| < draft-ietf-ipsec-ike-auth-ecdsa-04.txt | draft-ietf-ipsec-ike-auth-ecdsa-05.txt > | |||
|---|---|---|---|---|
| IPSec Working Group J. Solinas, NSA | IPSec Working Group D. Fu, NSA | |||
| INTERNET-DRAFT | INTERNET-DRAFT J. Solinas, NSA | |||
| Expires November 27, 2005 May 27, 2005 | Expires March 30, 2006 September 30, 2005 | |||
| IKE Authentication Using ECDSA | IKE and IKEv2 Authentication Using ECDSA | |||
| <draft-ietf-ipsec-ike-auth-ecdsa-04.txt> | <draft-ietf-ipsec-ike-auth-ecdsa-05.txt> | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 35 ¶ | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/1id-abstracts.html | http://www.ietf.org/1id-abstracts.html | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
| Abstract | Abstract | |||
| This document describes how the Elliptic Curve Digital Signature | This document describes how the Elliptic Curve Digital Signature | |||
| Algorithm (ECDSA) may be used as the authentication method within | Algorithm (ECDSA) may be used as the authentication method within | |||
| the Internet Key Exchange (IKE) protocol. ECDSA may provide benefits | the Internet Key Exchange (IKE) and Internet Key Exchange version 2 | |||
| including computational efficiency, small signature sizes, and | (IKEv2) protocols. ECDSA may provide benefits including | |||
| minimal bandwidth compared to other available digital signature | computational efficiency, small signature sizes, and minimal | |||
| methods. This document adds ECDSA capability to IKE without | bandwidth compared to other available digital signature methods. | |||
| introducing any changes to existing IKE operation. | This document adds ECDSA capability to IKE without introducing any | |||
| changes to existing IKE operation. | ||||
| Table of Contents | ||||
| 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
| 2. ECDSA . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
| 3. Specifying ECDSA within IKE and IKEv2 . . . . . . . . . . . 3 | ||||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . 4 | ||||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . 5 | ||||
| 6. Test Vectors. . . . . . . . . . . . . . . . . . . . . . . . 5 | ||||
| 6.1 Authentication Method 9 . . . . . . . . . . . . . . . 6 | ||||
| 6.2 Authentication Method 10. . . . . . . . . . . . . . . 7 | ||||
| 6.3 Authentication Method 11. . . . . . . . . . . . . . . 10 | ||||
| 7. References. . . . . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 7.1 Normative . . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 7.2. Informative . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 1. Introduction | 1. Introduction | |||
| The Internet Key Exchange, or IKE [IKE], is a key agreement and | The Internet Key Exchange, or IKE [IKE], is a key agreement and | |||
| security negotiation protocol; it is used for key establishment in | security negotiation protocol; it is used for key establishment in | |||
| IPSec. In Phase 1 of IKE, both parties must authenticate each other | IPSec. In the initial set of exchanges, both parties must | |||
| using a negotiated authentication method. One option for the | authenticate each other using a negotiated authentication method. In | |||
| the original version of IKE, this occurs in Phase 1; in IKEv2, it | ||||
| occurs in the exchange called IKE-AUTH. One option for the | ||||
| authentication method is digital signatures using public key | authentication method is digital signatures using public key | |||
| cryptography. Currently, there are two digital signature methods | cryptography. Currently, there are two digital signature methods | |||
| defined for use within Phase 1: RSA signatures and DSA (DSS) | defined for use within Phase 1 and IKE-AUTH: RSA signatures and DSA | |||
| signatures. This document introduces ECDSA signatures as a third | (DSS) signatures. This document introduces ECDSA signatures as a | |||
| method. | third method. | |||
| For any given level of security against the best attacks known, ECDSA | For any given level of security against the best attacks known, ECDSA | |||
| signatures are smaller than RSA signatures and ECDSA keys require | signatures are smaller than RSA signatures and ECDSA keys require | |||
| less bandwidth than DSA keys; there are also advantages of | less bandwidth than DSA keys; there are also advantages of | |||
| computational speed and efficiency in many settings. Additional | computational speed and efficiency in many settings. Additional | |||
| efficiency may be gained by simultaneously using ECDSA for IKE | efficiency may be gained by simultaneously using ECDSA for IKE | |||
| authentication and using elliptic curve groups for the IKE key | authentication and using elliptic curve groups for the IKE key | |||
| exchange. Implementers of IPSec and IKE may therefore find it | exchange. Implementers of IPSec and IKE may therefore find it | |||
| desirable to use ECDSA as the Phase 1 authentication method. | desirable to use ECDSA as the Phase 1/IKE-AUTH authentication method. | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | ||||
| document are to be interpreted as described in [RFC2119]. | ||||
| 2. ECDSA | 2. ECDSA | |||
| The Elliptic Curve Digital Signature Algorithm (ECDSA) is the | The Elliptic Curve Digital Signature Algorithm (ECDSA) is the | |||
| elliptic curve analogue of the DSA (DSS) signature method [DSS]. It | elliptic curve analogue of the DSA (DSS) signature method [DSS]. It | |||
| is defined in the ANSI X9.62 standard [X9.62]. Other compatible | is defined in the ANSI X9.62 standard [X9.62-2003]. Other compatible | |||
| specifications include FIPS 186-2 [DSS], IEEE 1363 [IEEE-1363], IEEE | specifications include FIPS 186-2 [DSS], IEEE 1363 [IEEE-1363], IEEE | |||
| 1363A [IEEE-1363A], and SEC1 [SEC1]. | 1363A [IEEE-1363A], and SEC1 [SEC1]. | |||
| Like DSA, ECDSA incorporates the use of a hash function. [SHS] | ||||
| specifies hash functions that are appropriate for use with ECDSA. | ||||
| Implementations of IKE using ECDSA SHOULD use one of these hash | ||||
| functions. | ||||
| ECDSA signatures are smaller than RSA signatures of similar | ECDSA signatures are smaller than RSA signatures of similar | |||
| cryptographic strength. ECDSA public keys (and certificates) are | cryptographic strength. ECDSA public keys (and certificates) are | |||
| smaller than similar strength DSA keys, resulting in improved | smaller than similar strength DSA keys, resulting in improved | |||
| communications efficiency. Furthermore, on many platforms ECDSA | communications efficiency. Furthermore, on many platforms ECDSA | |||
| operations can be computed more quickly than similar strength RSA or | operations can be computed more quickly than similar strength RSA or | |||
| DSA operations (see [LV] for a security analysis of key sizes across | DSA operations (see [LV] for a security analysis of key sizes across | |||
| public key algorithms). These advantages of signature size, | public key algorithms). These advantages of signature size, | |||
| bandwidth, and computational efficiency may make ECDSA an attractive | bandwidth, and computational efficiency may make ECDSA an attractive | |||
| choice for many IKE implementations. | choice for many IKE implementations. | |||
| Recommended elliptic curve domain parameters for use with ECDSA are | 3. Specifying ECDSA within IKE and IKEv2 | |||
| given in FIPS 186-2 [DSS], ANSI X9.62 [X9.62], and SEC 2 [SEC2]. | ||||
| Implementations of IKE using ECDSA MAY use one of these domain | The original IKE key negotiation protocol consists of two phases, | |||
| parameters. A subset of these parameters are recommended in | Phase 1 and Phase 2. Within Phase 1, the two negotiating parties | |||
| [IKE-ECP] for use in the IKE key exchange. These parameters MAY | authenticate each other using either pre-shared keys, digital | |||
| be used for ECDSA as well. | signatures, or public-key encryption. | |||
| 3. Specifying ECDSA within IKE | The IKEv2 key negotiation protocol begins with two exchanges, | |||
| IKE-SA-INIT and IKE-AUTH. When not using extensible authentication, | ||||
| the IKE-AUTH exchange includes a digital signature or MAC on a block | ||||
| of data. | ||||
| The IKE key negotiation protocol consists of two phases, Phase 1 and | The IANA-assigned attribute number for authentication using generic | |||
| Phase 2. Within Phase 1, the two negotiating parties authenticate | ECDSA is 8 (see [IANA]), but the parameters and associated hash | |||
| each other, using either pre-shared keys, digital signatures, or | functions are not specified. The document defines the following | |||
| public-key encryption. For digital signatures and public-key | authentication algorithms along with their anticipated IANA | |||
| encryption methods, there are multiple options. The IANA-assigned | attribute numbers. | |||
| attribute number for Phase 1 authentication using ECDSA is 8 (see | ||||
| [IANA]). | ||||
| Phase 1 can be either Main Mode or Aggressive Mode. The use and | Digital Diffie- | |||
| specification of ECDSA signatures as the authentication method | IANA Signature Hellman Hash | |||
| applies to both modes. The sequence of Phase 1 message payloads is | Value Algorithm Group Function | |||
| the same with ECDSA signatures as with DSS or RSA signatures. | ----- --------- ------------ ------------- | |||
| 9 ECDSA P-256 [19] SHA-256 [4] | ||||
| 10 ECDSA P-384 [20] SHA-384 [5] | ||||
| 11 ECDSA P-521 [21] SHA-512 [6] | ||||
| When ECDSA is used in IKE, the signature payload SHALL contain an | The numbers in brackets are the IANA identifiers for the Diffie- | |||
| encoding of the computed signature, consisting of a pair of integers | Hellman groups and the hash functions. | |||
| r and s, encoded as a byte string using the ASN.1 syntax | ||||
| "ECDSA-Sig-Value" with DER encoding rules as specified in ANSI X9.62 | ||||
| [X9.62]. | ||||
| As with the other digital signature methods, ECDSA authentication | The Diffie-Hellman group is understood to use the base points | |||
| requires the parties to know and trust each other's public key. This | supplied in [IKE-ECP]. Therefore the selection of IANA identifier | |||
| can be done by exchanging certificates, possibly within the Phase 1 | from the above table completely specifies the parameters necessary | |||
| negotiation, if the public keys of the parties are not already known | for verifying the signature. | |||
| to each other. The use of Internet X.509 public key infrastructure | ||||
| certificates [RFC-3280] is recommended; the representation of ECDSA | ||||
| keys in X.509 certificates is specified in [RFC-3279]. This | ||||
| representation SHOULD be used if X.509 certificates are used. | ||||
| Implemententers may find it convenient, when using ECDSA as the | When ECDSA is used as the digital signature in IKE, the signature | |||
| payload SHALL contain an encoding of the computed signature | ||||
| consisting of the concatenation of a pair of integers s and t. The | ||||
| definition of s and t are given in Section 6 of this document. | ||||
| Implementers may find it convenient, when using ECDSA as the | ||||
| authentication method, to specify the hash used by ECDSA as the | authentication method, to specify the hash used by ECDSA as the | |||
| value of the hash algorithm attribute. Implementers may also find | value of the hash algorithm attribute. Implementers may also find | |||
| it convenient to use ECDSA authentication in conjunction with an | it convenient to use ECDSA authentication in conjunction with an | |||
| elliptic curve group for the IKE Diffie-Hellman key agreement; see | elliptic curve group for the IKE Diffie-Hellman key agreement; see | |||
| [IKE-ECP] for some specific curves for the key agreement. | [IKE-ECP] for some specific curves for the key agreement. | |||
| 4. Security Considerations | 4. Security Considerations | |||
| Implementors should ensure that appropriate security measures are in | Implementers should ensure that appropriate security measures are in | |||
| place when they deploy ECDSA within IKE. In particular, the security | place when they deploy ECDSA within IKE. In particular, the security | |||
| of ECDSA requires the careful selection of both key sizes and | of ECDSA requires the careful selection of both key sizes and | |||
| elliptic curve domain parameters. Selection guidelines for these | elliptic curve domain parameters. Selection guidelines for these | |||
| parameters and some specific recommended curves that are considered | parameters and some specific recommended curves that are considered | |||
| safe are provided in ANSI X9.62 [X9.62], FIPS 186-2 [DSS], and SEC 2 | safe are provided in ANSI X9.62 [X9.62], FIPS 186-2 [DSS], and SEC 2 | |||
| [SEC2]. | [SEC2]. | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This document has no actions for IANA. | Before this document can become an RFC, it is required that IANA | |||
| update its registry of IKE authentication methods in [IANA] to | ||||
| include the three options defined in Section 3 of this document. | ||||
| 6. References | 6. Test Vectors | |||
| 6.1 Normative | The following are examples of the IKEv2 key exchange payload for each | |||
| of the three groups specified in this document. | ||||
| The following notation is used. The Diffie-Hellman group is given by | ||||
| the elliptic curve y^2 = x^3 - 3 x + b modulo p. If (x,y) is a | ||||
| point on the curve (i.e. x and y satisfy the above equation), then | ||||
| (x,y)^n denotes the scalar multiple of the point (x,y) by the | ||||
| integer n; it is another point on the curve. In the literature, the | ||||
| scalar multiple is typically denoted n(x,y); the notation (x,y)^n is | ||||
| used in order to conform to the notation used in [IKE], [IKEv2], and | ||||
| [IKE-ECP]. | ||||
| The group order for the Diffie-Hellman group is denoted q. The | ||||
| generator is denoted g=(gx,gy). The hash of the message is denoted | ||||
| h. The signer's static private key is denoted w; it is an integer | ||||
| between zero and q. The signer's static public key is | ||||
| g^w=(gwx,gwy). The ephemeral private key is denoted k; it is an | ||||
| integer between zero and q. The ephemeral public key is | ||||
| g^k=(gkx,gky). The quantity kinv is the integer between zero and | ||||
| q such that k*kinv = 1 modulo q. The first signature component is | ||||
| denoted s; it is equal to gkx reduced modulo q. The second signature | ||||
| component is denoted t; it is equal to (h+s*w)*kinv reduced modulo q. | ||||
| The test vectors below also include the data for verifying the ECDSA | ||||
| signature. The verifier computes h and the quantity tinv, which is | ||||
| the integer between zero and q such that t*tinv = 1 modulo q. The | ||||
| verifier computes | ||||
| u = h*tinv modulo q | ||||
| and | ||||
| v = s*tinv modulo q. | ||||
| The verifier computes (gx,gy)^u = (gux,guy) and | ||||
| (gwx,gwy)^v = (gwvx,gwvy). The verifier computes the sum | ||||
| (sumx,sumy) = (gux,guy) + (gwvx,gwvy) | ||||
| where + denotes addition of points on the elliptic curve. The | ||||
| signature is verified if | ||||
| sumx modulo q = s. | ||||
| 6.1 Authentication Method 9 | ||||
| The parameters for Diffie-Hellman group 19 are | ||||
| p: | ||||
| FFFFFFFF 00000001 00000000 00000000 00000000 FFFFFFFF FFFFFFFF FFFFFFFF | ||||
| b: | ||||
| 5AC635D8 AA3A93E7 B3EBBD55 769886BC 651D06B0 CC53B0F6 3BCE3C3E 27D2604B | ||||
| q: | ||||
| FFFFFFFF 00000000 FFFFFFFF FFFFFFFF BCE6FAAD A7179E84 F3B9CAC2 FC632551 | ||||
| gx: | ||||
| 6B17D1F2 E12C4247 F8BCE6E5 63A440F2 77037D81 2DEB33A0 F4A13945 D898C296 | ||||
| gy: | ||||
| 4FE342E2 FE1A7F9B 8EE7EB4A 7C0F9E16 2BCE3357 6B315ECE CBB64068 37BF51F5 | ||||
| The static and ephemeral keys are given by | ||||
| w: | ||||
| DC51D386 6A15BACD E33D96F9 92FCA99D A7E6EF09 34E70975 59C27F16 14C88A7F | ||||
| gwx: | ||||
| 2442A5CC 0ECD015F A3CA31DC 8E2BBC70 BF42D60C BCA20085 E0822CB0 4235E970 | ||||
| gwy: | ||||
| 6FC98BD7 E50211A4 A27102FA 3549DF79 EBCB4BF2 46B80945 CDDFE7D5 09BBFD7D | ||||
| k: | ||||
| 9E56F509 196784D9 63D1C0A4 01510EE7 ADA3DCC5 DEE04B15 4BF61AF1 D5A6DECE | ||||
| gkx: | ||||
| CB28E099 9B9C7715 FD0A80D8 E47A7707 9716CBBF 917DD72E 97566EA1 C066957C | ||||
| gky: | ||||
| 2B57C023 5FB74897 68D058FF 4911C20F DBE71E36 99D91339 AFBB903E E17255DC | ||||
| The SHA-256 hash of the message "abc" (hex 616263) is | ||||
| h: | ||||
| BA7816BF 8F01CFEA 414140DE 5DAE2223 B00361A3 96177A9C B410FF61 F20015AD | ||||
| The signature of the message is (s,t) where | ||||
| kinv: | ||||
| AFA27894 5AF74B1E 295008E0 3A8984E2 E1C69D9B BBC74AF1 4E3AC4E4 21ABFA61 | ||||
| s: | ||||
| CB28E099 9B9C7715 FD0A80D8 E47A7707 9716CBBF 917DD72E 97566EA1 C066957C | ||||
| t: | ||||
| 86FA3BB4 E26CAD5B F90B7F81 899256CE 7594BB1E A0C89212 748BFF3B 3D5B0315 | ||||
| The quantities required for verification of the signature are | ||||
| tinv: | ||||
| 33BDC294 E90CFAD6 2A9F2FD1 F8741DA7 7C02A573 E1B53BA1 7A60BA90 4F491952 | ||||
| u: | ||||
| C3875E57 C85038A0 D60370A8 7505200D C8317C8C 534948BE A6559C7C 18E6D4CE | ||||
| v: | ||||
| 3B4E49C4 FDBFC006 FF993C81 A50EAE22 1149076D 6EC09DDD 9FB3B787 F85B6483 | ||||
| gux: | ||||
| 4F749762 9362EFBB EE591206 D036568F 239789B2 34960635 C6607EC6 99062600 | ||||
| guy: | ||||
| 8490E12D E4DBB68C BF941721 5D8C648E 57A8E0E4 4E176856 3CD58697 001A8D08 | ||||
| gwvx: | ||||
| 726E5684 964DB8EA 341D8679 DFB70E04 EDA404E9 94BA730F A43F1E78 ED81211B | ||||
| gwvy: | ||||
| 0C10CBA8 DD2620C1 12A4F9BE 578E4BE1 E64DC0F7 D1D526CA 167749F9 CEC0DF08 | ||||
| sumx: | ||||
| CB28E099 9B9C7715 FD0A80D8 E47A7707 9716CBBF 917DD72E 97566EA1 C066957C | ||||
| sumy: | ||||
| 2B57C023 5FB74897 68D058FF 4911C20F DBE71E36 99D91339 AFBB903E E17255DC | ||||
| The signature is valid since sumx modulo q equals s. | ||||
| If the signature (s,t) were the one appearing in the authentication | ||||
| payload, then the payload would be as follows. | ||||
| 00000048 00090000 CB28E099 9B9C7715 FD0A80D8 E47A7707 9716CBBF 917DD72E | ||||
| 97566EA1 C066957C 86FA3BB4 E26CAD5B F90B7F81 899256CE 7594BB1E A0C89212 | ||||
| 748BFF3B 3D5B0315 | ||||
| 6.2 Authentication Method 10 | ||||
| The parameters for Diffie-Hellman group 20 are | ||||
| p: | ||||
| FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE | ||||
| FFFFFFFF 00000000 00000000 FFFFFFFF | ||||
| b: | ||||
| B3312FA7 E23EE7E4 988E056B E3F82D19 181D9C6E FE814112 0314088F 5013875A | ||||
| C656398D 8A2ED19D 2A85C8ED D3EC2AEF | ||||
| q: | ||||
| FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF C7634D81 F4372DDF | ||||
| 581A0DB2 48B0A77A ECEC196A CCC52973 | ||||
| gx: | ||||
| AA87CA22 BE8B0537 8EB1C71E F320AD74 6E1D3B62 8BA79B98 59F741E0 82542A38 | ||||
| 5502F25D BF55296C 3A545E38 72760AB7 | ||||
| gy: | ||||
| 3617DE4A 96262C6F 5D9E98BF 9292DC29 F8F41DBD 289A147C E9DA3113 B5F0B8C0 | ||||
| 0A60B1CE 1D7E819D 7A431D7C 90EA0E5F | ||||
| The static and ephemeral keys are given by | ||||
| w: | ||||
| 0BEB6466 34BA8773 5D77AE48 09A0EBEA 865535DE 4C1E1DCB 692E8470 8E81A5AF | ||||
| 62E528C3 8B2A81B3 5309668D 73524D9F | ||||
| gwx: | ||||
| 96281BF8 DD5E0525 CA049C04 8D345D30 82968D10 FEDF5C5A CA0C64E6 465A97EA | ||||
| 5CE10C9D FEC21797 41571072 1F437922 | ||||
| gwy: | ||||
| 447688BA 94708EB6 E2E4D59F 6AB6D7ED FF9301D2 49FE49C3 3096655F 5D502FAD | ||||
| 3D383B91 C5E7EDAA 2B714CC9 9D5743CA | ||||
| k: | ||||
| B4B74E44 D71A13D5 68003D74 89908D56 4C7761E2 29C58CBF A1895009 6EB7463B | ||||
| 854D7FA9 92F934D9 27376285 E63414FA | ||||
| gkx: | ||||
| FB017B91 4E291494 32D8BAC2 9A514640 B46F53DD AB2C6994 8084E293 0F1C8F7E | ||||
| 08E07C9C 63F2D21A 07DCB56A 6AF56EB3 | ||||
| gky: | ||||
| 2C735822 48686C41 8485E7B7 4E707625 A1832769 F7F56E81 7CF83B1E 4690E782 | ||||
| 65B7AD37 BC2F865F DC290DB6 15CDF17F | ||||
| The SHA-384 hash of the message "abc" (hex 616263) is | ||||
| h: | ||||
| CB00753F 45A35E8B B5A03D69 9AC65007 272C32AB 0EDED163 1A8B605A 43FF5BED | ||||
| 8086072B A1E7CC23 58BAECA1 34C825A7 | ||||
| The signature of the message is (s,t) where | ||||
| kinv: | ||||
| EB12876B F6191A29 1AA5780A 3887C3BF E7A5C7E3 21CCA674 886B1228 D9BB3D52 | ||||
| 918EF19F E5CE67E9 80BEDC1E 613D39C0 | ||||
| s: | ||||
| FB017B91 4E291494 32D8BAC2 9A514640 B46F53DD AB2C6994 8084E293 0F1C8F7E | ||||
| 08E07C9C 63F2D21A 07DCB56A 6AF56EB3 | ||||
| t: | ||||
| B263A130 5E057F98 4D38726A 1B468741 09F417BC A112674C 528262A4 0A629AF1 | ||||
| CBB9F516 CE0FA7D2 FF630863 A00E8B9F | ||||
| The quantities required for verification of the signature are | ||||
| tinv: | ||||
| 06EFACEE 8A657F77 584C5A03 9F7E2720 D61DF84C 8FAC6FA4 9A06F6C4 6E8CDA28 | ||||
| 6ADD7D3B 90E1CDA4 79BD899B EE14B99D | ||||
| u: | ||||
| CA5E3714 B4B68BB8 5AF0BC69 E12B16C8 8FAFA26A A6598D7E 2D5C3C40 26F7A944 | ||||
| 7D731721 ABE62CC0 1165ABFD 847088E9 | ||||
| v: | ||||
| 1342C935 5F1A4563 5435899A C24AEF06 3947CA47 951E89F6 83D73172 F964C359 | ||||
| 69E75EF9 06DA2396 2C747C04 A01137B8 | ||||
| gux: | ||||
| 94B90657 77A3B5BE 399CEE66 A9DB4E64 8422E370 F19ED1A9 C699769E 01EC9A30 | ||||
| E544EB10 7D35F7C9 3FA8FB11 8DCB91ED | ||||
| guy: | ||||
| 45882DC2 CF367F74 3FC02961 2D5B96FC F9A09E28 1C3C162D 0D189267 83841606 | ||||
| 87E9953A CC634CEF 2D9897B8 BEE32BC2 | ||||
| gwvx: | ||||
| 6A142FF2 B0B8C552 9B7F78E2 1B014764 440ED8C0 339B2187 13DB9500 3D1A8BA5 | ||||
| 0811C3B8 41B34CA6 E1785BC8 DB9111F4 | ||||
| gwvy: | ||||
| 98C2A76C 7E6EDB56 6B1DB657 ED3019F8 2FB94FBB F36124DE C23BB7DE 4B181357 | ||||
| 173F1ABF F3980DF1 F7EC4335 B185CEBF | ||||
| sumx: | ||||
| FB017B91 4E291494 32D8BAC2 9A514640 B46F53DD AB2C6994 8084E293 0F1C8F7E | ||||
| 08E07C9C 63F2D21A 07DCB56A 6AF56EB3 | ||||
| sumy: | ||||
| 2C735822 48686C41 8485E7B7 4E707625 A1832769 F7F56E81 7CF83B1E 4690E782 | ||||
| 65B7AD37 BC2F865F DC290DB6 15CDF17F | ||||
| The signature is valid since sumx modulo q equals s. | ||||
| If the signature (s,t) were the one appearing in the authentication | ||||
| payload, then the payload would be as follows. | ||||
| 00000068 000A0000 FB017B91 4E291494 32D8BAC2 9A514640 B46F53DD AB2C6994 | ||||
| 8084E293 0F1C8F7E 08E07C9C 63F2D21A 07DCB56A 6AF56EB3 B263A130 5E057F98 | ||||
| 4D38726A 1B468741 09F417BC A112674C 528262A4 0A629AF1 CBB9F516 CE0FA7D2 | ||||
| FF630863 A00E8B9F | ||||
| 6.3 Authentication Method 11 | ||||
| The parameters for Diffie-Hellman group 21 are | ||||
| p: | ||||
| 01FFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF | ||||
| FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF | ||||
| FFFF | ||||
| b: | ||||
| 0051953E B9618E1C 9A1F929A 21A0B685 40EEA2DA 725B99B3 15F3B8B4 89918EF1 | ||||
| 09E15619 3951EC7E 937B1652 C0BD3BB1 BF073573 DF883D2C 34F1EF45 1FD46B50 | ||||
| 3F00 | ||||
| q: | ||||
| 01FFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF | ||||
| FFFA5186 8783BF2F 966B7FCC 0148F709 A5D03BB5 C9B8899C 47AEBB6F B71E9138 | ||||
| 6409 | ||||
| gx: | ||||
| 00C6858E 06B70404 E9CD9E3E CB662395 B4429C64 8139053F B521F828 AF606B4D | ||||
| 3DBAA14B 5E77EFE7 5928FE1D C127A2FF A8DE3348 B3C1856A 429BF97E 7E31C2E5 | ||||
| BD66 | ||||
| gy: | ||||
| 01183929 6A789A3B C0045C8A 5FB42C7D 1BD998F5 4449579B 446817AF BD17273E | ||||
| 662C97EE 72995EF4 2640C550 B9013FAD 0761353C 7086A272 C24088BE 94769FD1 | ||||
| 6650 | ||||
| The static and ephemeral keys are given by | ||||
| w: | ||||
| 0065FDA3 409451DC AB0A0EAD 45495112 A3D813C1 7BFD34BD F8C1209D 7DF58491 | ||||
| 20597779 060A7FF9 D704ADF7 8B570FFA D6F062E9 5C7E0C5D 5481C5B1 53B48B37 | ||||
| 5FA1 | ||||
| gwx: | ||||
| 0151518F 1AF0F563 517EDD54 85190DF9 5A4BF57B 5CBA4CF2 A9A3F647 4725A35F | ||||
| 7AFE0A6D DEB8BEDB CD6A197E 592D4018 8901CECD 650699C9 B5E456AE A5ADD190 | ||||
| 52A8 | ||||
| gwy: | ||||
| 006F3B14 2EA1BFFF 7E2837AD 44C9E4FF 6D2D34C7 3184BBAD 90026DD5 E6E85317 | ||||
| D9DF45CA D7803C6C 20035B2F 3FF63AFF 4E1BA64D 1C077577 DA3F4286 C58F0AEA | ||||
| E643 | ||||
| k: | ||||
| 00C1C2B3 05419F5A 41344D7E 4359933D 734096F5 56197A9B 244342B8 B62F46F9 | ||||
| 373778F9 DE6B6497 B1EF825F F24F42F9 B4A4BD73 82CFC337 8A540B1B 7F0C1B95 | ||||
| 6C2F | ||||
| gkx: | ||||
| 0154FD38 36AF92D0 DCA57DD5 341D3053 988534FD E8318FC6 AAAAB68E 2E6F4339 | ||||
| B19F2F28 1A7E0B22 C269D93C F8794A92 78880ED7 DBB8D936 2CAEACEE 54432055 | ||||
| 2251 | ||||
| gky: | ||||
| 006D073D 72B272EA 86388D86 8EF64D4C 300A67AC 2981C0F8 E6710AEF A2FCF845 | ||||
| 8117B05E B91BA11C 68BCFC1B C24587E3 A1D0CA2A FE398CDB CFD79CB3 0B36B218 | ||||
| B437 | ||||
| The hash of the message "abc" (hex 616263) is | ||||
| SHA-512(616263): | ||||
| DDAF35A1 93617ABA CC417349 AE204131 12E6FA4E 89A97EA2 0A9EEEE6 4B55D39A | ||||
| 2192992A 274FC1A8 36BA3C23 A3FEEBBD 454D4423 643CE80E 2A9AC94F A54CA49F | ||||
| Therefore the quantity h is | ||||
| h: | ||||
| 0000DDAF 35A19361 7ABACC41 7349AE20 413112E6 FA4E89A9 7EA20A9E EEE64B55 | ||||
| D39A2192 992A274F C1A836BA 3C23A3FE EBBD454D 4423643C E80E2A9A C94FA54C | ||||
| A49F | ||||
| The signature of the message is (s,t) where | ||||
| kinv: | ||||
| 00E90EF3 CE52F8D1 E5A4EEBD 0905F425 2400B0AE 73B49E33 23BCE258 A55F507D | ||||
| 7C45F3A2 DE3A3EA2 E51D9343 46D71593 A80C8C62 FE229DDF 5D2B64B7 AF4A0837 | ||||
| 0D32 | ||||
| s: | ||||
| 0154FD38 36AF92D0 DCA57DD5 341D3053 988534FD E8318FC6 AAAAB68E 2E6F4339 | ||||
| B19F2F28 1A7E0B22 C269D93C F8794A92 78880ED7 DBB8D936 2CAEACEE 54432055 | ||||
| 2251 | ||||
| t: | ||||
| 017705A7 030290D1 CEB605A9 A1BB03FF 9CDD521E 87A696EC 926C8C10 C8362DF4 | ||||
| 97536710 1F67D1CF 9BCCBF2F 3D239534 FA509E70 AAC851AE 01AAC68D 62F86647 | ||||
| 2660 | ||||
| The quantities required for verification of the signature are | ||||
| tinv: | ||||
| 00DDA6B8 83CB36BF CB21D5B0 B7D1F443 9D3C7797 B23A8D73 58032D5C C917142E | ||||
| 3F6778BD 977D8460 867853AE 9C74EF5E 417CFA96 F7C937C1 418D9343 738A1BA8 | ||||
| 78E0 | ||||
| u: | ||||
| 019E5FDB ECC2A88B 72679233 11B27868 427AE2B8 83ED0346 9CBABE65 ACD3F2F8 | ||||
| D74FA657 8A23C85D 598D1DC6 C1DA074E 0AB83852 BDAAE2F1 857713D3 5BB9BDB7 | ||||
| 32D8 | ||||
| v: | ||||
| 0069BB0C BA5A6FC8 8A08C0AD AA88F5A5 1EE60477 2D084D98 63DF86FD 958AD9B3 | ||||
| 006E62C4 30CE545E 9C918F04 D852DA13 47CC6A3E FA89BC2C 13B89124 25BA8D60 | ||||
| BF03 | ||||
| gux: | ||||
| 00921F3E CEAF579C FDDA6AF9 C1728E5B CA33F77B 57F5984C 624BFF10 F244B577 | ||||
| 144CA24E 20310DEF 2F777892 DA1ED5DE A9A6EF09 85D965AE 98BCF129 855C6C4F | ||||
| 3311 | ||||
| guy: | ||||
| 01812CBF E8D08BE9 0CD6AB5D 2ED107A0 123A41A9 C15ACB31 7D65E228 92D89AF8 | ||||
| C29A4220 83E3495E D14726A0 9868AF1B 399CEF86 6DDDE6B1 0D709696 06525D15 | ||||
| B4EB | ||||
| gwvx: | ||||
| 00AF23A7 7F50CC54 8CEBC506 58FE4A0B A26FF9DE 4E864DE2 7FD059B6 3AE14B5F | ||||
| 87286BC7 7AAEBA32 4FF675A1 FF7035B6 89AF3835 95F8B5A8 67432FFE 8BF29CF6 | ||||
| 0688 | ||||
| gwvy: | ||||
| 017A32C4 5A01DF60 3CA96FDF E83493BB 4CB5EE00 C32960A5 4FEB0B39 88841E2F | ||||
| 9D52B745 C5A7FEC6 777BB899 B65730E9 32D1395D C0574D3C F1093C64 505804D0 | ||||
| A5B3 | ||||
| sumx: | ||||
| 0154FD38 36AF92D0 DCA57DD5 341D3053 988534FD E8318FC6 AAAAB68E 2E6F4339 | ||||
| B19F2F28 1A7E0B22 C269D93C F8794A92 78880ED7 DBB8D936 2CAEACEE 54432055 | ||||
| 2251 | ||||
| sumy: | ||||
| 006D073D 72B272EA 86388D86 8EF64D4C 300A67AC 2981C0F8 E6710AEF A2FCF845 | ||||
| 8117B05E B91BA11C 68BCFC1B C24587E3 A1D0CA2A FE398CDB CFD79CB3 0B36B218 | ||||
| B437 | ||||
| The signature is valid since sumx modulo q equals s. | ||||
| If the signature (s,t) were the one appearing in the authentication | ||||
| payload, then the payload would be as follows. | ||||
| 0000008C 000B0000 0154FD38 36AF92D0 DCA57DD5 341D3053 988534FD E8318FC6 | ||||
| AAAAB68E 2E6F4339 B19F2F28 1A7E0B22 C269D93C F8794A92 78880ED7 DBB8D936 | ||||
| 2CAEACEE 54432055 22510177 05A70302 90D1CEB6 05A9A1BB 03FF9CDD 521E87A6 | ||||
| 96EC926C 8C10C836 2DF49753 67101F67 D1CF9BCC BF2F3D23 9534FA50 9E70AAC8 | ||||
| 51AE01AA C68D62F8 66472660 | ||||
| 7. References | ||||
| 7.1 Normative | ||||
| [IANA] Internet Assigned Numbers Authority, Internet Key Exchange | ||||
| (IKE) Attributes. (http://www.iana.org/assignments/ipsec-registry) | ||||
| [IKE] D. Harkins and D. Carrel, The Internet Key Exchange, RFC 2409, | [IKE] D. Harkins and D. Carrel, The Internet Key Exchange, RFC 2409, | |||
| November 1998. | November 1998. | |||
| [RFC-3279] Bassham, L., Housley, R., and Polk, W., RFC 3279, | [IKEv2] C. Kaufman, Internet Key Exchange (IKEv2) Protocol, 2004, | |||
| Algorithms and Identifiers for the Internet X.509 Public Key | http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-17.txt | |||
| Infrastructure Certificate and Certificate Revocation List (CRL) | ||||
| Profile, 2002. (http://www.ietf.org/rfc/rfc3279.txt) | ||||
| [RFC-3280] Housley, R., Polk, W., Ford, W. and D. Solo, RFC 3280, | [IKE-ECP] D. Fu and J. Solinas, ECP Groups For IKE and IKEv2, 2005. | |||
| Internet X.509 Public Key Infrastructure Certificate and | (draft-ietf-ipsec-ike-ecp-groups-02.txt) | |||
| Certificate Revocation List (CRL) Profile, 2002. | ||||
| (http://www.ietf.org/rfc/rfc3279.txt) | ||||
| [X9.62] American National Standards Institute, ANS X9.62-1998: | [SHS] FIPS 180-2, "Secure Hash Standard", National Institute of | |||
| Standards and Technology, 2002. | ||||
| [X9.62-2003] American National Standards Institute, X9.62-1998: | ||||
| Public Key Cryptography for the Financial Services Industry: The | Public Key Cryptography for the Financial Services Industry: The | |||
| Elliptic Curve Digital Signature Algorithm. January 1999. | Elliptic Curve Digital Signature Algorithm, | |||
| Revised-Draft-2003-02-26, February 2003. | ||||
| 6.2 Informative | 7.2 Informative | |||
| [DSS] U.S. Department of Commerce/National Institute of Standards | [DSS] U.S. Department of Commerce/National Institute of Standards | |||
| and Technology, Digital Signature Standard (DSS), FIPS PUB 186-2, | and Technology, Digital Signature Standard (DSS), FIPS PUB 186-2, | |||
| January 2000. (http://csrc.nist.gov/publications/fips/index.html) | January 2000. (http://csrc.nist.gov/publications/fips/index.html) | |||
| [IANA] Internet Assigned Numbers Authority, Internet Key Exchange | ||||
| (IKE) Attributes. (http://www.iana.org/assignments/ipsec-registry) | ||||
| [IEEE-1363] Institute of Electrical and Electronics Engineers. | [IEEE-1363] Institute of Electrical and Electronics Engineers. | |||
| IEEE 1363-2000, Standard for Public Key Cryptography. | IEEE 1363-2000, Standard for Public Key Cryptography. | |||
| (http://grouper.ieee.org/groups/1363/index.html) | (http://grouper.ieee.org/groups/1363/index.html) | |||
| [IEEE-1363A] Institute of Electrical and Electronics Engineers. | [IEEE-1363A] Institute of Electrical and Electronics Engineers. | |||
| IEEE 1363A-2004, Standard for Public Key Cryptography - | IEEE 1363A-2004, Standard for Public Key Cryptography - | |||
| Amendment 1: Additional Techniques. | Amendment 1: Additional Techniques. | |||
| (http://grouper.ieee.org/groups/1363/index.html) | (http://grouper.ieee.org/groups/1363/index.html) | |||
| [IKE-ECP] J. Solinas, ECP Groups For IKE, 2005. | ||||
| (draft-ietf-ipsec-ike-ecp-groups-01.txt) | ||||
| [LV] A. Lenstra and E. Verheul, "Selecting Cryptographic Key | [LV] A. Lenstra and E. Verheul, "Selecting Cryptographic Key | |||
| Sizes", Journal of Cryptology 14 (2001), pp. 255-293. | Sizes", Journal of Cryptology 14 (2001), pp. 255-293. | |||
| [RFC-3279] Bassham, L., Housley, R., and Polk, W., RFC 3279, | ||||
| Algorithms and Identifiers for the Internet X.509 Public Key | ||||
| Infrastructure Certificate and Certificate Revocation List (CRL) | ||||
| Profile, 2002. (http://www.ietf.org/rfc/rfc3279.txt) | ||||
| [RFC-3280] Housley, R., Polk, W., Ford, W. and D. Solo, RFC 3280, | ||||
| Internet X.509 Public Key Infrastructure Certificate and | ||||
| Certificate Revocation List (CRL) Profile, 2002. | ||||
| (http://www.ietf.org/rfc/rfc3279.txt) | ||||
| [SEC1] Standards for Efficient Cryptography Group. SEC 1 - Elliptic | [SEC1] Standards for Efficient Cryptography Group. SEC 1 - Elliptic | |||
| Curve Cryptography, v. 1.0, 2000. (http://www.secg.org) | Curve Cryptography, v. 1.0, 2000. (http://www.secg.org) | |||
| [SEC2] Standards for Efficient Cryptography Group. SEC 2 - | [SEC2] Standards for Efficient Cryptography Group. SEC 2 - | |||
| Recommended Elliptic Curve Domain Parameters, v. 1.0, 2000. | Recommended Elliptic Curve Domain Parameters, v. 1.0, 2000. | |||
| (http://www.secg.org) | (http://www.secg.org) | |||
| [SHS] FIPS 180-2, "Secure Hash Standard", National Institute of | 7. Authors' Addresses | |||
| Standards and Technology, 2002. | ||||
| 7. Author's Address | David E. Fu | |||
| National Information Assurance Research Laboratory | ||||
| National Security Agency | ||||
| defu@orion.ncsc.mil | ||||
| Jerome A. Solinas | Jerome A. Solinas | |||
| National Information Assurance Research Laboratory | ||||
| National Security Agency | National Security Agency | |||
| jasolin@orion.ncsc.mil | jasolin@orion.ncsc.mil | |||
| Comments are solicited and should be addressed to the author. | Comments are solicited and should be addressed to the authors. | |||
| Copyright (C) The Internet Society (2005). | Copyright (C) The Internet Society (2005). | |||
| This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
| contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
| retain all their rights. | retain all their rights. | |||
| This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | |||
| ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | |||
| INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | |||
| INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | |||
| WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
| Expires November 27, 2005 | Expires March 30, 2006 | |||
| End of changes. 33 change blocks. | ||||
| 83 lines changed or deleted | 509 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||