One document matched: draft-ietf-msec-mesp-01.txt

Differences from draft-ietf-msec-mesp-00.txt


 
 
      Internet Engineering Task Force     Mark Baugher (Cisco Systems) 
      MSEC Working Group                      Ran Canetti (IBM Watson) 
      INTERNET-DRAFT                       Pau-Chen Cheng (IBM Watson) 
                                           Pankaj Rohatgi (IBM Watson) 
      EXPIRES: September 2003                               March 2003 
    
             MESP: A Multicast Framework for the IPsec ESP 
                     <draft-ietf-msec-mesp-01.txt> 
 
Status of this memo 
    
   This document is an Internet-Draft and is in full conformance with 
   all provisions of Section 10 of RFC2026. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups. Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents 
   at any time. It is inappropriate to use Internet-Drafts as reference 
   material or cite them other than as "work in progress". 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/lid-abstracts.txt 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html 
    
    
    
Abstract 
    
   Multicast ESP (MESP) is a framework for multicast data-origin 
   authentication using the IPsec Encapsulating Security Payload (ESP) 
   protocol. The MESP framework combines group-secrecy, group-
   authentication, and source-authentication transforms in an ESP 
   packet. MESP uses a message authentication code for group 
   authentication to protect a digital signature, TESLA timed MAC, or 
   other multicast source-authentication transform.   
    
    
    
    









 
 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   TABLE OF CONTENTS 
    
1.0 Notational Conventions..........................................2 
2.0 Introduction....................................................2 
 2.1 Changes from the Previous Version..............................3 
 2.2 Overview.......................................................3 
3.0 IP Multicast Security Functionalities...........................3 
 3.1 Composition of the Functionalities.............................4 
 3.2 MESP Security Association Database.............................5 
4.0  MESP Packet Format.............................................5 
 4.1 MESP Transforms................................................7 
   4.1.1 Group Secrecy..............................................7 
   4.1.2 Internal Authentication....................................7 
   4.1.3 External Authentication....................................7 
 4.2 MESP Signaling.................................................7 
   4.2.1 GDOI.......................................................7 
   4.2.2 GSAKMP.....................................................8 
   4.2.3 MIKEY......................................................8 
5.0 Security Considerations.........................................8 
 5.1 MESP Authentication............................................8 
 5.2 MESP Denial-of-Service Protection..............................9 
 5.3 MESP Encryption................................................9 
6.0 IANA Considerations............................................10 
7.0 Acknowledgements...............................................11 
8.0 Author's Address...............................................11 
9.0 References.....................................................11 
 9.1 Normative References..........................................11 
 9.2 Informative References........................................12 
      
    
1.0 Notational Conventions 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "MUST", "MUST NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in [RFC2119].  
   The terminology conforms to [RFC2828]. 
    
2.0 Introduction 
    
   The IPsec Encapsulation Security Payload (ESP) provides a set of 
   security services that include data origin authentication, which 
   enables an IPsec receiver to validate that a received packet 
   originated from a peer-sender in a pairwise security association 
   [Section 3.1, RFC2401].  A Message Authentication Code (MAC), such 
   as the hash-based message authentication code [RFC2104, RFC2404] 
   (HMAC), is the common means to provide data-origin authentication 
   for pairwise IPsec security associations.  For secure groups such as 
   IP multicast groups, however, a MAC supports only "group 
   authentication" and not data-origin authentication [CP]. This 
   Internet-Draft document (I-D) defines a framework for ESP data-

 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 2] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   origin authentication that is suitable for IP multicast groups of 
   ESP receivers. 
    
2.1 Changes from the Previous Version 
    
   This version is not a protocol, unlike the previous version, but is 
   a transform framework for ESP and realizes all of its functions 
   within the ESP protocol.  MESP now imposes an additional structure 
   and usage on IPsec ESP Initialization Vector (IV) and Integrity 
   Check Value (ICV) fields [ESPbis]. 
    
   A smaller change that appears in this version of MESP is the 
   requirement that TESLA authentication be protected by external 
   authentication transform such as a MAC.   
    
2.2 Overview 
    
   This I-D assumes that the reader is familiar with the "Security 
   Architecture for Internet Protocol" [RFC2401] and the "IP 
   Encapsulating Security Payload (ESP)" [ESPBIS] RFCs. Section 3 
   reviews the functionalities of group data-security transforms for 
   applications such as media streaming, process control, and reliable 
   multicast applications.  Section 3 describes the problem of 
   authenticating the source when the data-authentication key is shared 
   by more than two IPsec endpoints. Section 4 describes the MESP 
   framework in terms of the extensions and use of the ESP IV and 
   integrity-check-value fields. The three functionalities of the MESP 
   framework are realized in cryptographic transforms that are secure 
   for various uses, and Section 5 recites the security considerations 
   for each MESP transform.  Section 5 considers IP multicast risks, 
   the transforms that address a particular risk, and the suitability 
   of a transform for various applications and environments.   
    
3.0 IP Multicast Security Functionalities 
    
   The security requirements for multicast have been discussed in [CP]. 
   In general, group security has different requirements and 
   characteristics than pairwise security.  In particular, data-origin 
   authentication using a MAC will not prevent one member from 
   impersonating another when a group of three or more members share 
   the symmetric authentication key.  There are three new 
   functionalities needed to add data-origin authentication to ESP. 
    
   a) Group Secrecy (GS) 
    
   The GS functionality is ESP confidentiality applied to a group . It 
   ensures that transmitted data are accessible only to group members 
   (i.e. two or more hosts in possession of a shared symmetric key). 
   This can also be viewed as a way to enforce access control. A 
   typical realization of GS is to encrypt data using a key known only 
   to group members. Essentially, the solution for multicast is the 
 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 3] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   same as the solution for unicast confidentiality.  It is important 
   to note, however, that some encryption transforms have special 
   considerations when a key is shared among multiple senders.  An MESP 
   encryption or authentication transform SHOULD describe any potential 
   risks of multicast operation and how those risks are averted.  
    
   b) Group Authentication (GA) 
        
   The GA functionality enables a group member to verify that 
   the received data originated from someone in the group and was not  
   modified en-route by a non-group member.  Note that group 
   authentication by itself does not identify the source of the 
   data.  For example, the data might have been forged by any malicious 
   group member. GA can be efficiently realized using standard shared 
   key authentication mechanisms such as Message Authentication Codes 
   (MACs), e.g., CBC-MAC, HMAC, or UMAC.   
    
   c) Source and Data Authentication (SrA)  
    
   The SrA functionality enables a group member to verify that 
   the received data originated from the claimed source and was not  
   modified en-route by anyone (including other malicious group  
   members). Unlike Group Authentication, SrA provides the IPsec data-
   origin authentication function [RFC2401, ESPbis].  Source and Data 
   Authentication provides a much stronger security guarantee than 
   Group Authentication in that a particular group member can be 
   identified as a source of a packet. Group and multicast source 
   authentication requires stronger cryptographic techniques such as 
   digital signatures, stream signatures [GR], flow signatures [WL], 
   hybrid signatures [R], timed MACs, e.g. TESLA [TESLA, 
   Ch,PCTS],asymmetric MACs [CGIMNP], etc. 
    
3.1 Composition of the Functionalities  
    
   A secure multicast solution is likely to utilize all three of the 
   basic functionalities. Due to the diversity of the various 
   application and deployment scenarios for multicast, several issues 
   arise with respect to the composition and ordering of these 
   functionalities.   
    
   In ESP, encryption precedes authentication when both are applied and 
   a "combined-mode" confidentiality/integrity operation is not used 
   [Section 3.3.2 of ESPBIS]. Combined modes of encryption and 
   authentication are supported in ESP [ESPbis] but are not considered 
   in this version of MESP. Encryption first is an efficient ordering 
   that allows the receiver to apply a message authentication code 
   (MAC) before it runs a more computationally-intensive decryption; 
   fast authentication before decryption offers a better defense 
   against bogus packets from a denial of service attack.  In MESP, 
   therefore, the group secrecy (GS) transform MUST precede group 
   authentication (GA) when GS is used.  In other words, the sender 
 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 4] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   applies GS prior to GA and the receiver applies GA prior to GS.  
   Krawczyk has shown that it is more secure to authenticate encrypted 
   data rather than encrypt authenticated data [K], but this ordering 
   does not provide non-repudiation. The latter is usually not needed 
   or even desirable for IPsec applications. 
    
   MESP uses the same ordering for SrA: SrA MUST follow GS. Digital 
   signatures offer the simplest method for multicast source 
   authentication (SrA) but are computationally expensive, greatly 
   expand the packet size and impractical for many, if not most, packet 
   flows.  Given the relatively high cost of signature verification, a 
   digital signature leaves the receiver vulnerable to denial of 
   service attack when an attacker succeeds in getting the receiver to 
   perform signature validation of bad packets.   
    
   MESP partially protects the receiver from denial-of-service attacks 
   from bogus digitally-signed packets by applying a MAC to the packet 
   after signing it.  MESP calls this MAC "external authentication" and 
   applies it in an identical fashion to ESP.  The digital signature is 
   called "internal authentication," which the sender applies to the 
   packet payload before the MAC.  MAC authentication, therefore, is 
   applied first by the receiver.  If the attacker is not a member of 
   the group, or otherwise has not obtained the group key, the MAC will 
   fail before the receiver incurs the burden of a signature 
   validation.  
    
   SrA transforms such as TESLA timed-MAC can be more efficient than 
   digital signatures for many applications. But like a digital 
   signature, it is REQUIRED that TESLA and other SrA transforms use 
   internal authentication in MESP and be protected by an external-
   authentication MAC.  Thus, a digital signature or TESLA MAC MUST be 
   applied prior to GA at the sender and after GA at the receiver.  
   MAC-based GA is an external-authentication transform that MUST be 
   applied last at the sender and first at the receiver.  As in ESP, 
   encryption (GS) is applied before any authentication and is 
   optional. 
    
3.2 MESP Security Association Database 
    
   The MESP framework applies up to three transforms to a multicast ESP 
   packet in the order described above: Group Secrecy (GS) is OPTIONAL, 
   Source Authentication (SrA) SHOULD be applied next, and Group 
   Authentication (GA) SHOULD be applied last.  The IPsec SAD MUST be 
   extended to store the additional transform information if MESP is to 
   be supported. 
    
   There are no changes to ESP SA lookup beyond what is specified for 
   multicast SAs in the IPsec specifications [AHbis, ESPbis]. 
 
4.0  MESP Packet Format 
    
 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 5] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   The ESP Packet format is illustrated in Figure 4-1: 
    
   * Internal Authentication Parameters (variable). The length and 
   contents of this field are defined by the SrA transform.  Certain 
   internal authentication transforms have a zero length SrA Transform 
   Parameters fields (Section 5.1).   
    
   * Internal Authentication Tag (Variable).  The length and contents 
   of this field are defined by the internal authentication transform.  
   Certain SrA transforms have a zero length Internal Authentication 
   Tag field. 
       
             Figure 4-1: MESP Transforms in an ESP Packet 
 
 0                   1                   2                   3 
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
|               Security Parameters Index (SPI)                 |    ^ 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    | 
|                      Sequence Number                          |  ^ | 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  | | 
~                 IV (variable & optional)                      ~  | | 
+---------------------------------------------------------------+  | | 
~   Internal Authentication Parameters (variable & optional)    ~  | | 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  | | 
~                        Data (variable)                        ~^ I E 
+               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+E N X 
~               ~         Padding (0-255 bytes)                 |N T T 
+-+-+-+-+-+-+-+-+               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+C | | 
|                               |  Pad Length   | Next Header   |v v | 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    | 
~             Internal Authentication Tag  (variable)           ~    v 
+---------------------------------------------------------------+      
~                 Integrity Check Value (variable)              ~ 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
    
   Encryption (ENC), when applied, covers the ESP data, padding and 
   next header fields.  Internal Authentication (INT) covers the ESP 
   sequence number through the next header field, inclusive. External 
   authentication (EXT) covers the entire ESP packet except for the 
   Integrity Check Value (ICV) field.   
    
   A sender MAY use an encryption-transform (ENC) as done in any other 
   ESP packet. 
    
   When INT is applied to the packet, its output (if any) is placed in 
   the Internal Authentication Tag.  Section 4.1 identifies the INT 
   transforms, which the sender MUST perform prior to the encryption 
   transform.   
    

 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 6] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   A sender of an MESP packet SHOULD use an external-authentication 
   transform (EXT).  Section 4.1 identifies the EXT transforms, which 
   the sender MUST perform last (and the receiver performs first).   
    
   The sender MUST perform the MESP transforms in the order of ENC, 
   INT, and EXT while the receiver MUST perform them in the order of 
   EXT, INT and ENC. 
    
4.1 MESP Transforms 
    
   This version of MESP defines a minimal number of transforms.  In the 
   future, new transforms MAY be added through the publication of an 
   Internet RFC.  The transforms of the MESP framework are listed below 
   and classified according to MESP type. 
    
4.1.1 Group Secrecy 
    
   MESP supports 3DES, AES-CBC, and AES-CTR. 
    
4.1.2 Internal Authentication 
    
   MESP internal authentication is either RSA-SHA1 or TESLA. 
    
4.1.3 External Authentication 
    
   MESP external authentication uses HMAC-SHA1. 
    
4.2 MESP Signaling 
    
   MESP parameters are signaled through a key management protocol or 
   interface such as GDOI, GSAKMP, GKMP, or SDP. 
    
4.2.1 GDOI 
    
   GDOI MUST signal use of the MESP framework using PROTO_ESP_MESP with 
   the TRANSFORM ID set to the MESP transform ID value (see IANA 
   Section below).  MESP extends the RFC 2407 attributes ["IPsec 
   Security Association Attributes," IANA] with the three new classes, 
   "ENC_Transform, "INT_Transform," and "EXT_Transform" (see IANA 
   Section below). 
    
   The ENC Transform MUST be one of the transforms from 4.1.1.  
   Additional ENC transforms MAY be added to this suite through the 
   publication of an Internet RFC. 
    
   The INT Transform MUST be non-null and MUST be one of the values 
   from 4.1.2. Additional INT transforms MAY be added to this suite 
   through the publication of an Internet RFC.   
    


 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 7] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   The EXT Transform MUST be one of the transforms from 4.1.3.  
   Additional EXT transforms MAY be added to this suite through the 
   publication of an Internet RFC. 
    
   The IANA Considerations section of this document describes value 
   assignments for the EXT, INT and ENC attributes. 
    
   The SA Life Type and Life Duration as defined in RFC 2407 [RFC2407, 
   IANA] apply to all keys used for the session, including the 
   Signature PubKey, which MUST NOT be sent if the INT Transform is not 
   a digital signature algorithm.  The length of the encoding is 
   determined by INT. {Editor:  Need to define the Signature PubKey 
   format and should make it a GDOI KD payload item instead.} 
    
4.2.2 GSAKMP 
    
   TBD 
 
4.2.3 MIKEY 
    
   TBD 
    
5.0 Security Considerations 
    
   MESP is a framework for IPsec ESP authentication and encryption 
   transforms to support IP multicast delivery.  IPsec ESP provides 
   access control, rejection of replayed packets, confidentiality 
   (encryption), limited traffic-flow confidentiality and 
   connectionless integrity.  ESP supports a datagram environment where 
   each IP packet is cryptographically independent of other IP packets 
   and can be decrypted, authenticated, and integrity checked when 
   delayed, reordered, or when other packets from the flow are lost.  
   ESP provides rejection of replayed packets for pairwise security 
   associations and for multicast security associations under certain 
   circumstances [ESPbis].  MESP has the same replay mechanism for the 
   single-sender case; the multi-sender case is for further study.  ESP 
   provides data origin authentication for pairwise security 
   associations using symmetric message authentication codes, which are 
   not sufficient for group security applications where more than two 
   members share a symmetric key.   
    
5.1 MESP Authentication 
 
   The MESP framework for ESP provides data-origin authentication 
   services to multicast ESP packets.  Secure groups, such as secure 
   multicast groups, cannot use a symmetric-key MAC to uniquely 
   identify the sender; any group member that is in possession of the 
   group authentication key is capable of replacing the source address 
   of the packet with that of another group member and applying the 
   symmetric key to authenticate the packet.  To uniquely identify a 
   sender among a group of members, digital signature, public key 
 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 8] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   encryption, or specialized source-authentication techniques such as 
   timed MACs are needed. This version of MESP defines a general ESP 
   packet structure for accommodating a digital signature or TESLA 
   timed MAC. 
    
5.2 MESP Denial-of-Service Protection 
    
   As discussed above, a group member cannot authenticate the source of 
   the packet for a multicast group where multiple members share the 
   MAC key.  Thus, a rogue member of the group has all the keying 
   material needed to impersonate a sender of the group if that 
   attacker is able to inject packets into the network using that 
   sender's IP address.  The MESP framework addresses this problem by 
   augmenting the MAC with an "internal authentication" transform, 
   which MAY be an RSA-SHA1 digital signature or a TESLA timed MAC. 
   Digital signatures leave multicast receivers vulnerable to denial-
   of-service attack if the receiver is duped into performing 
   computationally-expensive signature validation of bogus packets.  An 
   external message authentication SHOULD accompany a digital signature 
   so as to limit the effectiveness of bogus digitally signed packets 
   by non-group members.  TESLA is also vulnerable to a denial of 
   service attack if the receiver is duped into storing bogus packets 
   awaiting MAC verification.  An external message authentication 
   transform SHOULD accompany a TESLA authentication transform so as to 
   limit the effectiveness of bogus TESLA packets by non-group members. 
    
   Unfortunately, group members are still capable of sending packets 
   with a valid external-authenticating MAC and invalid digital 
   signature, i.e. a group member can launch a DoS attack on the group 
   using invalid digital signatures.  And group members are still 
   capable of sending packets with a valid external-authentication MAC 
   but an invalid TESLA MAC.  In both the TESLA and digital-signature 
   cases, the external authentication will succeed only to have the 
   internal authentication fail.  MESP includes the ESP sequence number 
   in the internal authentication to protect against a replay attack by 
   a group member.  When the RECOMMENDED external authentication code 
   is use, however, the ESP receiver MUST validate both the internal 
   authentication as well as the external authentication before 
   updating the ESP replay window. 
    
   The value of MESP authentication transforms is to enable the 
   receiver to greatly reduce the effect of an attack by non-group 
   members, to reduce the effects of a denial of service attack by a 
   group member, to detect an attack by a group member, and to support 
   the integration of multicast source-authentication transforms into 
   IPsec ESP for data-origin authentication. 
    
5.3 MESP Encryption 
    
   The value of MESP encryption is to validate individual encryption 
   transforms for multicast operation.  It is possible that a 
 
 
 
Baugher, Canetti, Cheng, Rohatgi                              [Page 9] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   particular cipher and mode are suitable for pairwise security 
   associations but not for multicast security associations, such as 
   one where multiple senders share the key.  For example, a stream or 
   hybrid stream/block cipher has special risks of keystream reuse when 
   its key is shared by multiple senders.  Although IPsec encryption 
   transforms are generally suitable for multicast operation, many have 
   not been evaluated, tested or used in IP multicast environments.  
   This I-D has considered the suitability of several IPsec ESP 
   encryption transforms for inclusion in the MESP framework.  It is 
   RECOMMENDED that all future IPsec encryption transforms be analyzed 
   as to their security for multicast and group security as well as for 
   pairwise security. 
    
6.0 IANA Considerations 
    
   This I-D extends the RFC 2407 attributes for IPsec ESP, 
   PROTO_IPSEC_ESP [RFC2407]. Within PROTO_IPSEC_ESP, MESP reserves the 
   transform identifier value 13 [See IANA, "IPSEC ESP Transform 
   Identifiers"].  MESP also adds new type/length/value attributes to 
   RFC 2407.  For the MESP transform ID security association 
   attributes, the ENC Transform has type number 11, the INT transform 
   has type number 12, and the EXT transform has type number 13 [see 
   IANA, "Security Association Attributes"].   
    
         class               value           type 
         ----------------------------------------- 
         ENC-Transform        11               B 
         INT-Transform        12               B 
         EXT-Transform        13               B 
    
   The ENC-Transform has the following values. 
         name                value   
         ----                -----        
         Reserved              0               
         3DES                  1     
         AES-CBC               2  
         AES-CTR               3 
    
   The INT-Transform has the following values. 
         name                value   
         ----                -----        
         Reserved              0               
         RSA-SHA               1     
         TESLA                 2  
    
   The EXT-Transform has the following values. 
         name                value   
         ----                -----        
         Reserved              0               
         HMAC-SHA1             1     
    
 
 
 
Baugher, Canetti, Cheng, Rohatgi                             [Page 10] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
7.0 Acknowledgements 
    
   The authors wish to thank Scott Fluhrer, Thomas Hardjono, Steve Kent 
   and Brian Weis for their thoughtful comments and suggestions.  
    
8.0 Author's Address 
      
   Mark Baugher 
   Cisco Systems, Inc. 
   5510 SW Orchid Street 
   Portland, Oregon 
   mbaugher@cisco.com 
   +1-503-245-4543 
    
   Ran Canetti 
   IBM T.J. Watson Research Center 
   30 Saw Mill River Road 
   Hawthorne, NY 10598, USA  
   canetti@watson.ibm.com 
   Tel: +1-914-784-6692 
    
   Pau-Chen Cheng  
   IBM T.J. Watson Research Center 
   30 Saw Mill River Road 
   Hawthorne, NY 10598, USA  
   pau@watson.ibm.com 
   Tel: +1-914-784-6692 
    
   Pankaj Rohatgi  
   IBM T.J. Watson Research Center 
   30 Saw Mill River Road 
   Hawthorne, NY 10598, USA 
   rohatgi@watson.ibm.com 
   Tel: +1-914-784-6692 
    
9.0 References 
    
9.1 Normative References 
    
   [AHBIS] S. Kent, IP Authentication Header (AH), IETF, Work in 
   Progress, March 2003, http://www.ietf.org/internet-drafts/draft-
   ietf-ipsec-rfc2402bis-02.txt 
    
   [ESPBIS] S. Kent, IP Encapsulated Security Payload (ESP), IETF, Work 
   in Progress, March 2003, http://www.ietf.org/internet-drafts/draft-
   ietf-ipsec-esp-v3-04.txt.  
    
   [GDOI] M. Baugher, H. Harjono, H. Harney, B. Weis, The Group Domain 
   of Interpretation, IETF, Work in Progress, October 2002, 
   http://www.ietf.org/internet-drafts/draft-ietf-msec-gdoi-06.txt. 
    
 
 
 
Baugher, Canetti, Cheng, Rohatgi                             [Page 11] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
   [GSAKMP] H. Harney, A. Schuett, A. Colegrove, GSAKMP Light, IETF, 
   Work in Progress, July 2002, http://www.ietf.org/internet-
   drafts/draft-ietf-msec-gsakmp-light-sec-01.txt 
    
   [IANA] http://www.iana.org/assignments/isakmp-registry 
    
   [MIKEY] J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Normann, 
   MIKEY: Multimedia Internet KEYing, IETF, Work in Progress, September 
   2002, http://www.ietf.org/internet-drafts/draft-ietf-msec-mikey-
   04.txt 
    
   [PKCS1] PKCS #1 v2.1: RSA Cryptography Standard, RSA Laboratories, 
   ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf, June 2002. 
    
   [RFC2104] H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing 
   for Message Authentication, Internet Request for Comments 2104, 
   IETF, November 1997, ftp://ftp.rfc-editor.org/in-notes/rfc2104.txt. 
    
   [RFC2401] S.Kent, R.Atkinson, Security Architecture for the Internet 
   Protocol, Internet Request for Comments 2401, IETF, November 1998, 
   http://www.ietf.org/rfc/tfc2401.txt. 
    
   [RFC2404] C. Madson, R. Glenn, The Use of HMAC-SHA-1-96 within ESP 
   and AH, Internet Request for Comments 2404, IETF, November 1998, 
   http://www.ietf.org/rfc/rfc2404.txt. 
    
   [RFC2407] D. Piper, The Internet IP Security Domain of 
   Interpretation for ISAKMP, Internet Request for Comments 2407, IETF, 
   November 1998, http://www.ietf.org/rfc/rfc2407.txt. 
    
   [RFC2451]  Pereira, R., and R. Adams, "The ESP CBC-Mode Cipher 
   Algorithms", Internet Request For Comments 2451, IETF, November 
   1998, ftp://ftp.rfc-editor.org/in-notes/rfc2451.txt. 
    
   [RFC3376] B.Cain, S.Deering, B.Fenner, I. Kouvelas, A. Thyagarajan, 
   Internet Group Management Protocol, Version 3, Internet Request for 
   Comments 3376, IETF, October 2002, 
   http://www.ietf.org/rfc/rfc3376.txt.  
    
   [SSM]H.Holbrook, B.Cain, Source Specific Multicast for IP, 
   http://www.ietf.org/internet-drafts/draft-ietf-ssm-arch-00.txt, Work 
   in Progress 
    
   [TESLA]  
    
    
9.2 Informative References 
    
   [CGIMNP] Canetti R., J. Garay, G. Itkis, D. Micciancio, M. Naor, B. 
   Pinkas, "Multicast Security: A Taxonomy and Efficient 
   Authentication", INFOCOM '99. 
 
 
 
Baugher, Canetti, Cheng, Rohatgi                             [Page 12] 
INTERNET-DRAFT               Multicast ESP                 March 2003 
 
 
    
   [CP] R. Canetti, B. Pinkas, "A taxonomy of multicast security 
   issues",draft-canetti-secure-multicast-taxonomy-01.txt, Nov. 1998. 
    
   [Ch] S. Cheung, An Efficient Message Authentication Scheme for   
   Link State Routing, Proceedings of the 13th Annual Computer  
   Security Applications Conference, San Diego, December 8-12, 1997, 
   pp.90-98.  
    
   [GR] R. Gennaro, P. Rohatgi, "How to Sign Digital Streams", Advances 
   in Cryptology - Crypto '97, Springer-Verlag LNCS 1294, pp. 180-197, 
   1997. 
      
   [K] H. Krawczyk, The order of encryption and authentication for 
   protecting communications (or: How secure is SSL?). In J. Kilian, 
   editor, CRYPTO 2001. 
    
   [PCTS] A. Perrig, R. Canetti, D. Tygar, D. Song, Efficient 
   Authentication and Signature of Multicast Streams over Lossy 
   Channels, IEEE Symposium on Security and Privacy, Oakland, CA, May 
   2000. 
    
   [R] P. Rohatgi,  A Compact and Fast Signature Scheme for Multicast 
   Packet Authentication, In 6th ACM Computer and Communications 
   Security Conference (CCS) , Nov 1999. 
    
   [WL]  C. K. Wong and  S. S. Lam, Digital Signatures for Flows and 
   Multicasts, IEEE ICNP '98.  See also University of Texas at Austin, 
   Computer Science Technical report TR 98-15. 






















 
 
 
Baugher, Canetti, Cheng, Rohatgi                             [Page 13] 


PAFTECH AB 2003-20262026-04-21 19:04:23