| < draft-avt-kanno-srtp-camellia-01.txt | draft-avt-kanno-srtp-camellia-02.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Kanno | Network Working Group S. Kanno | |||
| Internet-Draft NTT Software Corporation | Internet-Draft NTT Software Corporation | |||
| Intended status: Standards Track M. Kanda | Intended status: Standards Track M. Kanda | |||
| Expires: July 8, 2010 NTT | Expires: September 27, 2010 NTT | |||
| January 4, 2010 | March 26, 2010 | |||
| The Camellia Algorithm and Its Use wiht the Secure Real-time Transport | The Camellia Algorithm and Its Use with the Secure Real-time Transport | |||
| Protocol(SRTP) | Protocol(SRTP) | |||
| draft-avt-kanno-srtp-camellia-01 | draft-avt-kanno-srtp-camellia-02 | |||
| Abstract | Abstract | |||
| This document describes the use of the Camellia block cipher | This document describes the use of the Camellia block cipher | |||
| algorithm in the Secure Real-time Transport Protocol (SRTP) for | algorithm in the Secure Real-time Transport Protocol (SRTP) for | |||
| providing confidentiality for the Real-time Transport Protocol (RTP) | providing confidentiality for the Real-time Transport Protocol (RTP) | |||
| traffic and for the control traffic for RTP, the Real-time Transport | traffic and for the control traffic for RTP, the Real-time Transport | |||
| Control Protocol (RTCP). | Control Protocol (RTCP). | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 42 ¶ | skipping to change at page 1, line 42 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on July 8, 2010. | This Internet-Draft will expire on September 27, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2010 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 4, line 7 ¶ | skipping to change at page 4, line 7 ¶ | |||
| man.-to-impl. default | man.-to-impl. default | |||
| encryption Camellia-CTR Camellia-CTR | encryption Camellia-CTR Camellia-CTR | |||
| message integrity HMAC-SHA1 HMAC-SHA1 | message integrity HMAC-SHA1 HMAC-SHA1 | |||
| key derivation (PRF) Camellia-CTR Camellia-CTR | key derivation (PRF) Camellia-CTR Camellia-CTR | |||
| Table 1: Mandatory-to-implement and default transforms in SRTP and | Table 1: Mandatory-to-implement and default transforms in SRTP and | |||
| SRTCP. | SRTCP. | |||
| 4. Security Considerations | 4. Security Considerations | |||
| At the time of writing this document, there are no known weak keys | At the time of writing this document there are no known weak keys for | |||
| for Camellia. Also, No security problem has been found on Camellia. | Camellia. And no security problem has been found on Camellia (see | |||
| Camellia is secure against all known attacks including Differential | [NESSIE], [CRYPTREC], and [LNCS]). | |||
| cryptanalysis, linear cryptanalysis, and related key attacks. | ||||
| The security considerations in RFC 5289 [RFC3711] apply to this | The security considerations in RFC 5289 [RFC3711] apply to this | |||
| document as well. | document as well. | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| RFC 4568 [RFC4568] defines SRTP "crypto suites"; In order to allow | RFC 4568 [RFC4568] defines SRTP "crypto suites"; In order to allow | |||
| SDP to signal the use of the algorithms defined in this document, | SDP to signal the use of the algorithms defined in this document, | |||
| IANA will register the following crypto suites into the subregistry | IANA will register the following crypto suites into the subregistry | |||
| for SRTP crypto suites under the SRTP transport of the SDP Security | for SRTP crypto suites under the SRTP transport of the SDP Security | |||
| skipping to change at page 6, line 50 ¶ | skipping to change at page 6, line 50 ¶ | |||
| Encryption Standard (AES)", FIPS PUB 197, November 2001, < | Encryption Standard (AES)", FIPS PUB 197, November 2001, < | |||
| http://csrc.nist.gov/publications/fips/fips197/ | http://csrc.nist.gov/publications/fips/fips197/ | |||
| fips-197.pdf>. | fips-197.pdf>. | |||
| [ISO/IEC 18033-3] | [ISO/IEC 18033-3] | |||
| International Organization for Standardization, | International Organization for Standardization, | |||
| "Information technology - Security techniques - Encryption | "Information technology - Security techniques - Encryption | |||
| algorithms - Part 3: Block ciphers", ISO/IEC 18033-3, | algorithms - Part 3: Block ciphers", ISO/IEC 18033-3, | |||
| July 2005. | July 2005. | |||
| [LNCS] Mala, H., Shakiba, M., and M. Dakhil-alian, "New Results | ||||
| on Impossible Differential Cryptanalysis of Reduced Round | ||||
| Camellia-128", November 2009, | ||||
| <http://www.springerlink.com/content/e55783u422436g77/>. | ||||
| [NESSIE] "The NESSIE project (New European Schemes for Signatures, | [NESSIE] "The NESSIE project (New European Schemes for Signatures, | |||
| Integrity and Encryption)", | Integrity and Encryption)", | |||
| <http://www.cosic.esat.kuleuven.ac.be/nessie/>. | <http://www.cosic.esat.kuleuven.ac.be/nessie/>. | |||
| [RFC3657] Moriai, S. and A. Kato, "Use of the Camellia Encryption | [RFC3657] Moriai, S. and A. Kato, "Use of the Camellia Encryption | |||
| Algorithm in Cryptographic Message Syntax (CMS)", | Algorithm in Cryptographic Message Syntax (CMS)", | |||
| RFC 3657, January 2004. | RFC 3657, January 2004. | |||
| [RFC4051] Eastlake, D., "Additional XML Security Uniform Resource | [RFC4051] Eastlake, D., "Additional XML Security Uniform Resource | |||
| Identifiers (URIs)", RFC 4051, April 2005. | Identifiers (URIs)", RFC 4051, April 2005. | |||
| End of changes. 6 change blocks. | ||||
| 9 lines changed or deleted | 13 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||