diff options
Diffstat (limited to 'doc/rfc/rfc4162.txt')
-rw-r--r-- | doc/rfc/rfc4162.txt | 339 |
1 files changed, 339 insertions, 0 deletions
diff --git a/doc/rfc/rfc4162.txt b/doc/rfc/rfc4162.txt new file mode 100644 index 0000000..c9d6fd9 --- /dev/null +++ b/doc/rfc/rfc4162.txt @@ -0,0 +1,339 @@ + + + + + + +Network Working Group H.J. Lee +Request for Comments: 4162 J.H. Yoon +Category: Standards Track J.I. Lee + KISA + August 2005 + + + Addition of SEED Cipher Suites to Transport Layer Security (TLS) + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document proposes the addition of new cipher suites to the + Transport Layer Security (TLS) protocol to support the SEED + encryption algorithm as a bulk cipher algorithm. + +1. Introduction + + This document proposes the addition of new cipher suites to the TLS + protocol [TLS] to support the SEED encryption algorithm as a bulk + cipher algorithm. + +1.1. SEED + + SEED is a symmetric encryption algorithm that was developed by Korea + Information Security Agency (KISA) and a group of experts, beginning + in 1998. The input/output block size of SEED is 128-bit and the key + length is also 128-bit. SEED has the 16-round Feistel structure. A + 128-bit input is divided into two 64-bit blocks and the right 64-bit + block is an input to the round function with a 64-bit subkey + generated from the key scheduling. + + + + + + + + + +Lee, et al. Standards Track [Page 1] + +RFC 4162 SEED Cipher Suites to TLS August 2005 + + + SEED is easily implemented in various software and hardware because + it is designed to increase the efficiency of memory storage and the + simplicity of generating keys without degrading the security of the + algorithm. In particular, it can be effectively adopted in a + computing environment that has a restricted resources such as mobile + devices, smart cards, and so on. + + SEED is a national industrial association standard [TTASSEED] and is + widely used in South Korea for electronic commerce and financial + services operated on wired & wireless PKI. + + The algorithm specification and object identifiers are described in + [SEED-ALG]. The SEED homepage, + http://www.kisa.or.kr/seed/seed_eng.html, contains a wealth of + information about SEED, including detailed specification, evaluation + report, test vectors, and so on. + +1.2. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT", + "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase, + as shown) are to be interpreted as described in [RFC2119]. + +2. Proposed Cipher Suites + + The new cipher suites proposed here have the following definitions: + + CipherSuite TLS_RSA_WITH_SEED_CBC_SHA = { 0x00, 0x96}; + CipherSuite TLS_DH_DSS_WITH_SEED_CBC_SHA = { 0x00, 0x97}; + CipherSuite TLS_DH_RSA_WITH_SEED_CBC_SHA = { 0x00, 0x98}; + CipherSuite TLS_DHE_DSS_WITH_SEED_CBC_SHA = { 0x00, 0x99}; + CipherSuite TLS_DHE_RSA_WITH_SEED_CBC_SHA = { 0x00, 0x9A}; + CipherSuite TLS_DH_anon_WITH_SEED_CBC_SHA = { 0x00, 0x9B}; + +3. Cipher Suite Definitions + +3.1. Cipher + + All the cipher suites described here use SEED in cipher block + chaining (CBC) mode as a bulk cipher algorithm. SEED is a 128-bit + block cipher with 128-bit key size. + +3.2. Hash + + All the cipher suites described here use SHA-1 [SHA-1] in an HMAC + construction as described in section 5 of [TLS]. + + + + + +Lee, et al. Standards Track [Page 2] + +RFC 4162 SEED Cipher Suites to TLS August 2005 + + +3.3. Key Exchange + + The cipher suites defined here differ in the type of certificate and + key exchange method. They use the following options: + + CipherSuite Key Exchange Algorithm + + TLS_RSA_WITH_SEED_CBC_SHA RSA + TLS_DH_DSS_WITH_SEED_CBC_SHA DH_DSS + TLS_DH_RSA_WITH_SEED_CBC_SHA DH_RSA + TLS_DHE_DSS_WITH_SEED_CBC_SHA DHE_DSS + TLS_DHE_RSA_WITH_SEED_CBC_SHA DHE_RSA + TLS_DH_anon_WITH_SEED_CBC_SHA DH_anon + + For the meanings of the terms RSA, DH_DSS, DH_RSA, DHE_DSS, DHE_RSA, + and DH_anon, please refer to sections 7.4.2 and 7.4.3 of [TLS]. + +4. Security Considerations + + It is not believed that the new cipher suites are less secure than + the corresponding older ones. No security problem has been found on + SEED. SEED is robust against known attacks, including differential + cryptanalysis, linear cryptanalysis, and related key attacks, etc. + SEED has gone through wide public scrutinizing procedures. + Especially, it has been evaluated and also considered + cryptographically secure by trustworthy organizations such as ISO/IEC + JTC 1/SC 27 and Japan CRYPTREC (Cryptography Research and Evaluation + Committees) [ISOSEED] [CRYPTREC]. SEED has been submitted to several + other standardization bodies such as ISO (ISO/IEC 18033-3) and IETF + S/MIME Mail Security [SEED-SMIME]; and it is under consideration. + For further security considerations, the reader is encouraged to read + [SEED-EVAL]. + + For other security considerations, please refer to the security of + the corresponding older cipher suites described in [TLS] and + [AES-TLS]. + + + + + + + + + + + + + + + +Lee, et al. Standards Track [Page 3] + +RFC 4162 SEED Cipher Suites to TLS August 2005 + + +5. References + +5.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [TLS] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", + RFC 2246, January 1999. + + [TTASSEED] Telecommunications Technology Association (TTA), South + Korea, "128-bit Symmetric Block Cipher (SEED)", + TTAS.KO-12.0004, September 1998, (In Korean) + http://www.tta.or.kr/English/new/main/index.htm. + +5.2. Informative References + + [AES-TLS] Chown, P., "Advanced Encryption Standard (AES) + Ciphersuites for Transport Layer Security (TLS)", RFC + 3268, June 2002. + + [CRYPTREC] Information-technology Promotion Agency (IPA), Japan, + CRYPTREC. "SEED Evaluation Report", February 2002, + http://www.kisa.or.kr/seed/seed_eng.html. + + [ISOSEED] ISO/IEC JTC 1/SC 27, "National Body contributions on NP + 18033 'Encryption Algorithms' in Response to SC 27 N2563 + (ATT.3 Korea Contribution)", ISO/IEC JTC 1/SC 27 N2656r1 + (n2656_3.zip), October 2000. + + [SEED-EVAL] KISA, "Self Evaluation Report", + http://www.kisa.or.kr/seed/seed_eng.html. + + [SEED-ALG] Park, J., Lee, S., Kim, J., and J. Lee, "The SEED + Encryption Algorithm", RFC 4009, February 2005. + + [SEED-SMIME] Park, J., Lee, S., Kim, J., and J. Lee, "Use of the SEED + Encryption Algorithm in Cryptographic Message Syntax + (CMS)", RFC 4010, February 2005. + + [SHA-1] FIPS PUB 180-1, "Secure Hash Standard", National + Institute of Standards and Technology, U.S. Department + of Commerce, April 17, 1995. + + + + + + + + +Lee, et al. Standards Track [Page 4] + +RFC 4162 SEED Cipher Suites to TLS August 2005 + + +Authors' Addresses + + Hyangjin Lee + Korea Information Security Agency + + Phone: +82-2-405-5446 + Fax : +82-2-405-5319 + EMail: jiinii@kisa.or.kr + + + Jaeho Yoon + Korea Information Security Agency + + Phone: +82-2-405-5434 + Fax : +82-2-405-5219 + EMail: jhyoon@kisa.or.kr + + + Jaeil Lee + Korea Information Security Agency + + Phone: +82-2-405-5300 + Fax : +82-2-405-5219 + EMail: jilee@kisa.or.kr + + + + + + + + + + + + + + + + + + + + + + + + + + + +Lee, et al. Standards Track [Page 5] + +RFC 4162 SEED Cipher Suites to TLS August 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Lee, et al. Standards Track [Page 6] + |