One document matched: draft-kato-tls-rfc4132bis-04.xml


<?xml version="1.0" encoding="US-ASCII"?>
<!-- -*- xml -*- -->
<!-- This template is for creating an Internet Draft using xml2rfc,
  which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
  <!-- One method to get references from the online citation libraries.
  There has to be one entity for each item to be referenced.
  An alternate method (rfc include) is described in the references. -->

<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4312 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4312.xml">
<!ENTITY RFC4132 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4132.xml">
<!ENTITY RFC3657 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3657.xml">
<!ENTITY RFC4301 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC4302 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4302.xml">
<!ENTITY RFC4306 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4306.xml">
<!ENTITY RFC2411 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2411.xml">
<!ENTITY RFC4051 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4051.xml">
<!ENTITY RFC4086 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4086.xml">
<!ENTITY RFC3713 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3713.xml">
<!ENTITY RFC4494 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4494.xml">
<!ENTITY RFC4615 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4615.xml">
<!ENTITY RFC4303 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4303.xml">
<!ENTITY RFC2409 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2409.xml">
<!ENTITY RFC4346 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4346.xml">
<!ENTITY RFC5246 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5246.xml">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
  please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
  (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
  (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" obsoletes="4132" docName="draft-kato-tls-rfc4132bis-04" ipr="pre5378Trust200902">
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: full3667, noModification3667, noDerivatives3667
    you can add the attributes updates="NNNN" and obsoletes="NNNN"
    they will automatically be output with "(if approved)" -->

  <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the
      full title is longer than 39 characters -->

    <title abbrev="Camellia Cipher Suites for TLS">Camellia Cipher Suites for TLS</title>

    <author initials="A." surname="Kato"
      fullname="Akihiro Kato">
      <organization>
	NTT Software Corporation
      </organization>
      <address>
	<phone>+81-45-212-7577</phone>
	<facsimile>+81-45-212-9800</facsimile>
	<email>akato@po.ntts.co.jp</email>
      </address>
    </author>

    <author initials="M." surname="Kanda"
      fullname="Masayuki Kanda">
      <organization>
	Nippon Telegraph and Telephone Corporation
      </organization>
      <address>
	<phone>+81-422-59-3456</phone>
	<facsimile>+81-422-59-4015 </facsimile>
	<email>kanda.masayuki@lab.ntt.co.jp</email>
      </address>
    </author>
    
    <author initials="S." surname="Kanno"
      fullname="Satoru Kanno">
      <organization>
	NTT Software Corporation
      </organization>
      <address>
	<phone>+81-45-212-7577</phone>
	<facsimile>+81-45-212-9800</facsimile>
	<email>kanno-s@po.ntts.co.jp</email>
      </address>
    </author>
    
    <date />

    <!-- If the month and year are both specified and are the current ones, xml2rfc will fill
      in the current day for you. If only the current year is specified, xml2rfc will fill
      in the current day and month for you. If the year is not the current one, it is
      necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the
      purpose of calculating the expiry date).  With drafts it is normally sufficient to
      specify just the year. -->

    <!-- Meta-data Declarations -->

    <area>Security</area>

    <workgroup>Network Working Group</workgroup>

    <!-- WG name at the upperleft corner of the doc,
      IETF is fine for individual submissions.
      If this element is not present, the default is "Network Working Group",
      which is used by the RFC Editor as a nod to the history of the IETF. -->

    <keyword>Block Cipher</keyword>
    <keyword>Security</keyword>
    <keyword>Camellia</keyword>
    <keyword>TLS</keyword>
    <keyword>CBC</keyword>
    <keyword>SHA2</keyword>

    <!-- Keywords will be incorporated into HTML output
      files in a meta tag but they have no effect on text or nroff
      output. If you submit your draft to the RFC Editor, the
      keywords will be used for the search engine. -->

    <abstract>
      <t> 
      This document specifies a set of cipher suites for the Transport
      Security Layer (TLS) protocol to support the Camellia encryption
      algorithm as a block cipher.  It amends the ciphersuites originally
      specifed in RFC 4132 by counterparts using the newer cryptographic
      hash algorithms from the SHA-2 familiy.  This document obsoletes
      RFC 4132.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>
   This document proposes the addition of new cipher suites to the
   Transport Layer Security (TLS) <xref target="RFC5246" />
   protocol to support the Camellia <xref target="RFC3713" /> encryption
   algorithm as a block cipher algorithm, adding variants using the SHA-2 family 
   of cryptographic hash algorithms <xref target="FIPS180-3" /> to the TLS cipher
   suite portfolio originally specified in RFC 4132 <xref target="RFC4132" />.
   This document obsoletes RFC 4132.
      </t>

  <t>
	The algorithm specification and object identifiers are described in
	<xref target="RFC3713" />.
  </t>

    <section title="Terminology">
	<t>
	 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
	"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
     document are to be interpreted as described in <xref target="RFC2119" />.
	</t>
    </section>
    </section>

    <section title="Proposed Cipher Suites" >
     <t>
      The cipher suites defined here have the following identifiers:
     </t>
      
      <figure>
          <artwork align="left"><![CDATA[
  CipherSuite TLS_RSA_WITH_CAMELLIA_128_CBC_SHA         = { 0x00,0x41 };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA      = { 0x00,0x42 };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA      = { 0x00,0x43 };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x44 };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x45 };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x46 };

  CipherSuite TLS_RSA_WITH_CAMELLIA_256_CBC_SHA         = { 0x00,0x84 };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA      = { 0x00,0x85 };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA      = { 0x00,0x86 };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x87 };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x88 };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x89 };
    
  CipherSuite TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256      = { TBD,TBD };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256   = { TBD,TBD };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256   = { TBD,TBD };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
  
  CipherSuite TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256      = { TBD,TBD };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256   = { TBD,TBD };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256   = { TBD,TBD };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
            ]]></artwork>
	</figure>
    </section>
    
    <section title="Cipher Suite Definitions">
      <section title="Key Exchange">
	  <t>
		The RSA, DHE_RSA, DH_RSA, DHE_DSS, DH_DSS, and DH_anon key exchanges
		are performed as defined in <xref target="RFC5246" />.
      </t>
      </section>

      <section title="Cipher">
	<t>
		The CAMELLIA_128_CBC cipher suites use Camellia <xref target="RFC3713" /> in CBC 
		mode with a 128-bit key and 128-bit IV; the CAMELLIA_256_CBC cipher 
		suites use a 256-bit key and 128-bit IV.
	</t>
      </section>
      
      <section title="Hash and Pseudorandom Function">
      <section title="Hash and Pseudorandom Function for TLS 1.1">
	<t>
		The cipher suites ending with _SHA use HMAC-SHA1 as the MAC 
		algorithm. 
	</t>
	<t>
		When used with TLS versions prior to 1.2, the PRF is calculated as 
		specified in the appropriate version of the TLS specification.
	</t>
      </section>

      <section title="Hash and Pseudorandom Function for TLS 1.2">
	<t>
		The cipher suites ending with _SHA256 use HMAC-SHA-256 as
		the MAC algorithm.
	</t>
	<t>
		For TLS version 1.2, the PRF is the TLS PRF <xref target="RFC5246" /> with SHA-256 as 
		the hash function.
	</t>
	<t>
		The cipher suites ending with _SHA256 use HMAC-SHA-256 as the MAC
		algorithm. The PRF is the TLS PRF  <xref target="RFC5246" /> with SHA-256 as the hash
		function. These cipher suites MUST NOT be negotiated by TLS 1.1 or
		earlier versions.  Clients MUST NOT offer these cipher suites if
		they do not offer TLS 1.2 or later.  Servers which select an earlier
		version of TLS MUST NOT select one of thse cipher suites.
	</t>

      </section>
	</section>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t> 
      	IANA has already allocated the following numbers for RFC 4132, 
      	and is requested to update them to reference this document:
      </t>
      <figure>
      	<artwork align="left"><![CDATA[
  CipherSuite TLS_RSA_WITH_CAMELLIA_128_CBC_SHA         = { 0x00,0x41 };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA      = { 0x00,0x42 };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA      = { 0x00,0x43 };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x44 };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x45 };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA     = { 0x00,0x46 };

  CipherSuite TLS_RSA_WITH_CAMELLIA_256_CBC_SHA         = { 0x00,0x84 };
  CipherSuite TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA      = { 0x00,0x85 };
  CipherSuite TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA      = { 0x00,0x86 };
  CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x87 };
  CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x88 };
  CipherSuite TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA     = { 0x00,0x89 };
		]]></artwork>
	</figure>
	
	<t>IANA is requested to allocate (has allocated) the following numbers 
	in the TLS Cipher Suite Registry:</t>
	<figure>
      	<artwork align="left"><![CDATA[
 CipherSuite TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256      = { TBD,TBD };
 CipherSuite TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256   = { TBD,TBD };
 CipherSuite TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256   = { TBD,TBD };
 CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
 CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
 CipherSuite TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256  = { TBD,TBD };
    
 CipherSuite TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256      = { TBD,TBD };
 CipherSuite TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256   = { TBD,TBD };
 CipherSuite TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256   = { TBD,TBD };
 CipherSuite TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
 CipherSuite TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
 CipherSuite TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256  = { TBD,TBD };
		]]></artwork>
	</figure>
    </section>

	<section anchor="Security" title="Security Considerations">
      <t>
		At the time of writing this document, there are no known weak keys
		for Camellia.
      </t>
      <t>
		Also, Security issues are discussed throughout RFC 5246 <xref target="RFC5246" />,
		especially in Appendices D, E, and F of <xref target="RFC5246" />.
      </t>
	</section>
         
  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>
    <!-- References split into informative and normative -->

    <!-- There are 2 ways to insert reference entries from the citation libraries:
      1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
      2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
      (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

      Both are cited textually in the same manner: by using xref elements.
      If you use the PI option, xml2rfc will, by default, try to find included files in the same
      directory as the including file. You can also define the XML_LIBRARY environment variable
      with a value containing a set of directories to search.  These can be either in the local
      filing system or remote ones accessed by http (http://domain/dir/... ).-->

    <references title="Normative References">

<!--      <?rfc include="reference.RFC.2119.xml"?> -->

<!--      &RFC4346; -->
<!--      &RFC4132; -->
      &RFC2119;
      &RFC5246;
      &RFC3713;

      <reference anchor="FIPS180-3" target="http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf">
	<front>
	  <title>Secure Hash Standard (SHS)</title>
	  <author>
	    <organization>National Institute of Standards and Technology</organization>
	  </author>
	  <date month="October" year="2008" />
	</front>
	<seriesInfo name="FIPS" value="PUB 180" />
      </reference>
      
    </references>
    <references title="Informative References">
      <!-- Here we use entities that we defined at the beginning. -->
      
      &RFC4132;

      <reference anchor="FIPS.197.2001" target="http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf">
	<front>
	  <title>Advanced Encryption Standard (AES)</title>
	  <author>
	    <organization>National Institute of Standards and Technology</organization>
	  </author>
	  <date month="November" year="2001" />
	</front>
	<seriesInfo name="FIPS" value="PUB 197" />
      </reference>

      <reference anchor="ISO/IEC 18033-3">
	<front>
	  <title>Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers</title>
	  <author>
	    <organization>International Organization for Standardization</organization>
	  </author>
	  <date month="July" year="2005" />
	</front>
	<seriesInfo name="ISO/IEC" value="18033-3" />
      </reference>
      
    <reference anchor="open source license" target="http://info.isl.ntt.co.jp/crypt/eng/camellia/source.html">
	<front>
		<title>Camellia open source software</title>
		<author>
		<organization />
		</author>
		<date />
		</front>
	</reference>
	<reference anchor="Camellia web site" target="http://info.isl.ntt.co.jp/camellia/">
	<front>
		<title>Camellia web site</title>
		<author>
		<organization />
		</author>
		<date />
		</front>
	</reference>
    </references>

    <!-- Change Log

      v00 2006-03-15  EBD   Initial version

      v01 2006-04-03  EBD   Moved PI location back to position 1 -
      v3.1 of XMLmind is better with them at this location.
      v02 2007-03-07  AH    removed extraneous nested_list attribute,
      other minor corrections
      v03 2007-03-09  EBD   Added comments on null IANA sections and fixed heading capitalization.
      Modified comments around figure to reflect non-implementation of
      figure indent control.  Put in reference using anchor="DOMINATION".
      Fixed up the date specification comments to reflect current truth.
      v04 2007-03-09 AH     Major changes: shortened discussion of PIs,
      added discussion of rfc include.
      v05 2007-03-10 EBD    Added preamble to C program example to tell about ABNF and alternative
      images. Removed meta-characters from comments (causes problems).  -->
  </back>
</rfc>

PAFTECH AB 2003-20262026-04-24 05:43:33