TFC 0.5.5 out

Markus Ottela oottela at cs.helsinki.fi
Sun May 24 11:43:52 PDT 2015


TFC 0.5.5 is now out

I found another vulnerability in the constant transmission feature; 
between each long message only one command would be sent at most. This 
issue has now been fixed.

After a request, I added further message authentication for CEV: In 
addition to GMAC it now does encrypt-then-MAC style authentication using 
HMAC-SHA2-512 (512-bit key) and SHA3-512 MAC (1144-bit key) before GCM 
authenticates and decrypts the ciphertext.

I upgraded all keys to 512-bit ones so cyclic hashing of keys won't 
reduce security over long period of time (there is no key negotiation in 
TFC).

I also upgraded hashes from Keccak-256 to Keccak-512 and at the same 
time the Keccak-CTR key size was upgraded to 512-bits. So 1280-bits of 
symmetric key security in total.

As for key generation, CEV now has constant 2kHz sampling speed (1.5M 
samples are loaded in total), three vN whitening passes and between each 
of those, Keccak-512 compression with 2:1 ratio (1024 bits in, 512 out). 
User can now input different entropy from keyboard for each of the eight 
512-bit keys generated.

Also fixed lots of bugs and typos, and as usual, updated whitepaper and 
manual where necessary.

UI was tweaked slightly: I added cleaner completion messages and some 
startup animation for the lulz (disable option available in settings).

Full update log:

https://github.com/maqp/tfc-cev/blob/master/0.5.5%20update%20log.txt




More information about the cypherpunks mailing list