----- Original Message -----
> From: "Kurt Roeckx" <k...@roeckx.be>
> To: mozilla-dev-tech-cry...@lists.mozilla.org
> Sent: Monday, 30 June, 2014 10:56:13 AM
> Subject: Re: Road to RC4-free web (the case for YouTube without RC4)
> 
> On 2014-06-30 02:35, Hubert Kario wrote:
> >> The benefits of ECDHE outweigh the risks of using RC4,
> >
> > I have to disagree here. Even 1024 bit DHE requires a targeted attack at
> > ~80 bit
> > complexity. Currently we see RC4 at around 56 bit, with a completely
> > unoptimized
> > attack...
> 
> Do you have a reference for those 56 bit?

My estimation.

http://www.isg.rhul.ac.uk/tls/
requires 2^30 sessions with 2^8 computations to recover full text.
And it requires 2^24 sessions and 2^8 computations to recover some bytes.

I assumed two to one data-to-computation equivalence and added 8 bits from
the original attack.

Even if the equivalence is higher, capturing 2^10 of sessions won't
require extended monitoring. If we then say that this then requires 2^67
computations (over 3 to 1 equivalence) the cost of that is around $250000
using EC2. That's mafia kind of money, not NSA.

I trust RC4 as much as single DES - good against script kiddies.

> I think we should do all that's possible to avoid RC4.  I think that for
> now we should follow Microsoft in not having RC4 in the initial
> handshake and if fails retry with RC4 enabled.

yes, that would certainly help

>  It's my understanding
> that that should reduce RC4 usage from 20% of the sites to 1%.

that's correct

-- 
Regards,
Hubert Kario
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to