< draft-kanno-secsh-camellia-01.txt   draft-kanno-secsh-camellia-02.txt >
Network Working Group S. Kanno Network Working Group S. Kanno
Internet-Draft NTT Software Corporation Internet-Draft NTT Software Corporation
Intended status: Standards Track M. Kanda Intended status: Informational M. Kanda
Expires: November 19, 2010 NTT Expires: August 1, 2011 NTT
May 18, 2010 January 28, 2011
The Camellia for the Secure Shell Transport Layer Protocol Camellia cipher for the Secure Shell Transport Layer Protocol
draft-kanno-secsh-camellia-01 draft-kanno-secsh-camellia-02
Abstract Abstract
Secure shell (SSH) is a secure remote-login protocol. SSH provides Secure shell (SSH) is a secure remote-login protocol. SSH provides
for algorithms that provide authentication, key agreement, for algorithms that provide authentication, key agreement,
confidentiality, and data-integrity services. The purpose of this confidentiality, and data-integrity services. The purpose of this
document is to specify the Camellia cipher as symmetric encryption document is to specify the Camellia cipher as symmetric encryption
algorithm for the SSH Transport Layer Protocol. algorithm for the SSH Transport Layer Protocol.
Status of this Memo Status of this Memo
skipping to change at page 1, line 35 skipping to change at page 1, line 35
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 19, 2010. This Internet-Draft will expire on August 1, 2011.
Copyright Notice Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 4, line 19 skipping to change at page 4, line 19
comply with AES: comply with AES:
Modes Specifications Modes Specifications
--------------------------------------- ---------------------------------------
Camellia in CBC mode RFC4253 Camellia in CBC mode RFC4253
Camellia in CTR mode RFC4344 Camellia in CTR mode RFC4344
Camellia in GCM mode RFC5647 Camellia in GCM mode RFC5647
This document describes the following new methods: This document describes the following new methods:
camellia256-cbc OPTIONAL Camellia in CBC mode, camellia256-cbc OPTIONAL Camellia in CBC mode,
with a 256-bit key with a 256-bit key
camellia192-cbc OPTIONAL Camellia with a 192-bit key camellia192-cbc OPTIONAL Camellia with a 192-bit key
camellia128-cbc OPTIONAL Camellia with a 128-bit key camellia128-cbc OPTIONAL Camellia with a 128-bit key
camellia256-ctr OPTIONAL Camellia in CTR mode, camellia256-ctr OPTIONAL Camellia in CTR mode,
with 256-bit key with 256-bit key
camellia192-ctr OPTIONAL Camellia with a 192-bit key camellia192-ctr OPTIONAL Camellia with a 192-bit key
camellia128-ctr OPTIONAL Camellia with a 128-bit key camellia128-ctr OPTIONAL Camellia with a 128-bit key
AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode,
with a 256-bit key with a 256-bit key
AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key
The "camellia256-cbc" cipher is Camellia in CBC mode. This version The "camellia256-cbc" cipher is Camellia in CBC mode. This version
uses a 256-bit key. The "camellia192-cbc" cipher is the same as uses a 256-bit key. The "camellia192-cbc" cipher is the same as
above, but with a 192-bit key. The "camellia128-cbc" cipher is the above, but with a 192-bit key. The "camellia128-cbc" cipher is the
same as above, but with a 128-bit key. same as above, but with a 128-bit key.
The "camellia256-ctr" cipher is Camellia in CTR mode. This version The "camellia256-ctr" cipher is Camellia in CTR mode. This version
uses a 256-bit key. The "camellia192-ctr" cipher is the same as uses a 256-bit key. The "camellia192-ctr" cipher is the same as
above, but with a 192-bit key. The "camellia256-ctr" cipher is the above, but with a 192-bit key. The "camellia256-ctr" cipher is the
same as above, but with a 256-bit key. same as above, but with a 256-bit key.
skipping to change at page 5, line 11 skipping to change at page 5, line 11
The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version
uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as
above, but with a 128-bit key. above, but with a 128-bit key.
3. MAC 3. MAC
This document describes the Camellia-GCM for use with the SSH This document describes the Camellia-GCM for use with the SSH
Transport Protocol as a MAC. For the MAC of Camellia-GCM, the Transport Protocol as a MAC. For the MAC of Camellia-GCM, the
specification comply with AES for GCM mode: specification comply with AES for GCM mode:
Modes Specifications Modes Specification
--------------------------------------- --------------------------------------
Camellia in GCM mode RFC5647 Camellia in GCM mode RFC5647
This document describes the addition of the following two entities to This document describes the addition of the following two entities to
the SSH MAC algorithm names registry described in [2]: the SSH MAC algorithm names registry described in [2]:
AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode,
with a 256-bit key with a 256-bit key
AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key
The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version
uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as
above, but with a 128-bit key. above, but with a 128-bit key.
4. Key Exchange 4. Key Exchange
The Camellia cipher uses these key exchange protocols as well as AES. The Camellia cipher uses these key exchange protocols as well as AES.
These key exchange protocols are described in Section 7 of [3], These key exchange protocols are described in Section 7 of [3],
Section 5.1 of [6], and Section 4 and 5 of [5]. Section 5.1 of [6], and Section 4 and 5 of [5].
 End of changes. 7 change blocks. 
23 lines changed or deleted 23 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/