< draft-seokung-msec-mikey-seed-04.txt   draft-seokung-msec-mikey-seed-05.txt >
MSEC Working Group S. Yoon MSEC Working Group S. Yoon
Internet Draft J. Jeong Internet Draft J. Jeong
Intended Status: Informational H. Kim Intended Status: Informational H. Kim
Expires: March 29, 2010 H. Jeong Expires: May 23, 2010 H. Jeong
Y. Won Y. Won
Korea Internet & Security Agency Korea Internet & Security Agency
September 29, 2009 November 23, 2009
IANA Registry Update for the SEED Cipher Algorithm Support in the IANA Registry Update for Support of the SEED Cipher Algorithm in the
Multimedia Internet KEYing (MIKEY) Multimedia Internet KEYing (MIKEY)
draft-seokung-msec-mikey-seed-04 draft-seokung-msec-mikey-seed-05
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts. groups may also distribute working documents as Internet-Drafts.
skipping to change at page 1, line 34 skipping to change at page 1, line 34
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on March 29, 2010. This Internet-Draft will expire on May 23, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info). publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 2, line 16 skipping to change at page 2, line 16
This document updates IANA registries to support the SEED block This document updates IANA registries to support the SEED block
cipher algorithm for the Secure Real-time Transport Protocol (SRTP) cipher algorithm for the Secure Real-time Transport Protocol (SRTP)
and the secure Real-time Transport Control Protocol (SRTCP) in and the secure Real-time Transport Control Protocol (SRTCP) in
Multimedia Internet KEYing (MIKEY). Multimedia Internet KEYing (MIKEY).
Table of Contents Table of Contents
1. Introduction..................................................3 1. Introduction..................................................3
1.1. SEED.....................................................3 1.1. SEED.....................................................3
2. Additions to [RFC3830] payload................................3 2. Additions to MIKEY payload....................................3
2.1. Modified Table 6.10.1.b from [RFC3830]...................3 2.1. Modified Table 6.10.1.b from RFC3830.....................3
2.2. Modified Table 6.10.1.d from [RFC3830]...................4 2.2. Modified Table 6.10.1.d from RFC3830.....................4
3. Security Considerations.......................................4 3. Security Considerations.......................................4
4. IANA Considerations...........................................4 4. IANA Considerations...........................................4
5. References....................................................5 5. Acknowledgements..............................................4
5.1. Normative References.....................................5 6. References....................................................5
5.2. Informative References...................................5 6.1. Normative References.....................................5
6.2. Informative References...................................5
Author's Addresses...............................................6 Author's Addresses...............................................6
1. Introduction 1. Introduction
This document updates IANA registries to support the SEED [RFC4269] This document updates IANA registries to support the SEED [RFC4269]
block cipher algorithm for the Secure Real-time Transport Protocol block cipher algorithm for the Secure Real-time Transport Protocol
(SRTP) and the Secure Real-time Transport Control Protocol (SRTCP) (SRTP) and the Secure Real-time Transport Control Protocol (SRTCP)
[RFC3711] in Multimedia Internet KEYing (MIKEY) [RFC3830]. [RFC3711] in Multimedia Internet KEYing (MIKEY) [RFC3830].
1.1. SEED 1.1. SEED
SEED is a 128-bit symmetric key block cipher that has been developed SEED is a 128-bit symmetric key block cipher that has been developed
by KISA (Korea Information Security Agency) and a group of experts by KISA (Korea Information Security Agency) and a group of experts
since 1998. The input/output block size of SEED is 128-bit and the since 1998. The input/output block size of SEED is 128-bit and the
key length is also 128-bit. SEED has a 16-round Feistel structure. key length is also 128-bit. SEED has a 16-round Feistel structure.
SEED is a Korean National Industrial Association standard and is SEED is a Korean National Industrial Association standard and is
widely used in South Korea for electronic commerce and various widely used in South Korea for electronic commerce and various
security products such as firewall, VPN, and so on. security products such as firewall, VPN, and so on.
2. Additions to [RFC3830] payload 2. Additions to MIKEY payload
This section specifies the new values to use the SEED cipher This section specifies new code points for the MIKEY [RFC3830]
algorithm for SRTP and SRTCP. We define three modes of running SEED, payload to indicate the use of the SEED cipher algorithm for SRTP and
SEED in Counter Mode (SEED-CTR), SEED in Counter with CBC-MAC Mode SRTCP. There are three applicable modes of running SEED, SEED in
(SEED-CCM) and SEED in Galois/Counter Mode (SEED-GCM) Mode. These are Counter Mode (SEED-CTR), SEED in Counter with CBC-MAC Mode (SEED-CCM)
defined in [I-D.ietf-avt-seed-srtp]. and SEED in Galois/Counter Mode (SEED-GCM) Mode. These are defined in
[I-D.ietf-avt-seed-srtp].
2.1. Modified Table 6.10.1.b from [RFC3830] 2.1. Modified Table 6.10.1.b from RFC3830
Modified Table 6.10.1.b from [RFC3830] : IANA is asked to amend the sub-registry derived from Table 6.10.1.b
of [RFC3830] as follows:
SRTP encr alg | Value SRTP encr alg | Value
--------------------- ---------------------
NULL | 0 NULL | 0
AES-CM | 1 AES-CM | 1
AES-F8 | 2 AES-F8 | 2
SEED-CTR | 3 (NEW) SEED-CTR | 3 (NEW)
SEED-CCM | 4 (NEW) SEED-CCM | 4 (NEW)
SEED-GCM | 5 (NEW) SEED-GCM | 5 (NEW)
Figure 1: Table 6.10.1.b from [RFC3830] (Revised) Figure 1: Table 6.10.1.b from [RFC3830] (Revised)
2.2. Modified Table 6.10.1.d from [RFC3830] 2.2. Modified Table 6.10.1.d from RFC3830
Modified Table 6.10.1.d from [RFC3830] : IANA is asked to amend the sub-registry derived from Table 6.10.1.d
of [RFC3830] as follows:
SRTP PRF | Value SRTP PRF | Value
--------------------- ---------------------
AES-CM | 0 AES-CM | 0
SEED-CTR | 1 (NEW) SEED-CTR | 1 (NEW)
Figure 2: Table 6.10.1.d from [RFC3830] (Revised) Figure 2: Table 6.10.1.d from [RFC3830] (Revised)
3. Security Considerations 3. Security Considerations
No security problem has been found on SEED. SEED is secure against No security problem has been found on SEED. SEED is secure against
all known attacks including Differential cryptanalysis, linear all known attacks including Differential cryptanalysis, linear
cryptanalysis, and related key attacks. The only known attack is an cryptanalysis, and related key attacks. The only known attack is an
exhaustive search for the key. For further security considerations, exhaustive search for the key. For further security considerations,
the reader is encouraged to read [SEED-EVAL]. the reader is encouraged to read [SEED-EVAL].
4. IANA Considerations 4. IANA Considerations
In order to align Figure 1 with Table 6.10.1.b in [RFC3830] and With the adoption of this document for publication IANA has amended
Figure 2 with Table 6.10.1.d in [RFC3830], IANA is requested to add the indicated sub-registries in Section 2 of the MIKEY [RFC3830]
the values described in Section 2 to their [RFC3830] Payload Name Payload Name registry according to Section 2.1 and 2.2 above.
Space.
5. References 5. Acknowledgements
5.1. Normative References The authors would like to thank David McGrew, Spencer Dawkins,
SangHwan Park, Brian Weis, and Tim Polk for their reviews and support.
6. References
6.1. Normative References
[I-D.ietf-avt-seed-srtp] [I-D.ietf-avt-seed-srtp]
S. Yoon, J. Kim, H. Park, H. Jeong, Y. Won, "The SEED S. Yoon, J. Kim, H. Park, H. Jeong, Y. Won, "The SEED
Cipher Algorithm and Its Use with the Secure Real-time Cipher Algorithm and Its Use with the Secure Real-time
Transport Protocol (SRTP)", draft-ietf-avt-seed-srtp-14 Transport Protocol (SRTP)", draft-ietf-avt-seed-srtp-14
(work in progress), June 2009. (work in progress), June 2009.
[RFC3711] M. Baugher, D. McGrew, M. Naslund, E.Carrara, K. Norrman, [RFC3711] M. Baugher, D. McGrew, M. Naslund, E.Carrara, K. Norrman,
"The Secure Real-time Transport Protocol (SRTP)", "The Secure Real-time Transport Protocol (SRTP)",
RFC 3711, March 2004. RFC 3711, March 2004.
[RFC3830] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K. [RFC3830] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K.
Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830,
August 2004. August 2004.
[RFC4269] H. Lee, S. Lee, J. Yoon, D. Cheon, J. Lee, "The SEED [RFC4269] H. Lee, S. Lee, J. Yoon, D. Cheon, J. Lee, "The SEED
Encryption Algorithm", RFC 4269, December 2005. Encryption Algorithm", RFC 4269, December 2005.
5.2. Informative References 6.2. Informative References
[SEED-EVAL] KISA, "Self Evaluation Report", [SEED-EVAL] KISA, "Self Evaluation Report",
http://www.kisa.or.kr/kisa/seed/down/SEED_Evaluation_Repo http://www.kisa.or.kr/kisa/seed/down/SEED_Evaluation_Repo
rt_by_CRYPTREC.pdf rt_by_CRYPTREC.pdf
Author's Addresses Author's Addresses
Seokung Yoon Seokung Yoon
Korea Internet & Security Agency Korea Internet & Security Agency
IT Venture Tower, Jungdaero 135, Songpa-gu, Seoul, Korea 138-950 IT Venture Tower, Jungdaero 135, Songpa-gu, Seoul, Korea 138-950
 End of changes. 17 change blocks. 
28 lines changed or deleted 36 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/