| < draft-seokung-msec-mikey-seed-04.txt | draft-seokung-msec-mikey-seed-05.txt > | |||
|---|---|---|---|---|
| MSEC Working Group S. Yoon | MSEC Working Group S. Yoon | |||
| Internet Draft J. Jeong | Internet Draft J. Jeong | |||
| Intended Status: Informational H. Kim | Intended Status: Informational H. Kim | |||
| Expires: March 29, 2010 H. Jeong | Expires: May 23, 2010 H. Jeong | |||
| Y. Won | Y. Won | |||
| Korea Internet & Security Agency | Korea Internet & Security Agency | |||
| September 29, 2009 | November 23, 2009 | |||
| IANA Registry Update for the SEED Cipher Algorithm Support in the | IANA Registry Update for Support of the SEED Cipher Algorithm in the | |||
| Multimedia Internet KEYing (MIKEY) | Multimedia Internet KEYing (MIKEY) | |||
| draft-seokung-msec-mikey-seed-04 | draft-seokung-msec-mikey-seed-05 | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| groups may also distribute working documents as Internet-Drafts. | groups may also distribute working documents as Internet-Drafts. | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on March 29, 2010. | This Internet-Draft will expire on May 23, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2009 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents in effect on the date of | |||
| publication of this document (http://trustee.ietf.org/license-info). | publication of this document (http://trustee.ietf.org/license-info). | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 16 ¶ | skipping to change at page 2, line 16 ¶ | |||
| This document updates IANA registries to support the SEED block | This document updates IANA registries to support the SEED block | |||
| cipher algorithm for the Secure Real-time Transport Protocol (SRTP) | cipher algorithm for the Secure Real-time Transport Protocol (SRTP) | |||
| and the secure Real-time Transport Control Protocol (SRTCP) in | and the secure Real-time Transport Control Protocol (SRTCP) in | |||
| Multimedia Internet KEYing (MIKEY). | Multimedia Internet KEYing (MIKEY). | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction..................................................3 | 1. Introduction..................................................3 | |||
| 1.1. SEED.....................................................3 | 1.1. SEED.....................................................3 | |||
| 2. Additions to [RFC3830] payload................................3 | 2. Additions to MIKEY payload....................................3 | |||
| 2.1. Modified Table 6.10.1.b from [RFC3830]...................3 | 2.1. Modified Table 6.10.1.b from RFC3830.....................3 | |||
| 2.2. Modified Table 6.10.1.d from [RFC3830]...................4 | 2.2. Modified Table 6.10.1.d from RFC3830.....................4 | |||
| 3. Security Considerations.......................................4 | 3. Security Considerations.......................................4 | |||
| 4. IANA Considerations...........................................4 | 4. IANA Considerations...........................................4 | |||
| 5. References....................................................5 | 5. Acknowledgements..............................................4 | |||
| 5.1. Normative References.....................................5 | 6. References....................................................5 | |||
| 5.2. Informative References...................................5 | 6.1. Normative References.....................................5 | |||
| 6.2. Informative References...................................5 | ||||
| Author's Addresses...............................................6 | Author's Addresses...............................................6 | |||
| 1. Introduction | 1. Introduction | |||
| This document updates IANA registries to support the SEED [RFC4269] | This document updates IANA registries to support the SEED [RFC4269] | |||
| block cipher algorithm for the Secure Real-time Transport Protocol | block cipher algorithm for the Secure Real-time Transport Protocol | |||
| (SRTP) and the Secure Real-time Transport Control Protocol (SRTCP) | (SRTP) and the Secure Real-time Transport Control Protocol (SRTCP) | |||
| [RFC3711] in Multimedia Internet KEYing (MIKEY) [RFC3830]. | [RFC3711] in Multimedia Internet KEYing (MIKEY) [RFC3830]. | |||
| 1.1. SEED | 1.1. SEED | |||
| SEED is a 128-bit symmetric key block cipher that has been developed | SEED is a 128-bit symmetric key block cipher that has been developed | |||
| by KISA (Korea Information Security Agency) and a group of experts | by KISA (Korea Information Security Agency) and a group of experts | |||
| since 1998. The input/output block size of SEED is 128-bit and the | since 1998. The input/output block size of SEED is 128-bit and the | |||
| key length is also 128-bit. SEED has a 16-round Feistel structure. | key length is also 128-bit. SEED has a 16-round Feistel structure. | |||
| SEED is a Korean National Industrial Association standard and is | SEED is a Korean National Industrial Association standard and is | |||
| widely used in South Korea for electronic commerce and various | widely used in South Korea for electronic commerce and various | |||
| security products such as firewall, VPN, and so on. | security products such as firewall, VPN, and so on. | |||
| 2. Additions to [RFC3830] payload | 2. Additions to MIKEY payload | |||
| This section specifies the new values to use the SEED cipher | This section specifies new code points for the MIKEY [RFC3830] | |||
| algorithm for SRTP and SRTCP. We define three modes of running SEED, | payload to indicate the use of the SEED cipher algorithm for SRTP and | |||
| SEED in Counter Mode (SEED-CTR), SEED in Counter with CBC-MAC Mode | SRTCP. There are three applicable modes of running SEED, SEED in | |||
| (SEED-CCM) and SEED in Galois/Counter Mode (SEED-GCM) Mode. These are | Counter Mode (SEED-CTR), SEED in Counter with CBC-MAC Mode (SEED-CCM) | |||
| defined in [I-D.ietf-avt-seed-srtp]. | and SEED in Galois/Counter Mode (SEED-GCM) Mode. These are defined in | |||
| [I-D.ietf-avt-seed-srtp]. | ||||
| 2.1. Modified Table 6.10.1.b from [RFC3830] | 2.1. Modified Table 6.10.1.b from RFC3830 | |||
| Modified Table 6.10.1.b from [RFC3830] : | IANA is asked to amend the sub-registry derived from Table 6.10.1.b | |||
| of [RFC3830] as follows: | ||||
| SRTP encr alg | Value | SRTP encr alg | Value | |||
| --------------------- | --------------------- | |||
| NULL | 0 | NULL | 0 | |||
| AES-CM | 1 | AES-CM | 1 | |||
| AES-F8 | 2 | AES-F8 | 2 | |||
| SEED-CTR | 3 (NEW) | SEED-CTR | 3 (NEW) | |||
| SEED-CCM | 4 (NEW) | SEED-CCM | 4 (NEW) | |||
| SEED-GCM | 5 (NEW) | SEED-GCM | 5 (NEW) | |||
| Figure 1: Table 6.10.1.b from [RFC3830] (Revised) | Figure 1: Table 6.10.1.b from [RFC3830] (Revised) | |||
| 2.2. Modified Table 6.10.1.d from [RFC3830] | 2.2. Modified Table 6.10.1.d from RFC3830 | |||
| Modified Table 6.10.1.d from [RFC3830] : | IANA is asked to amend the sub-registry derived from Table 6.10.1.d | |||
| of [RFC3830] as follows: | ||||
| SRTP PRF | Value | SRTP PRF | Value | |||
| --------------------- | --------------------- | |||
| AES-CM | 0 | AES-CM | 0 | |||
| SEED-CTR | 1 (NEW) | SEED-CTR | 1 (NEW) | |||
| Figure 2: Table 6.10.1.d from [RFC3830] (Revised) | Figure 2: Table 6.10.1.d from [RFC3830] (Revised) | |||
| 3. Security Considerations | 3. Security Considerations | |||
| No security problem has been found on SEED. SEED is secure against | No security problem has been found on SEED. SEED is secure against | |||
| all known attacks including Differential cryptanalysis, linear | all known attacks including Differential cryptanalysis, linear | |||
| cryptanalysis, and related key attacks. The only known attack is an | cryptanalysis, and related key attacks. The only known attack is an | |||
| exhaustive search for the key. For further security considerations, | exhaustive search for the key. For further security considerations, | |||
| the reader is encouraged to read [SEED-EVAL]. | the reader is encouraged to read [SEED-EVAL]. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| In order to align Figure 1 with Table 6.10.1.b in [RFC3830] and | With the adoption of this document for publication IANA has amended | |||
| Figure 2 with Table 6.10.1.d in [RFC3830], IANA is requested to add | the indicated sub-registries in Section 2 of the MIKEY [RFC3830] | |||
| the values described in Section 2 to their [RFC3830] Payload Name | Payload Name registry according to Section 2.1 and 2.2 above. | |||
| Space. | ||||
| 5. References | 5. Acknowledgements | |||
| 5.1. Normative References | The authors would like to thank David McGrew, Spencer Dawkins, | |||
| SangHwan Park, Brian Weis, and Tim Polk for their reviews and support. | ||||
| 6. References | ||||
| 6.1. Normative References | ||||
| [I-D.ietf-avt-seed-srtp] | [I-D.ietf-avt-seed-srtp] | |||
| S. Yoon, J. Kim, H. Park, H. Jeong, Y. Won, "The SEED | S. Yoon, J. Kim, H. Park, H. Jeong, Y. Won, "The SEED | |||
| Cipher Algorithm and Its Use with the Secure Real-time | Cipher Algorithm and Its Use with the Secure Real-time | |||
| Transport Protocol (SRTP)", draft-ietf-avt-seed-srtp-14 | Transport Protocol (SRTP)", draft-ietf-avt-seed-srtp-14 | |||
| (work in progress), June 2009. | (work in progress), June 2009. | |||
| [RFC3711] M. Baugher, D. McGrew, M. Naslund, E.Carrara, K. Norrman, | [RFC3711] M. Baugher, D. McGrew, M. Naslund, E.Carrara, K. Norrman, | |||
| "The Secure Real-time Transport Protocol (SRTP)", | "The Secure Real-time Transport Protocol (SRTP)", | |||
| RFC 3711, March 2004. | RFC 3711, March 2004. | |||
| [RFC3830] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K. | [RFC3830] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K. | |||
| Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, | Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, | |||
| August 2004. | August 2004. | |||
| [RFC4269] H. Lee, S. Lee, J. Yoon, D. Cheon, J. Lee, "The SEED | [RFC4269] H. Lee, S. Lee, J. Yoon, D. Cheon, J. Lee, "The SEED | |||
| Encryption Algorithm", RFC 4269, December 2005. | Encryption Algorithm", RFC 4269, December 2005. | |||
| 5.2. Informative References | 6.2. Informative References | |||
| [SEED-EVAL] KISA, "Self Evaluation Report", | [SEED-EVAL] KISA, "Self Evaluation Report", | |||
| http://www.kisa.or.kr/kisa/seed/down/SEED_Evaluation_Repo | http://www.kisa.or.kr/kisa/seed/down/SEED_Evaluation_Repo | |||
| rt_by_CRYPTREC.pdf | rt_by_CRYPTREC.pdf | |||
| Author's Addresses | Author's Addresses | |||
| Seokung Yoon | Seokung Yoon | |||
| Korea Internet & Security Agency | Korea Internet & Security Agency | |||
| IT Venture Tower, Jungdaero 135, Songpa-gu, Seoul, Korea 138-950 | IT Venture Tower, Jungdaero 135, Songpa-gu, Seoul, Korea 138-950 | |||
| End of changes. 17 change blocks. | ||||
| 28 lines changed or deleted | 36 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||