On Mon, Aug 06, 2018 at 10:38:23PM -0400, Jason A. Donenfeld wrote: > On 8/6/18, Eric Biggers <ebiggers@xxxxxxxxxx> wrote: > > > > For context, in your commit message can you include a link to my email > > mentioning Android's Speck decision > > (https://marc.info/?l=linux-crypto-vger&m=153359499015659)? > > Sure. > > > > > Also: "speck" => "Speck". > > Ack. > > > > > Also I think the fscrypt code points should be reserved so they don't > > get reused for something else: > > > > #define FS_ENCRYPTION_MODE_SPECK128_256_XTS 7 /* removed */ > > #define FS_ENCRYPTION_MODE_SPECK128_256_CTS 8 /* removed */ > > I thought about this too, but it occurred to me it's highly improbable > these were ever used, and I thought it shinier not to leave scars. But > if you feel strongly about it, no problem, I'll fix that up and send > in a v2 shortly. > > > > > For the record, I think the statements Paul and I have made evaluating > > Speck from a technical perspective remain substantially accurate. > > It wasn't my intention to relitigate this, hence the rather short > commit message. You said your thing, Tomer said his, and now I'm just > trying to clear out the leftover soda cans. > Sure, neither do I. My intention is more to make it clear that we still don't know of any "backdoor" in Speck, or any weakness that would compromise its use in practice. I mention this because people are naturally going to be curious about that, e.g. speculating that Google found a "backdoor" -- remember that we do have some good cryptographers! I'm just stating what we know, out of honesty and openness; I don't really intend to be arguing for Speck with this statement, and in any case we already made the decision to not use Speck. Thanks, - Eric