Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update AEAD limits for larger packets #4175

Merged
merged 4 commits into from
Oct 15, 2020
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
109 changes: 61 additions & 48 deletions draft-ietf-quic-tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -1643,10 +1643,10 @@ It is RECOMMENDED that endpoints immediately close the connection with a
connection error of type AEAD_LIMIT_REACHED before reaching a state where key
updates are not possible.

For AEAD_AES_128_GCM and AEAD_AES_256_GCM, the confidentiality limit is 2^25
For AEAD_AES_128_GCM and AEAD_AES_256_GCM, the confidentiality limit is 2^23
encrypted packets; see {{gcm-bounds}}. For AEAD_CHACHA20_POLY1305, the
confidentiality limit is greater than the number of possible packets (2^62) and
so can be disregarded. For AEAD_AES_128_CCM, the confidentiality limit is 2^23.5
so can be disregarded. For AEAD_AES_128_CCM, the confidentiality limit is 2^21.5
encrypted packets; see {{ccm-bounds}}. Applying a limit reduces the probability
that an attacker can distinguish the AEAD in use from a random permutation; see
{{AEBounds}}, {{ROBUST}}, and {{?GCM-MU=DOI.10.1145/3243734.3243816}}.
Expand All @@ -1658,13 +1658,16 @@ connection, across all keys, exceeds the integrity limit for the selected AEAD,
the endpoint MUST immediately close the connection with a connection error of
type AEAD_LIMIT_REACHED and not process any more packets.

For AEAD_AES_128_GCM and AEAD_AES_256_GCM, the integrity limit is 2^54 invalid
For AEAD_AES_128_GCM and AEAD_AES_256_GCM, the integrity limit is 2^52 invalid
packets; see {{gcm-bounds}}. For AEAD_CHACHA20_POLY1305, the integrity limit is
2^36 invalid packets; see {{AEBounds}}. For AEAD_AES_128_CCM, the integrity
limit is 2^23.5 invalid packets; see {{ccm-bounds}}. Applying this limit reduces
limit is 2^21.5 invalid packets; see {{ccm-bounds}}. Applying this limit reduces
the probability that an attacker can successfully forge a packet; see
{{AEBounds}}, {{ROBUST}}, and {{?GCM-MU}}.

Endpoints that limit the size of packets MAY use higher confidentiality and
integrity limits; see {{aead-analysis}} for details.

Future analyses and specifications MAY relax confidentiality or integrity limits
for an AEAD.

Expand Down Expand Up @@ -2262,7 +2265,7 @@ packet = 4cfe4189655e5cd55c41f69080575d7999c25a5bfb
~~~


# AEAD Algorithm Analysis
# AEAD Algorithm Analysis {#aead-analysis}

This section documents analyses used in deriving AEAD algorithm limits for
AEAD_AES_128_GCM, AEAD_AES_128_CCM, and AEAD_AES_256_GCM. The analyses that
Expand All @@ -2272,11 +2275,16 @@ used:

t:

: The size of the authentication tag in bits. For this cipher, t is 128.
: The size of the authentication tag in bits. For these ciphers, t is 128.

n:

: The size of the block function in bits. For this cipher, n is 128.
: The size of the block function in bits. For these ciphers, n is 128.

k:

: The size of the key in bits. This is 128 for AEAD_AES_128_GCM and
AEAD_AES_128_CCM; 256 for AEAD_AES_256_GCM.

l:

Expand All @@ -2299,17 +2307,23 @@ o:
: The amount of offline ideal cipher queries made by an adversary.

The analyses that follow rely on a count of the number of block operations
involved in producing each message. For simplicity, and to match the analysis of
other AEAD functions in {{AEBounds}}, this analysis assumes a packet length of
2^10 blocks; that is, a packet size limit of 2^14 bytes.
involved in producing each message. This analysis is performed for packets of
up to 2^11 (l = 2^7) and 2^16 (l = 2^12). A size of 2^11 is expected to be a
martinthomson marked this conversation as resolved.
Show resolved Hide resolved
limit that matches common deployment patterns, whereas the 2^16 is the maximum
possible size of a QUIC packet. Only endpoints that strictly limit packet size
can use the larger limits that are derived using the smaller packet size.
martinthomson marked this conversation as resolved.
Show resolved Hide resolved

For AEAD_AES_128_GCM and AEAD_AES_256_GCM, the message length (l) is the length
of the associated data in blocks plus the length of the plaintext in blocks.

For AEAD_AES_128_CCM, the total number of block cipher operations is the sum
of: the length of the associated data in blocks, the length of the ciphertext
in blocks, the length of the plaintext in blocks, plus 1. In this analysis,
this is simplified to a value of twice the length of the packet in blocks (that
is, `2l = 2^11`). This simplification is based on the packet containing all of
the associated data and ciphertext. This results in a negligible 1 to 3 block
overestimation of the number of operations.
is, `2l = 2^8` for packets that are limited to 2^11 bytes, or `2l = 2^13`
otherwise). This simplification is based on the packet containing all of the
associated data and ciphertext. This results in a 1 to 3 block overestimation
of the number of operations per packet.


## Analysis of AEAD_AES_128_GCM and AEAD_AES_256_GCM Usage Limits {#gcm-bounds}
Expand All @@ -2326,7 +2340,8 @@ blocks).
in the analysis.

The bounds in {{?GCM-MU}} are tighter and more complete than those used in
{{AEBounds}}, which allows for larger limits than those described in {{?TLS13}}.
{{AEBounds}}, which allows for larger limits than those described in
{{?TLS13}}.


### Confidentiality Limit
Expand All @@ -2337,18 +2352,19 @@ distinguishing advantage between a real and random AEAD algorithm gained by an
attacker is:

~~~
2 * (q * l)^2 / 2^128
2 * (q * l)^2 / 2^n
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I forgot to call this out. @chris-wood, can you check that this is right here? I think that this comes from the \sigma*B/2^n term in Bad3 in the paper, but I want to make sure that my understanding is correct in that we are treating \sigma*B as \sigma^2 in the single-user case.

~~~

For a target advantage of 2^-57, this results in the relation:

~~~
q <= 2^25
q <= 2^35 / l
~~~

Thus, endpoints cannot protect more than 2^25 packets in a single connection
without causing an attacker to gain an larger advantage than the target of
2^-57.
Thus, endpoints that do not send packets larger than 2^11 bytes cannot protect
more than 2^28 packets in a single connection without causing an attacker to
gain an larger advantage than the target of 2^-57. The limit for endpoints that
do not limit packet size is instead 2^23.
martinthomson marked this conversation as resolved.
Show resolved Hide resolved


### Integrity Limit
Expand All @@ -2366,15 +2382,19 @@ term in this inequality dominates the rest, so the others can be removed without
significant effect on the result. This produces the following approximation:

~~~
v <= 2^54
v <= 2^64 / l
~~~

For AEAD_AES_256_GCM, the second and fourth terms dominate the rest, so the
others can be removed without affecting the result. This produces the following
approximation:
Endpoints that do not attempt to remove protection from packets larger than
2^11 bytes can attempt to remove protection from at most 2^57 packets. Packets
martinthomson marked this conversation as resolved.
Show resolved Hide resolved
attempt to remove protection from any packet can attempt to remove protection
from at most 2^52 packets.
martinthomson marked this conversation as resolved.
Show resolved Hide resolved

For AEAD_AES_256_GCM, the same term dominates, but the larger value of k
produces the following approximation:

~~~
v <= 2^182
v <= 2^192 / l
~~~

This is substantially larger than the limit for AEAD_AES_128_GCM. However, this
Expand All @@ -2393,9 +2413,6 @@ section documents that analysis.
analysis. The results of that analysis are used to derive usage limits that are
based on those chosen in {{?TLS13}}.


### Confidentiality Limits

For confidentiality, Theorem 2 in {{?CCM-ANALYSIS}} establishes that an attacker
gains a distinguishing advantage over an ideal pseudorandom permutation (PRP) of
no more than:
Expand All @@ -2404,37 +2421,33 @@ no more than:
(2l * q)^2 / 2^n
~~~

For a target advantage of 2^-57, this results in the relation:

~~~
q <= 2^24.5
~~~

That is, endpoints cannot protect more than 2^23 packets with the same set of
keys without causing an attacker to gain a larger advantage than the target of
2^-57. Note however that the integrity limits further constrain this value.
The integrity limit in Theorem 1 in {{?CCM-ANALYSIS}} provides an attacker a
strictly higher advantage for the same number of messages. As the targets
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
strictly higher advantage for the same number of messages. As the targets
strictly higher advantage for the same number of messages. As the target

Or "targeted"?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm trying to say that the "value of the goal" is the same. I think that this is correct.

I think that you might say "target advantages for A and B", but I think that "advantages" means something else and so I avoided the plural.

Maybe instead "As the target for both the confidentiality advantage and integrity advantage is the same, ..." ?

My grammar skillz aren't up to this, clearly.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Or plural works in that last arrangement, so "As the targets for the confidentiality advantage and the integrity advantage are the same...." I think any of them are fine, so long as they agree in number. What stuck out to me was "targets advantage" more than anything else.

advantage for confidentiality and integrity are the same, only Theorem 1 needs
to be considered.


### Integrity Limits

For integrity, Theorem 1 in {{?CCM-ANALYSIS}} establishes that an attacker
gains an advantage over an ideal PRP of no more than:
Theorem 1 establishes that an attacker gains an advantage over an
ideal PRP of no more than:

~~~
v / 2^t + (2l * (v + q))^2 / 2^n
~~~

The goal is to limit this advantage to 2^-57. As `t` and `n` are both 128, the
first term is negligible relative to the second, so that term can be removed
without a significant effect on the result. This produces the relation:
As `t` and `n` are both 128, the first term is negligible relative to the
second, so that term can be removed without a significant effect on the result.

This produces a relation that combines both encryption and decryption attempts
with the same limit as that produced by the theorem for confidentiality alone.
For a target advantage of 2^-57, this results in:

~~~
v + q <= 2^24.5
v + q <= 2^34.5 / l
~~~

Assuming `q = v`, endpoints cannot attempt to protect or authenticate more than
2^23.5 packets with the same set of keys without causing an attacker to gain a
larger advantage in forging packets than the target of 2^-57.
By setting `q = v`, values for both confidentiality and integrity limits can be
produced. Endpoints that limit packets to 2^11 bytes therefore have both
confidentiality and integrity limits of 2^26.5 packets. Endpoints that do not
limit packet size have a limit of 2^21.5.
martinthomson marked this conversation as resolved.
Show resolved Hide resolved


# Change Log
Expand Down