| < draft-kanno-secsh-camellia-01.txt | draft-kanno-secsh-camellia-02.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Kanno | Network Working Group S. Kanno | |||
| Internet-Draft NTT Software Corporation | Internet-Draft NTT Software Corporation | |||
| Intended status: Standards Track M. Kanda | Intended status: Informational M. Kanda | |||
| Expires: November 19, 2010 NTT | Expires: August 1, 2011 NTT | |||
| May 18, 2010 | January 28, 2011 | |||
| The Camellia for the Secure Shell Transport Layer Protocol | Camellia cipher for the Secure Shell Transport Layer Protocol | |||
| draft-kanno-secsh-camellia-01 | draft-kanno-secsh-camellia-02 | |||
| Abstract | Abstract | |||
| Secure shell (SSH) is a secure remote-login protocol. SSH provides | Secure shell (SSH) is a secure remote-login protocol. SSH provides | |||
| for algorithms that provide authentication, key agreement, | for algorithms that provide authentication, key agreement, | |||
| confidentiality, and data-integrity services. The purpose of this | confidentiality, and data-integrity services. The purpose of this | |||
| document is to specify the Camellia cipher as symmetric encryption | document is to specify the Camellia cipher as symmetric encryption | |||
| algorithm for the SSH Transport Layer Protocol. | algorithm for the SSH Transport Layer Protocol. | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 35 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 19, 2010. | This Internet-Draft will expire on August 1, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 4, line 19 ¶ | skipping to change at page 4, line 19 ¶ | |||
| comply with AES: | comply with AES: | |||
| Modes Specifications | Modes Specifications | |||
| --------------------------------------- | --------------------------------------- | |||
| Camellia in CBC mode RFC4253 | Camellia in CBC mode RFC4253 | |||
| Camellia in CTR mode RFC4344 | Camellia in CTR mode RFC4344 | |||
| Camellia in GCM mode RFC5647 | Camellia in GCM mode RFC5647 | |||
| This document describes the following new methods: | This document describes the following new methods: | |||
| camellia256-cbc OPTIONAL Camellia in CBC mode, | camellia256-cbc OPTIONAL Camellia in CBC mode, | |||
| with a 256-bit key | with a 256-bit key | |||
| camellia192-cbc OPTIONAL Camellia with a 192-bit key | camellia192-cbc OPTIONAL Camellia with a 192-bit key | |||
| camellia128-cbc OPTIONAL Camellia with a 128-bit key | camellia128-cbc OPTIONAL Camellia with a 128-bit key | |||
| camellia256-ctr OPTIONAL Camellia in CTR mode, | camellia256-ctr OPTIONAL Camellia in CTR mode, | |||
| with 256-bit key | with 256-bit key | |||
| camellia192-ctr OPTIONAL Camellia with a 192-bit key | camellia192-ctr OPTIONAL Camellia with a 192-bit key | |||
| camellia128-ctr OPTIONAL Camellia with a 128-bit key | camellia128-ctr OPTIONAL Camellia with a 128-bit key | |||
| AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, | AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, | |||
| with a 256-bit key | with a 256-bit key | |||
| AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key | AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key | |||
| The "camellia256-cbc" cipher is Camellia in CBC mode. This version | The "camellia256-cbc" cipher is Camellia in CBC mode. This version | |||
| uses a 256-bit key. The "camellia192-cbc" cipher is the same as | uses a 256-bit key. The "camellia192-cbc" cipher is the same as | |||
| above, but with a 192-bit key. The "camellia128-cbc" cipher is the | above, but with a 192-bit key. The "camellia128-cbc" cipher is the | |||
| same as above, but with a 128-bit key. | same as above, but with a 128-bit key. | |||
| The "camellia256-ctr" cipher is Camellia in CTR mode. This version | The "camellia256-ctr" cipher is Camellia in CTR mode. This version | |||
| uses a 256-bit key. The "camellia192-ctr" cipher is the same as | uses a 256-bit key. The "camellia192-ctr" cipher is the same as | |||
| above, but with a 192-bit key. The "camellia256-ctr" cipher is the | above, but with a 192-bit key. The "camellia256-ctr" cipher is the | |||
| same as above, but with a 256-bit key. | same as above, but with a 256-bit key. | |||
| skipping to change at page 5, line 11 ¶ | skipping to change at page 5, line 11 ¶ | |||
| The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version | The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version | |||
| uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as | uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as | |||
| above, but with a 128-bit key. | above, but with a 128-bit key. | |||
| 3. MAC | 3. MAC | |||
| This document describes the Camellia-GCM for use with the SSH | This document describes the Camellia-GCM for use with the SSH | |||
| Transport Protocol as a MAC. For the MAC of Camellia-GCM, the | Transport Protocol as a MAC. For the MAC of Camellia-GCM, the | |||
| specification comply with AES for GCM mode: | specification comply with AES for GCM mode: | |||
| Modes Specifications | Modes Specification | |||
| --------------------------------------- | -------------------------------------- | |||
| Camellia in GCM mode RFC5647 | Camellia in GCM mode RFC5647 | |||
| This document describes the addition of the following two entities to | This document describes the addition of the following two entities to | |||
| the SSH MAC algorithm names registry described in [2]: | the SSH MAC algorithm names registry described in [2]: | |||
| AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, | AEAD_CAMELLIA_256_GCM OPTIONAL Camellia in GCM mode, | |||
| with a 256-bit key | with a 256-bit key | |||
| AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key | AEAD_CAMELLIA_128_GCM OPTIONAL Camellia with a 128-bit key | |||
| The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version | The "AEAD_CAMELLIA_256_GCM" is Camellia in GCM mode. This version | |||
| uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as | uses a 256-bit key. The "AEAD_CAMELLIA_128_GCM" is the same as | |||
| above, but with a 128-bit key. | above, but with a 128-bit key. | |||
| 4. Key Exchange | 4. Key Exchange | |||
| The Camellia cipher uses these key exchange protocols as well as AES. | The Camellia cipher uses these key exchange protocols as well as AES. | |||
| These key exchange protocols are described in Section 7 of [3], | These key exchange protocols are described in Section 7 of [3], | |||
| Section 5.1 of [6], and Section 4 and 5 of [5]. | Section 5.1 of [6], and Section 4 and 5 of [5]. | |||
| End of changes. 7 change blocks. | ||||
| 23 lines changed or deleted | 23 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||