28P+d3MRFZId4zE7su9P9pZXUr/FGbBq0awXatSXTP 0hoMjcwmb3cM6+mniGLG/pmeQ1VlwN8ZL3ZolWs=
X-Google-Smtp-Source: ABdhPJxK8Owd7WYUGBdkQQrLf2u33xsd3sS/o+5jMLmqNlk+V4guE5hK9jV/vWiDYpC7ayI3N+I9Ht7/veN26UsOM6Q=
X-Received: by 2002:a6b:7112:: with SMTP id q18mr10821857iog.79.1600086345012;  Mon, 14 Sep 2020 05:25:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAFDDyk96JKFWHOz3H_knO-twgNtJcg-_6uj3XHxdmdRHiaLccQ@mail.gmail.com> <cbb91213-2c48-5be2-c4db-7a648fc4f2b0@cs.tcd.ie> <02b7d60b-6f57-4773-c362-ab01bdb0a06a@isode.com> <CAL+7JtQjMgHBhaq5ZyiOFQVw9yLCR0H9uiJAkjaYo2UiLxhMng@mail.gmail.com> <CAHZ6D0uVqTyvxkdypo34n7PRPb7TOuZKm4qtZHOVAUj-v3ACtQ@mail.gmail.com> <CAL+7JtTqQX_uWbHoiNzRJcpGeYb97Ra=b+Zw9gG+-teWVPQDYQ@mail.gmail.com>
In-Reply-To: <CAL+7JtTqQX_uWbHoiNzRJcpGeYb97Ra=b+Zw9gG+-teWVPQDYQ@mail.gmail.com>
From: Leonid Reyzin <reyzin@cs.bu.edu>
Date: Mon, 14 Sep 2020 08:25:19 -0400
Message-ID: <CAHZ6D0th59=KUSUQAmPKmJfGgQfbWHM+e6-M-zBGeUnOaoKL4w@mail.gmail.com>
To: Chloe Martindale <chloemartindale@gmail.com>
Cc: Alexey Melnikov <alexey.melnikov@isode.com>, crypto-panel@irtf.org,  draft-irtf-cfrg-vrf@ietf.org
Content-Type: multipart/alternative; boundary="000000000000345d8605af452271"
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/VInxdenH1wGl06d6lbZe3c8XBzA>
Subject: Re: [Crypto-panel] Request for review: draft-irtf-cfrg-vrf-07
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Sep 2020 12:25:47 -0000

--000000000000345d8605af452271
Content-Type: text/plain; charset="UTF-8"

Thank you, Chloe! I hope you are feeling better!

Best,

 Leo


On Mon, Sep 14, 2020 at 7:36 AM Chloe Martindale <chloemartindale@gmail.com>
wrote:

> I'm sorry this is on me. I had promised to review it but I've been off for
> several weeks (and wasn't able to work much before that) for health
> reasons. I'm back today and naturally have a bit of a backlog but should be
> able to get to this before the end of the month if that's ok.
>
> All the best,
> Chloe
>
> On Tue, 8 Sep 2020 at 14:19, Leonid Reyzin <reyzin@cs.bu.edu> wrote:
>
>> Hi Everyone,
>>
>> Just a ping on this -- the VRF draft has been waiting for the
>> Crypto Review Panel. I don't know if there's been any progress? Thanks in
>> advance!
>>
>>  Leo
>>
>>
>> On Fri, Jun 19, 2020 at 1:04 PM Chloe Martindale <
>> chloemartindale@gmail.com> wrote:
>>
>>> I can do it, but I won't be able to look at it until 2 weeks from now
>>> because of deadlines - I hope that's not too late?
>>>
>>> All the best,
>>> Chloe
>>>
>>> On Fri, 19 Jun 2020, 16:42 Alexey Melnikov, <alexey.melnikov@isode.com>
>>> wrote:
>>>
>>>> Dear Crypto Panel members,
>>>>
>>>> Nick, Stanislav and I would like to ask Crypto Review Panel members for
>>>> a review of
>>>> <https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=1>
>>>> ("Verifiable Random Functions").
>>>>
>>>> Chairs are about to start RGLC on the document, so we would like to
>>>> solicit some reviews before that.
>>>>
>>>>
>>>> One or two reviews would be appreciated.
>>>>
>>>>
>>>> Thank you,
>>>>
>>>> Alexey (on behalf of chairs)
>>>>
>>>> _______________________________________________
>>>> Crypto-panel mailing list
>>>> Crypto-panel@irtf.org
>>>> https://www.irtf.org/mailman/listinfo/crypto-panel
>>>>
>>>

--000000000000345d8605af452271
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thank you, Chloe! I hope you are feeling better!<div><br><=
/div><div>Best,</div><div><br></div><div>=C2=A0Leo</div><div><br></div></di=
v><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On M=
on, Sep 14, 2020 at 7:36 AM Chloe Martindale &lt;<a href=3D"mailto:chloemar=
tindale@gmail.com">chloemartindale@gmail.com</a>&gt; wrote:<br></div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div>I&#39;m s=
orry this is on me. I had promised to review it but I&#39;ve been off for s=
everal weeks (and wasn&#39;t able to work much before that) for health reas=
ons. I&#39;m back today and naturally have a bit of a backlog but should be=
 able to get to this before the end of the month if that&#39;s ok.</div><di=
v><br></div><div>All the best,</div><div>Chloe<br></div></div><br><div clas=
s=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, 8 Sep 2020 =
at 14:19, Leonid Reyzin &lt;<a href=3D"mailto:reyzin@cs.bu.edu" target=3D"_=
blank">reyzin@cs.bu.edu</a>&gt; wrote:<br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex"><div dir=3D"ltr">Hi Everyone,<div><br></div><div>Jus=
t a ping on this -- the VRF draft has been waiting for the Crypto=C2=A0Revi=
ew Panel. I don&#39;t know if there&#39;s been any progress? Thanks in adva=
nce!</div><div><br></div><div>=C2=A0Leo</div><div><br></div></div><br><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Jun 19,=
 2020 at 1:04 PM Chloe Martindale &lt;<a href=3D"mailto:chloemartindale@gma=
il.com" target=3D"_blank">chloemartindale@gmail.com</a>&gt; wrote:<br></div=
><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border=
-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"auto">I can =
do it, but I won&#39;t be able to look at it until 2 weeks from now because=
 of deadlines - I hope that&#39;s not too late?<div dir=3D"auto"><br></div>=
<div dir=3D"auto">All=C2=A0the best,</div><div dir=3D"auto">Chloe</div></di=
v><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On F=
ri, 19 Jun 2020, 16:42 Alexey Melnikov, &lt;<a href=3D"mailto:alexey.melnik=
ov@isode.com" target=3D"_blank">alexey.melnikov@isode.com</a>&gt; wrote:<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;=
border-left:1px solid rgb(204,204,204);padding-left:1ex">Dear Crypto Panel =
members,<br>
<br>
Nick, Stanislav and I would like to ask Crypto Review Panel members for <br=
>
a review of <br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/?includ=
e_text=3D1" rel=3D"noreferrer noreferrer" target=3D"_blank">https://datatra=
cker.ietf.org/doc/draft-irtf-cfrg-vrf/?include_text=3D1</a>&gt; <br>
(&quot;Verifiable Random Functions&quot;).<br>
<br>
Chairs are about to start RGLC on the document, so we would like to <br>
solicit some reviews before that.<br>
<br>
<br>
One or two reviews would be appreciated.<br>
<br>
<br>
Thank you,<br>
<br>
Alexey (on behalf of chairs)<br>
<br>
_______________________________________________<br>
Crypto-panel mailing list<br>
<a href=3D"mailto:Crypto-panel@irtf.org" rel=3D"noreferrer" target=3D"_blan=
k">Crypto-panel@irtf.org</a><br>
<a href=3D"https://www.irtf.org/mailman/listinfo/crypto-panel" rel=3D"noref=
errer noreferrer" target=3D"_blank">https://www.irtf.org/mailman/listinfo/c=
rypto-panel</a><br>
</blockquote></div>
</blockquote></div>
</blockquote></div>
</blockquote></div>

--000000000000345d8605af452271--


From nobody Mon Sep 21 07:17:55 2020
Return-Path: <thomas.pornin@nccgroup.com>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E848C3A0763 for <crypto-panel@ietfa.amsl.com>; Mon, 21 Sep 2020 07:17:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.554
X-Spam-Level: 
X-Spam-Status: No, score=-0.554 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, LH_URI_DOM_IN_PATH=1.446, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nccgroup.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0zzcO2n59h8q for <crypto-panel@ietfa.amsl.com>; Mon, 21 Sep 2020 07:17:51 -0700 (PDT)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2060.outbound.protection.outlook.com [40.107.220.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E7053A0766 for <crypto-panel@irtf.org>; Mon, 21 Sep 2020 07:17:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=U83+ZzSnZYFkDj9z8FV1483GY8Vd4YQ7kDqOYPUhfp+P7/D9xq2evMJv1X5umzvYaMI5qAfsLGLb37XD6r66obJRO/Frasu3x4LuEtTiK784PKyblavjqt9P3G38KQpmpqpDKKXaXzRGuCltqMZszbTtcN14+C73bAIVOTRYq6UqhlZO7XOhmXA3HbZI1+6tToImNMqPgnBZNE88XFThBxPHtl8BhNf+rLHx3v3yXv1K8ab6CaipB/CSmjiSyNSnZKkNhQK0Bw1QCz4D4SRF7K6/FrqmEAfrehgJlCPiIKRjt1ClzBeR8mQKhwnTg20vPoJOX/I9Oox908nJB/gJQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9IZBP+RUt35qsA8r/kHgptM+QUkZs85rmSLw5SAdfeE=; b=I78SVUv/vcq6kY/0EWANYCB/56JULj+OIk62g7U3SkE20cymQlO/cGXHn1Y1CrhVL9wJAD+xeK4BQsjQOVEMqBOsDrPdfEH0oHI1b/6x5nUbe64/cBDBmJsPxAB307wqZUi4zYXcoZuizuH/TzH6x+5j8Lq3BXFrOV1PCByM0qVSG5kYQOAdiLYfKiH5octB4yZsi2n9wCPEDXnazWX86NAZuTPMV4LHCoWz++IxWDLtsMBERlQniVGZjbDVy6Lxrz6zp2AUBUHnEq0AM1ZJvS5FtizPDq4aOHzlbzNNGxXfWq4aIBmWYeROnc1fVW1tAxehbHdtinroP/mKmO9uaw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nccgroup.com; dmarc=pass action=none header.from=nccgroup.com; dkim=pass header.d=nccgroup.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nccgroup.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9IZBP+RUt35qsA8r/kHgptM+QUkZs85rmSLw5SAdfeE=; b=BViRsHrzNcjX2govpLX3lBYPX0WltWBHP113aIZtC/ZQEKaC9ahAvGtiABbxEgXNruEzmg+za9Qj1t8P3pedqWW7ONmjA6RHCxT6TA8k3M5BJmzJ2PV9grIPxwkt0n2N1nuPhMjxmkjI6Rx68mnMTG6Wd73blqVEgCRM65lGSZ6ehpMIwwj+g9d+PS6rb6TzoY+1/SWqVIfLXtv1EpsvoM6evzXUXjkyu2J8DXgOx0t68+VEJWVw9aIZrrGLqpZA0pyr2zFCtAhZ+CVUGV2tNnZWRq6Tetaag1J5PRKrw9/PHrqMfkiGxYVSeEDmWdX/l3OrRrCP2C8iiPOxzzu3cw==
Received: from MWHPR06MB2333.namprd06.prod.outlook.com (2603:10b6:300:61::19) by MWHPR06MB3007.namprd06.prod.outlook.com (2603:10b6:300:11a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3391.17; Mon, 21 Sep 2020 14:17:43 +0000
Received: from MWHPR06MB2333.namprd06.prod.outlook.com ([fe80::3474:9133:d3b3:5f40]) by MWHPR06MB2333.namprd06.prod.outlook.com ([fe80::3474:9133:d3b3:5f40%11]) with mapi id 15.20.3391.024; Mon, 21 Sep 2020 14:17:42 +0000
From: Thomas Pornin <thomas.pornin@nccgroup.com>
To: =?utf-8?B?QmVub8OudCBWaWd1aWVy?= <b.viguier@cs.ru.nl>, Alexey Melnikov <alexey.melnikov@isode.com>, "draft-irtf-cfrg-kangarootwelve@ietf.org" <draft-irtf-cfrg-kangarootwelve@ietf.org>, "crypto-panel@irtf.org" <crypto-panel@irtf.org>
Thread-Topic: EXTERNAL: Re: [Crypto-panel] Request for review: draft-irtf-cfrg-kangarootwelve-02
Thread-Index: AQHWgG2Ebjz5twupUEKlQGKXbShU36lzAAWA
Date: Mon, 21 Sep 2020 14:17:42 +0000
Message-ID: <9C5E0AC1-E56E-4676-9708-296465BBD87C@nccgroup.com>
References: <bc188f7e-cb30-3aaa-b6a7-88655c841751@cs.ru.nl> <ff010917-47ac-dbc6-8439-663373ddeb87@cs.ru.nl>
In-Reply-To: <ff010917-47ac-dbc6-8439-663373ddeb87@cs.ru.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: cs.ru.nl; dkim=none (message not signed) header.d=none;cs.ru.nl; dmarc=none action=none header.from=nccgroup.com;
x-originating-ip: [24.200.215.113]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7a1a0e3b-be86-49e9-9223-08d85e391ad3
x-ms-traffictypediagnostic: MWHPR06MB3007:
x-microsoft-antispam-prvs: <MWHPR06MB30077666C60C70C088A7A50C823A0@MWHPR06MB3007.namprd06.prod.outlook.com>
campaign: C_Default
signature: S_NoSignature
disclaimer: D_NoDisclaimer
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: c5OfcfFHR/tY63mRPb0p3PvWvjiaHCkv0gzfvU4TCyVKJh83WoW0wkTk7r6p/MUf8S/dBdv3eli1/fkzRvaCTcaH2AWY1bQ3gG0j7H52dzTMEKan+EsN9zibTPlbC+bnc/Yg1lNaDrfwJ/EHF4N4KdcXI3XxQX2zMRcHuA2bwTnQBmAqKuzfu15nHW01RDa6AXzkYX4BocREBUL63dMyg6Qiier1mE2ZADTvt4oguU3fBn/K9i7WKmTlOZDn8+eu6Ai0jbX/f1jMevP8IxqGe+lhQt412dhUSSVIL/R4P0M3OyGKBacq3OoM9vcmXBl3sk8GgdmFRRhXzXVrmMgnOh5nkJWtE3FGcYYjbVPz/UTdOYPjVZ/naUe7euxUGkKx8dMpwmaOG7ZVJ9mSOaYIAg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:MWHPR06MB2333.namprd06.prod.outlook.com; PTR:; CAT:NONE;  SFS:(4636009)(39840400004)(366004)(136003)(376002)(396003)(346002)(966005)(66574015)(478600001)(2906002)(36756003)(2616005)(6512007)(44832011)(76116006)(186003)(26005)(5660300002)(316002)(86362001)(8676002)(53546011)(6506007)(83380400001)(83080400001)(33656002)(8936002)(166002)(91956017)(71200400001)(66446008)(110136005)(64756008)(66476007)(66946007)(66556008)(6486002); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_9C5E0AC1E56E46769708296465BBD87Cnccgroupcom_"
MIME-Version: 1.0
X-OriginatorOrg: nccgroup.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR06MB2333.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7a1a0e3b-be86-49e9-9223-08d85e391ad3
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Sep 2020 14:17:42.7625 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: a41111be-486b-45f6-8bd0-ee01a62f368e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: w2HXAUeCUJNOEOVOPgi1AmquQUuxCqhydeZyRjjNJEB9uCpu1jjvHPe1/pPysFhYIdO3msSI4pcutI61OZ5tEGy0hFZ6P1pMO8PrvTEkrXc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR06MB3007
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/YQL4M-FgirlKQoEkilmUgSupjms>
Subject: Re: [Crypto-panel] EXTERNAL: Re: Request for review: draft-irtf-cfrg-kangarootwelve-02
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Sep 2020 14:17:54 -0000

--_000_9C5E0AC1E56E46769708296465BBD87Cnccgroupcom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_9C5E0AC1E56E46769708296465BBD87Cnccgroupcom_
Content-Type: text/html; charset="utf-8"
Content-ID: <A3A8C225B8A4834F9132B7B4319F1F4D@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_9C5E0AC1E56E46769708296465BBD87Cnccgroupcom_--

