<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div class="elementToProof" style="margin-top: 1em; margin-bottom: 1em; margin-left: 0px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Thank you for your response. I am not a cryptography expert either - so perhaps crypto experts even from Microsoft may have a different take on this.</div>
<div class="elementToProof" style="margin-top: 1em; margin-bottom: 1em; margin-left: 0px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<i> >The RFC does specifically say that "Server implementations... MUST support AEAD_AES_SIV_CMAC_256." (RFC 8915, section 4.1.</i></div>
<div class="elementToProof" style="margin-top: 1em; margin-bottom: 1em; margin-left: 0px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
This is a requirement for standards compliant implementation no doubt, but limiting an implementation to only this algorithm type seems to limit the flexibility made available in NTS-KE AEAD algorithm negotiation (also in Section 4.1.5 of RFC 8915). </div>
<div class="elementToProof" style="text-align: left; text-indent: 0px; margin: 1em 0px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
I can give one more compelling reason for this proposal besides finding matching algorithms between OpenSSL and SymCrypt libraries.</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Based on my (admittedly limited) reading, NTS-NTP appears to be the primary RFC taking a dependency on AES_SIV_CMAC algorithms. The additional algorithms suggested for inclusion see widespread use and have common name recognition among administrators and users,
in addition to being common to both OpenSSL and SymCrypt libraries. Adding support for these algorithms will give users a choice of readily recognizable crypto algorithms and in my opinion, help lower the barriers for adoption of NTS-NTP protocol.</div>
<div class="elementToProof" style="margin-top: 1em; margin-bottom: 1em; margin-left: 0px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
RFC8915 is an important protocol and standards-compliant implementations further interoperability. Having said that, I am unable to comment on future releases from Microsoft at this time. </div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
-Sarath</div>
</body>
</html>