| < draft-kanno-tls-camellia-ecc-sha-00.txt | draft-kanno-tls-camellia-ecc-sha-01.txt > | |||
|---|---|---|---|---|
| Network Working Group S. Kanno | Network Working Group S. Kanno | |||
| Internet-Draft NTT Software Corporation | Internet-Draft NTT Software Corporation | |||
| Intended status: Informational M. Kanda | Intended status: Informational M. Kanda | |||
| Expires: October 7, 2009 Nippon Telegraph and Telephone | Expires: July 31, 2010 NTT | |||
| Corporation | January 27, 2010 | |||
| April 5, 2009 | ||||
| Addition of Camellia Elliptic Curve Cipher Suites with SHA-1 and SHA-2 | Addition of Camellia Elliptic Curve Cipher Suites with SHA-1 and SHA-2 | |||
| draft-kanno-tls-camellia-ecc-sha-00 | draft-kanno-tls-camellia-ecc-sha-01 | |||
| Abstract | ||||
| This document specifies a set of elliptic curve cipher suites for the | ||||
| Transport Security Layer (TLS) protocol to support the Camellia | ||||
| encryption algorithm as a block cipher. This document describes | ||||
| sixteen new cipher suites for TLS that specify HMAC-SHA1 and HMAC- | ||||
| SHA2. | ||||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
| Drafts. | Drafts. | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 41 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on October 7, 2009. | This Internet-Draft will expire on July 31, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2010 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents | |||
| publication of this document (http://trustee.ietf.org/license-info). | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | ||||
| Abstract | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | ||||
| This document specifies a set of elliptic curve cipher suites for the | described in the BSD License. | |||
| Transport Security Layer (TLS) protocol to support the Camellia | ||||
| encryption algorithm as a block cipher. This document describes | ||||
| sixteen new cipher suites for TLS that specify HMAC-SHA1 and HMAC- | ||||
| SHA2. | ||||
| 1. Introduction | 1. Introduction | |||
| This document specifies a set of elliptic curve cipher suites for the | This document specifies a set of elliptic curve cipher suites for the | |||
| Transport Security Layer (TLS) protocol to support the Camellia | Transport Security Layer (TLS) protocol to support the Camellia | |||
| encryption algorithm as a block cipher. This document describes | encryption algorithm as a block cipher. This document describes | |||
| sixteen new cipher suites for TLS that specify HMAC-SHA1 and HMAC- | sixteen new cipher suites for TLS that specify HMAC-SHA1 and HMAC- | |||
| SHA2. | SHA2. | |||
| The algorithm specification and object identifiers are described in | The Camellia algorithm and its properties are described in [RFC3713]. | |||
| [RFC3713]. | ||||
| 1.1. Terminology | 1.1. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 2. Cipher Suites | 2. Cipher Suites | |||
| This document defines sixteen new cipher suites to be added to TLS. | This document defines sixteen new cipher suites to be added to TLS. | |||
| skipping to change at page 3, line 48 ¶ | skipping to change at page 3, line 48 ¶ | |||
| CipherSuite TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | CipherSuite TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | CipherSuite TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | CipherSuite TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | CipherSuite TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | CipherSuite TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | CipherSuite TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 = {TBD,TBD}; | |||
| CipherSuite TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | CipherSuite TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 = {TBD,TBD}; | |||
| 4. Security Considerations | 4. Security Considerations | |||
| At the time of writing this document, there are no known weak keys | At the time of writing of this document there are no known weak keys | |||
| for Camellia. | for Camellia and no security problems have been found with Camellia | |||
| (see [NESSIE], [CRYPTREC], and [Research]). | ||||
| The security considerations in RFC 5289 [RFC5289] apply to this | The security considerations in RFC 5289 [RFC5289] apply to this | |||
| document as well. | document as well. | |||
| 5. Normative References | 5. References | |||
| 5.1. Normative References | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC3713] Matsui, M., Nakajima, J., and S. Moriai, "A Description of | [RFC3713] Matsui, M., Nakajima, J., and S. Moriai, "A Description of | |||
| the Camellia Encryption Algorithm", RFC 3713, April 2004. | the Camellia Encryption Algorithm", RFC 3713, April 2004. | |||
| [RFC4492] Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B. | [RFC4492] Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B. | |||
| Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites | Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites | |||
| for Transport Layer Security (TLS)", RFC 4492, May 2006. | for Transport Layer Security (TLS)", RFC 4492, May 2006. | |||
| [RFC5289] Rescorla, E., "TLS Elliptic Curve Cipher Suites with SHA- | [RFC5289] Rescorla, E., "TLS Elliptic Curve Cipher Suites with SHA- | |||
| 256/384 and AES Galois Counter Mode (GCM)", RFC 5289, | 256/384 and AES Galois Counter Mode (GCM)", RFC 5289, | |||
| August 2008. | August 2008. | |||
| 5.2. Informative | ||||
| [CRYPTREC] | ||||
| Information-technology Promotion Agency (IPA), | ||||
| "Cryptography Research and Evaluation Committees", | ||||
| <http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html>. | ||||
| [NESSIE] "The NESSIE project (New European Schemes for Signatures, | ||||
| Integrity and Encryption)", | ||||
| <http://www.cosic.esat.kuleuven.ac.be/nessie/>. | ||||
| [Research] | ||||
| Mala, H., Shakiba, M., and M. Dakhil-alian, "New Results | ||||
| on Impossible Differential Cryptanalysis of Reduced Round | ||||
| Camellia-128", November 2009, | ||||
| <http://www.springerlink.com/content/e55783u422436g77/>. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Satoru Kanno | Satoru Kanno | |||
| NTT Software Corporation | NTT Software Corporation | |||
| Phone: +81-45-212-7577 | Phone: +81-45-212-9803 | |||
| Fax: +81-45-212-9800 | Fax: +81-45-212-9800 | |||
| Email: kanno-s@po.ntts.co.jp | Email: kanno.satoru@po.ntts.co.jp | |||
| Masayuki Kanda | Masayuki Kanda | |||
| Nippon Telegraph and Telephone Corporation | NTT | |||
| Phone: +81-422-59-3456 | Phone: +81-422-59-3456 | |||
| Fax: +81-422-59-4015 | Fax: +81-422-59-4015 | |||
| Email: kanda.masayuki@lab.ntt.co.jp | Email: kanda.masayuki@lab.ntt.co.jp | |||
| End of changes. 12 change blocks. | ||||
| 26 lines changed or deleted | 48 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||