One document matched: draft-ietf-ipsec-ike-ecc-groups-07.txt
Differences from draft-ietf-ipsec-ike-ecc-groups-06.txt
IPSec Working Group S. Blake-Wilson, BCI
INTERNET-DRAFT D. Brown and Y. Poeluev, Certicom
Intended Status: Informational
Expires: June 15, 2006 December 15, 2005
Additional ECC Groups For IKE
<draft-ietf-ipsec-ike-ecc-groups-07.txt>
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on June 15, 2006.
Abstract
This document describes new ECC groups for use in IKE [IKE] and
IKEv2 [IKEv2] in addition to the Oakley groups included therein.
These groups are defined to align IKE with other ECC
implementations and standards, and in addition, many of them
provide higher strength than the Oakley groups. It should be noted
that this document is not self-contained. It uses the notations
and definitions of [IKE] and IKEv2 [IKEv2].
Blake-Wilson, Brown and Poeluev [Page 1]
INTERNET-DRAFT NIST Curves for IKE December 2005
Table of Contents
1. Introduction ............................................... 2
2. The NIST Groups ............................................ 3
3. Security Considerations .................................... 5
4. Intellectual Property Rights ............................... 5
5. Acknowledgments ............................................ 5
6. References ................................................. 5
7. Author's Address ........................................... 7
1. Introduction
This document describes groups for use in elliptic curve
Diffie-Hellman in IKE in addition to the Oakley groups included in
[IKE], [IKEv2], and [MODP-IKE]. The document assumes that
the reader is familiar with the IKE protocol and the concept of Oakley
Groups, as defined in RFC 2409 [IKE] and IKEv2 [IKEv2]. The ECC
groups given here are the fifteen groups that NIST recommends in FIPS
186-2 [FIPS-182-2].
RFC2409 [IKE] defines five standard Oakley Groups - three modular
exponentiation groups and two elliptic curve groups over GF[2^N]. One
modular exponentiation group (768 bits - Oakley Group 1) is mandatory
for all implementations to support, while the other four are optional.
Both elliptic curve groups (Oakley Groups 3 and 4) are defined over
GF[2^N] with N composite.
The Internet-Draft "More MODP Groups For IKE" [MODP-IKE] describes
several additional groups that can be used with IKE and IKEv2.
Detailed descriptions of the ECC groups recommended here for IKE in
this are not given in this document but can be found elsewhere: all
fifteen groups in each of FIPS 186-2 [FIPS-186-2] and SEC 2 [SEC-2].
The elliptic curve domain paramenters are uniquely identified in this
document using the ASN.1 object identifiers provided in ANS X9.62
[X9.62], ANS X9.63 [X9.63], and SEC 2 [SEC-2].
Blake-Wilson, Brown and Poeluev [Page 2]
INTERNET-DRAFT NIST Curves for IKE December 2005
2. The NIST Groups
The groups given in this document are capable of providing security
consistent with AES keys of 128, 192, and 256 bits, and also with TDES
keys of lengths 168 and 112 bits, whose corresponding strengths of 112
and 80 bits, respectively. The following table, based on tables from
[HOF] and [LEN], gives approximate comparable key sizes for symmetric
systems, ECC systems, and DH/DSA/RSA systems. The estimates are based
on the running times of the best algorithms known today.
Strength | ECC2N/PR | DH/DSA/RSA
80 | 163/192 | 1024
112 | 233/224 | 2048
128 | 283/256 | 3072
192 | 409/384 | 7680
256 | 571/521 | 15360
Table 1: Comparable key sizes
Thus, for example, when securing a 192-bit symmetric key, it is
prudent to use either 409-bit ECC or 7680-bit DH/DSA/RSA. Of course
it is possible to use shorter asymmetric keys, but it should be
recognized in this case that the security of the system is likely
dependent on the strength of the public-key algorithm and claims such
as "this system is highly secure because it uses 192-bit encryption"
are misleading.
The fifteen groups proposed in this document use elliptic curves over
GF[2^N] with N prime or over GF[P] with P prime. This addresses
concerns expressed by many experts regarding curves defined over
GF[2^N] with N composite -- concerns highlighted by the recent attacks
on such curves due to Gaudry, Hess, and Smart [WEIL] and due to
Jacobson, Menezes and Stein [JMS].
Seven of the groups proposed here have been assigned identifiers by
IANA [IANA] and the remaining eight might latter be assigned
identifiers by IANA. A brief summary of the IANA identified groups
for IKE as follows. Groups with IANA numbers 1 through 4 are
identified in [IKE]. The group with IANA number 5 is identifed in
[MODP-IKE]. The group with IANA number 6, [X9.62] and [SEC 2], with
object identifer sect163r1, but it is not one of the fifteen curves
that NIST recommends [FIPS-186-2]. The seven groups with IANA numbers
numbers between 7 and 13 have also been identified in [ECP-IKE] and
are included here, as have the NIST groups with numbers 19, 20 and 21.
The remaining five NIST groups are suggested and anticipate to be
assigned IANA numbers 22 to 26.
Blake-Wilson, Brown and Poeluev [Page 3]
INTERNET-DRAFT NIST Curves for IKE December 2005
The groups recommended for IKE and IKEv2 in this document are the ECC
groups that NIST recommends [FIPS-186-2]. These fifteen ECC groups
are given in the following table.
IANA Group Description SEC 2 OID
---- ----------------- ---------
22 ECPRGF192Random group P-192 secp192r1
23 EC2NGF163Random group B-163 sect163r2
7 EC2NGF163Koblitz group K-163 sect163k1
24 ECPRGF224Random group P-224 secp224r1
25 EC2NGF233Random group B-233 sect233r1
26 EC2NGF233Koblitz group K-233 sect233k1
19 ECPRGF256Random group P-256 secp256r1
27 EC2NGF283Random group B-283 sect283r1
9 EC2NGF283Koblitz group K-283 sect283k1
20 ECPRGF384Random group P-384 secp384r1
10 EC2NGF409Random group B-409 sect409r1
11 EC2NGF409Koblitz group K-409 sect409k1
21 ECPRGF521Random group P-521 secp521r1
12 EC2NGF571Random group B-571 sect571r1
13 EC2NGF571Koblitz group K-571 sect571k1
Three curves are defined at each strength - two curves chosen
verifiably at random (as defined in ANSI [X9.62]), one over a binary
field and another over a prime field, and a Koblitz curve over a
binary field that, which enables especially efficient implementations
due to the special structure of the curve [KOB] and [SOL].
Blake-Wilson, Brown and Poeluev [Page 4]
INTERNET-DRAFT NIST Curves for IKE December 2005
3. Security Considerations
Since this document proposes new groups for use within IKE, many of the
security considerations contained within RFC 2409 apply here as well.
Nine of the groups proposed in this document offer higher strength
than the groups in RFC 2409. This allows the IKE and IKEv2 to offer
security comparable with the proposed AES algorithms.
In addition, since all the new groups are defined over GF[P] with P
prime or GF[2^N] with N prime, they address the concerns expressed
regarding the elliptic curve groups included in RFC 2409, which are
curves defined over GF[2^N] with N composite. The work of Gaudry,
Hess, and Smart [WEIL] reveal some of the weaknesses in such groups.
4. Intellectual Property Rights
The IETF has been notified of intellectual property rights claimed in
regard to the specification contained in this document.
For more information, consult the online list of claimed rights
(http://www.ietf.org/ipr.html).
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
5. Acknowledgments
To be added.
Blake-Wilson, Brown and Poeluev [Page 5]
INTERNET-DRAFT NIST Curves for IKE December 2005
6. References
[ECP-IKE] J. Solinas, ECP Groups for IKE,
draft-ietf-ipsec-ike-ecp-groups-01.txt, work in progress.
[IKE] D. Harkins and D. Carrel, The Internet Key Exchange, RFC
2409, November 1998.
[IKEv2] C. Kaufman, Editor, Internt Key Exchange (IKEv2) Protocol,
draft-ietf-ipsec-ikev2-17.txt, work in progress.
[IANA] Internet Assigned Numbers Authority. Attribute Assigned
Numbers.
(http://www.isi.edu/in-notes/iana/assignments/ipsec-registry)
[IEEE-1363] Institute of Electrical and Electronics Engineers. IEEE
1363-2000, Standard for Public Key Cryptography. IEEE
Microprocessor Standards Committee. August 2001.
(http://grouper.ieee.org/groups/1363/index.html)
[KOB] N. Koblitz, CM curves with good cryptographic properties.
Proceedings of Crypto '91. Pages 279-287. Springer-Verlag, 1992.
[FIPS-186-2] U.S. Department of Commerce/National Institute of
Standards and Technology. Digital Signature Standard (DSS), FIPS
PUB 186-2, January 2000.
(http://csrc.nist.gov/fips/fips186-2.pdf)
[HOF] P. Hoffman and H. Orman, Determining strengths for public keys
used for exchanging symmetric keys, Internet-draft. August 2000.
[LEN] A. Lenstra and E. Verhuel, Selecting cryptographic key sizes.
Available at: www.cryptosavvy.com.
[JMS] M. Jacobson, A. Menezes and A. Stein, Solving Elliptic
Curve Discrete Logarithm Problems Using Weil Descent,
Combinatorics and Optimization Research Report 2001-31, May 2001.
Available at http://www.cacr.math.uwaterloo.ca/.
[MODP-IKE] T. Kivinen and M. Kojo, More Modular Exponential (MODP)
Diffie-Hellman groups for Internet Key Exchange (IKE),
rfc3526.txt, May 2003.
[SEC2] Standards for Efficient Cryptography Group. SEC 2 -
Recommended Elliptic Curve Domain Parameters. Working Draft
Ver. 1.0., 2000. (http://www.secg.org)
[SOL] J. Solinas, An improved algorithm for arithmetic on a family
of elliptic curves, Proceedings of Crypto '97, Pages 357-371,
Springer-Verlag, 1997.
Blake-Wilson, Brown and Poeluev [Page 6]
INTERNET-DRAFT NIST Curves for IKE December 2005
[WEIL] Gaudry, P., Hess, F., Smart, Nigel P. Constructive and
Destructive Facets of Weil Descent on Elliptic Curves, HP Labs
Technical Report No. HPL-2000-10, 2000.
(http://www.hpl.hp.com/techreports/2000/HPL-2000-10.html)
[X9.62] American National Standards Institute, ANS X9.62-2005:
Public Key Cryptography for the Financial Services Industry: The
Elliptic Curve Digital Signature Algorithm. November 2005.
[X9.63] American National Standards Institute. ANSI X9.63-2001,
Public Key Cryptography for the Financial Services Industry: Key
Agreement and Key Transport using Elliptic Curve Cryptography.
November 2001.
7. Authors' Addresses
Simon Blake-Wilson
Basic Commerce & Industries, Inc.
sblakewilson@bcisse.com
Daniel R. L. Brown
Certicom Corp.
dbrown@certicom.com
Yuri Poeluev
Certicom Corp.
ypoeluev@certicom.com
8. Full Copyright Statement
Copyright (C) The Internet Society (2005). This document is
subject to the rights, licenses and restrictions contained in BCP
78, and except as set forth therein, the authors retain all their
rights.
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Blake-Wilson, Brown and Poeluev [Page 7]| PAFTECH AB 2003-2026 | 2026-04-23 13:32:54 |