< draft-groves-sakke-02.txt   draft-groves-sakke-03.txt >
Network Working Group Groves Network Working Group Groves
Internet Draft CESG Internet Draft CESG
Intended Status: Informational April 19, 2011 Intended Status: Informational October 27, 2011
Expires: October 21, 2011 Expires: April 29, 2012
Sakai-Kasahara Key Establishment (SAKKE) Sakai-Kasahara Key Establishment (SAKKE)
draft-groves-sakke-02 draft-groves-sakke-03
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 32 skipping to change at page 1, line 32
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on October 21, 2011. This Internet-Draft will expire on April 29, 2012.
Copyright Notice Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 12, line 7 skipping to change at page 12, line 7
this will have been provided to A by KMS_T along with its User this will have been provided to A by KMS_T along with its User
Private Keys. The Sender MUST carry out the following steps. Private Keys. The Sender MUST carry out the following steps.
1) Select a random ephemeral integer value for the Shared Secret 1) Select a random ephemeral integer value for the Shared Secret
Value SSV in the range 0 to 2^n - 1. Value SSV in the range 0 to 2^n - 1.
2) Compute r = HashToIntegerRange( SSV || b , q , Hash ). 2) Compute r = HashToIntegerRange( SSV || b , q , Hash ).
3) Compute R_(b,S) = [r]([b]P + Z_S) in E(F_p). 3) Compute R_(b,S) = [r]([b]P + Z_S) in E(F_p).
4) Compute the Hint, H := SSV xor HashToIntegerRange( g^r, 2^n, 4) Compute the Hint, H.
Hash ).
a) Compute g^r. Note that g is an element of PF_p[q]
represented by an element of F_p. Thus, in order to
calculate g^r, the operation defined in Section 2.1 for
calculation of A * B in PF_p[q] is to be used as part of a
square and multiply (or similar) exponentiation algorithm,
rather than the regular F_p operations.
b) Compute H := SSV xor HashToIntegerRange( g^r, 2^n, Hash ).
5) Form the Encapsulated Data ( R_(b,S) , H ) and transmit it to 5) Form the Encapsulated Data ( R_(b,S) , H ) and transmit it to
B. B.
6) Output SSV for use to derive key material for the application 6) Output SSV for use to derive key material for the application
to be keyed. to be keyed.
6.2.2. Receiver 6.2.2. Receiver
Device B receives Encapsulated Data from device A. In order to Device B receives Encapsulated Data from device A. In order to
skipping to change at page 14, line 52 skipping to change at page 15, line 11
- SCIS, 2003. - SCIS, 2003.
[SK-KEM] Barbosa, M., Chen, L., Cheng, Z., Chimley, M., [SK-KEM] Barbosa, M., Chen, L., Cheng, Z., Chimley, M.,
Dent, A., Farshim, P., Harrison, K., Malone-Lee, Dent, A., Farshim, P., Harrison, K., Malone-Lee,
J., Smart, N. and F. Vercauteren, "SK-KEM: An J., Smart, N. and F. Vercauteren, "SK-KEM: An
Identity-Based KEM", submission for IEEE P1363.3, Identity-Based KEM", submission for IEEE P1363.3,
June 2006. June 2006.
(http://grouper.ieee.org/groups/1363/IBC/ (http://grouper.ieee.org/groups/1363/IBC/
submissions/Barbosa-SK-KEM-2006-06.pdf) submissions/Barbosa-SK-KEM-2006-06.pdf)
[SP800-57] E. Barker, W. Barker, W. Burr, W. Polk and M. [SP800-57] E. Barker, W. Barker, W. Burr, W. Polk and M.
Smid, "Recommendation for Key Management - Part 1:
Smid, "Recommendation for Key Management - Part 1: General (Revised)," NIST Special Publication
General (Revised)," NIST Special Publication 800-57, March 2007.
800-57, March 2007.
9.2. Informative References 9.2. Informative References
[Barreto] Barreto, P., Kim, H., Lynn, B. and M. Scott [Barreto] Barreto, P., Kim, H., Lynn, B. and M. Scott
"Efficient Algorithms for Pairing-Based "Efficient Algorithms for Pairing-Based
Cryptosystems", Advances in Cryptology - Crypto Cryptosystems", Advances in Cryptology - Crypto
2002, LNCS 2442, Springer-Verlag (2002), 2002, LNCS 2442, Springer-Verlag (2002),
pp.354-368. pp.354-368.
[MIKEY-SAKKE] Groves, M., "MIKEY-SAKKE: Sakai-Kasahara Key [MIKEY-SAKKE] Groves, M., "MIKEY-SAKKE: Sakai-Kasahara Key
Exchange in Multimedia Internet KEYing (MIKEY)", Exchange in Multimedia Internet KEYing (MIKEY)",
draft-groves-mikey-sakke-02 [work in progress], draft-groves-mikey-sakke-03 [work in progress],
April 2011. October 2011.
[Miller] Miller, V., "The Weil pairing, and its efficient [Miller] Miller, V., "The Weil pairing, and its efficient
calculation", J. Cryptology 17 (2004), 235-261. calculation", J. Cryptology 17 (2004), 235-261.
[P1363] IEEE P1363-2000, "Standard Specifications for [P1363] IEEE P1363-2000, "Standard Specifications for
Public-Key Cryptography," 2001. Public-Key Cryptography," 2001.
[RFC4086] Eastlake, D., Schiller, J., and S. Crocker, [RFC4086] Eastlake, D., Schiller, J., and S. Crocker,
"Randomness Requirements for Security", BCP 106, "Randomness Requirements for Security", BCP 106,
RFC 4086, June 2005. RFC 4086, June 2005.
[RFC5091] Boyen, X. and L. Martin, "Identity Based [RFC5091] Boyen, X. and L. Martin, "Identity Based
Cryptography Standard (IBCS) #1: Supersingular Cryptography Standard (IBCS) #1: Supersingular
Curve Implementations of the BF and BB1 Curve Implementations of the BF and BB1
Cryptosystems", RFC 5091, December 2007. Cryptosystems", RFC 5091, December 2007.
 End of changes. 7 change blocks. 
15 lines changed or deleted 22 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/