< draft-avt-kanno-srtp-camellia-01.txt   draft-avt-kanno-srtp-camellia-02.txt >
Network Working Group S. Kanno Network Working Group S. Kanno
Internet-Draft NTT Software Corporation Internet-Draft NTT Software Corporation
Intended status: Standards Track M. Kanda Intended status: Standards Track M. Kanda
Expires: July 8, 2010 NTT Expires: September 27, 2010 NTT
January 4, 2010 March 26, 2010
The Camellia Algorithm and Its Use wiht the Secure Real-time Transport The Camellia Algorithm and Its Use with the Secure Real-time Transport
Protocol(SRTP) Protocol(SRTP)
draft-avt-kanno-srtp-camellia-01 draft-avt-kanno-srtp-camellia-02
Abstract Abstract
This document describes the use of the Camellia block cipher This document describes the use of the Camellia block cipher
algorithm in the Secure Real-time Transport Protocol (SRTP) for algorithm in the Secure Real-time Transport Protocol (SRTP) for
providing confidentiality for the Real-time Transport Protocol (RTP) providing confidentiality for the Real-time Transport Protocol (RTP)
traffic and for the control traffic for RTP, the Real-time Transport traffic and for the control traffic for RTP, the Real-time Transport
Control Protocol (RTCP). Control Protocol (RTCP).
Status of this Memo Status of this Memo
skipping to change at page 1, line 42 skipping to change at page 1, line 42
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 8, 2010. This Internet-Draft will expire on September 27, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 4, line 7 skipping to change at page 4, line 7
man.-to-impl. default man.-to-impl. default
encryption Camellia-CTR Camellia-CTR encryption Camellia-CTR Camellia-CTR
message integrity HMAC-SHA1 HMAC-SHA1 message integrity HMAC-SHA1 HMAC-SHA1
key derivation (PRF) Camellia-CTR Camellia-CTR key derivation (PRF) Camellia-CTR Camellia-CTR
Table 1: Mandatory-to-implement and default transforms in SRTP and Table 1: Mandatory-to-implement and default transforms in SRTP and
SRTCP. SRTCP.
4. Security Considerations 4. Security Considerations
At the time of writing this document, there are no known weak keys At the time of writing this document there are no known weak keys for
for Camellia. Also, No security problem has been found on Camellia. Camellia. And no security problem has been found on Camellia (see
Camellia is secure against all known attacks including Differential [NESSIE], [CRYPTREC], and [LNCS]).
cryptanalysis, linear cryptanalysis, and related key attacks.
The security considerations in RFC 5289 [RFC3711] apply to this The security considerations in RFC 5289 [RFC3711] apply to this
document as well. document as well.
5. IANA Considerations 5. IANA Considerations
RFC 4568 [RFC4568] defines SRTP "crypto suites"; In order to allow RFC 4568 [RFC4568] defines SRTP "crypto suites"; In order to allow
SDP to signal the use of the algorithms defined in this document, SDP to signal the use of the algorithms defined in this document,
IANA will register the following crypto suites into the subregistry IANA will register the following crypto suites into the subregistry
for SRTP crypto suites under the SRTP transport of the SDP Security for SRTP crypto suites under the SRTP transport of the SDP Security
skipping to change at page 6, line 50 skipping to change at page 6, line 50
Encryption Standard (AES)", FIPS PUB 197, November 2001, < Encryption Standard (AES)", FIPS PUB 197, November 2001, <
http://csrc.nist.gov/publications/fips/fips197/ http://csrc.nist.gov/publications/fips/fips197/
fips-197.pdf>. fips-197.pdf>.
[ISO/IEC 18033-3] [ISO/IEC 18033-3]
International Organization for Standardization, International Organization for Standardization,
"Information technology - Security techniques - Encryption "Information technology - Security techniques - Encryption
algorithms - Part 3: Block ciphers", ISO/IEC 18033-3, algorithms - Part 3: Block ciphers", ISO/IEC 18033-3,
July 2005. July 2005.
[LNCS] Mala, H., Shakiba, M., and M. Dakhil-alian, "New Results
on Impossible Differential Cryptanalysis of Reduced Round
Camellia-128", November 2009,
<http://www.springerlink.com/content/e55783u422436g77/>.
[NESSIE] "The NESSIE project (New European Schemes for Signatures, [NESSIE] "The NESSIE project (New European Schemes for Signatures,
Integrity and Encryption)", Integrity and Encryption)",
<http://www.cosic.esat.kuleuven.ac.be/nessie/>. <http://www.cosic.esat.kuleuven.ac.be/nessie/>.
[RFC3657] Moriai, S. and A. Kato, "Use of the Camellia Encryption [RFC3657] Moriai, S. and A. Kato, "Use of the Camellia Encryption
Algorithm in Cryptographic Message Syntax (CMS)", Algorithm in Cryptographic Message Syntax (CMS)",
RFC 3657, January 2004. RFC 3657, January 2004.
[RFC4051] Eastlake, D., "Additional XML Security Uniform Resource [RFC4051] Eastlake, D., "Additional XML Security Uniform Resource
Identifiers (URIs)", RFC 4051, April 2005. Identifiers (URIs)", RFC 4051, April 2005.
 End of changes. 6 change blocks. 
9 lines changed or deleted 13 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/