Re: [Crypto-panel] [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt

"Paterson, Kenny" <Kenny.Paterson@rhul.ac.uk> Sun, 29 October 2017 16:08 UTC

Return-Path: <Kenny.Paterson@rhul.ac.uk>
X-Original-To: crypto-panel@ietfa.amsl.com
Delivered-To: crypto-panel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CB6C13F57B for <crypto-panel@ietfa.amsl.com>; Sun, 29 Oct 2017 09:08:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.91
X-Spam-Level:
X-Spam-Status: No, score=-2.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rhul.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8rWzo2iRmD_i for <crypto-panel@ietfa.amsl.com>; Sun, 29 Oct 2017 09:08:06 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10065.outbound.protection.outlook.com [40.107.1.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7007013F56C for <crypto-panel@irtf.org>; Sun, 29 Oct 2017 09:08:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rhul.onmicrosoft.com; s=selector1-rhul-ac-uk; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kKwZVqfFZlNhRCOG55JbAd4P9+g+QCGomjgA9WRFcPg=; b=BBifOxhMOxxZUmqkJ6nz1SIrT18n6Gc+Tr/pWYvp8gj3S1is3yS9qqx8Y5oIL+lTWfNtNjKThSidbrDl7h5F8PHSq+ARQSISr+qytA5aymj8K9aU4qDT0poOBr6EiP8iauNzVKv2shAcNTljeAU1CJxIGFobM9KkVvCNtLbropc=
Received: from AM4PR0301MB1906.eurprd03.prod.outlook.com (10.168.2.156) by AM4PR0301MB1907.eurprd03.prod.outlook.com (10.168.3.7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.178.6; Sun, 29 Oct 2017 16:08:02 +0000
Received: from AM4PR0301MB1906.eurprd03.prod.outlook.com ([fe80::adb1:d3e2:d068:a07]) by AM4PR0301MB1906.eurprd03.prod.outlook.com ([fe80::adb1:d3e2:d068:a07%13]) with mapi id 15.20.0178.012; Sun, 29 Oct 2017 16:08:02 +0000
From: "Paterson, Kenny" <Kenny.Paterson@rhul.ac.uk>
To: "crypto-panel@irtf.org" <crypto-panel@irtf.org>
CC: "alexey.melnikov@isode.com" <alexey.melnikov@isode.com>, "Stanislav V. Smyshlyaev" <smyshsv@gmail.com>
Thread-Topic: [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt
Thread-Index: AQHTQQwfM0WFHhVcKUqZTJkmYc/n/6LboHAAgB9tZgA=
Date: Sun, 29 Oct 2017 16:08:02 +0000
Message-ID: <D61BAD4B.A2D74%kenny.paterson@rhul.ac.uk>
References: <150755980208.18384.2936406403472477741@ietfa.amsl.com> <CAMr0u6kN1HN7mgfXfuPB2=39C_b_eNs-2igsAWokTKMC9FLCpg@mail.gmail.com>
In-Reply-To: <CAMr0u6kN1HN7mgfXfuPB2=39C_b_eNs-2igsAWokTKMC9FLCpg@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.1.161129
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Kenny.Paterson@rhul.ac.uk;
x-originating-ip: [78.146.75.161]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0301MB1907; 6:r2lO+szUfRcEq5ei5qQTQgOigeY78R7uDWc7QBT3fYTcWz7zY/X9T1GzuZSrQdWtwm3UxBKeKjQ7SVCTS2Z7E2ESPAJuHWFBV/XlDdb91QIyJxFG+z6DsDSuduBwTp1Yggxg1e4I0lgNz6cTLsiKEi6l2ETOpIseY2+iOhV4o2Uuw4p7iEZibY1lcfutZ1a1woEUpbI1jw2/rPlHlbbCpNbSaOESA6xdmR0fuaXFQddEKjpkZV7M25Uoth0OrROB5oEwKQ2bO2dhONID9PTGFgIwh2KIcigmatqO5u6RlPRDlCmrOknc9VJFDewvMYJ7MYD3Iv/K/IO2LRlOgFBEtkjG3fYWe0n7EE3ffgM7ikE=; 5:yOcW6h0oppIMdskWzmum2r4F5MZvBsIBN62PiayVkNpufVUGA3J+vWDdkPx2MNRafOui7wG0sh1fJWNSn3mHwxQMAcflhsriHikEdTIh9hZfXXLisOTy2VruC2WfVRqTR4Gp4NaCa09Zutz5iKYr9kAH6K8niVBH9VzQcD5UrCo=; 24:/UQZ6LlwpEzsVgQDB3aDrkL+eBo+Hy5GGrzp5/n5gryY/4qLPBF1K25CXs5u3wkPlUdCEpjde2F7iggaACTmxdrpDdEapkecT2C9Tpyq6uQ=; 7:cwFOJ/of5VCVfhkehA2ct1QFJckx0VkGR7cRchl/1Uvn5y9HrJ3szwt02bs3gQaXo/Yg/SkccBhWYUfFxXQs7p3AhwQBSvoZukFHLonqVM6PgUB96mWmJHjBz0FlC5dPDbeVwihQgIxvL4yAhThgWlqlqlxsydYLtoQzKf2s5Z/mlpsIjlQ/1tp/dtLM1ePG5pcASRWjg+SSZc9LJ2C77zj0vqLc6UDfSZZpbMypMWtelUAIT3OVHHxZ1jMExZ63
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10009020)(6009001)(346002)(376002)(377424004)(189002)(199003)(24454002)(68736007)(54906003)(58126008)(105586002)(106356001)(81156014)(81166006)(53546010)(8676002)(2351001)(101416001)(3280700002)(230783001)(6116002)(102836003)(3846002)(8936002)(25786009)(14454004)(86362001)(74482002)(76176999)(54356999)(50986999)(189998001)(3660700001)(6506006)(478600001)(6436002)(2900100001)(66066001)(5250100002)(6486002)(6246003)(5660300001)(4326008)(39060400002)(83506002)(5640700003)(97736004)(72206003)(2906002)(68196006)(36756003)(7736002)(229853002)(305945005)(6916009)(42882006)(2950100002)(99286003)(6512007)(6306002)(2501003)(316002)(53936002)(786003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0301MB1907; H:AM4PR0301MB1906.eurprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-ms-office365-filtering-correlation-id: 2f05e0f9-a5d1-4c48-b201-08d51ee73b32
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(4534020)(4602075)(2017052603199); SRVR:AM4PR0301MB1907;
x-ms-traffictypediagnostic: AM4PR0301MB1907:
x-exchange-antispam-report-test: UriScan:(120809045254105);
x-microsoft-antispam-prvs: <AM4PR0301MB19071299D7FF5296EADCD836BC580@AM4PR0301MB1907.eurprd03.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(100000703101)(100105400095)(10201501046)(3002001)(3231020)(93006095)(93001095)(6041248)(20161123558100)(20161123564025)(20161123562025)(20161123560025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM4PR0301MB1907; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM4PR0301MB1907;
x-forefront-prvs: 0475418F50
received-spf: None (protection.outlook.com: rhul.ac.uk does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <84FB7DD90B71F148B94AA141B62E5898@eurprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: rhul.ac.uk
X-MS-Exchange-CrossTenant-Network-Message-Id: 2f05e0f9-a5d1-4c48-b201-08d51ee73b32
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Oct 2017 16:08:02.1468 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2efd699a-1922-4e69-b601-108008d28a2e
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0301MB1907
Archived-At: <https://mailarchive.ietf.org/arch/msg/crypto-panel/tZj6jQrb1FTk8UoGUp_AHdaoTn0>
Subject: Re: [Crypto-panel] [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt
X-BeenThere: crypto-panel@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <crypto-panel.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/crypto-panel/>
List-Post: <mailto:crypto-panel@irtf.org>
List-Help: <mailto:crypto-panel-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/crypto-panel>, <mailto:crypto-panel-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Oct 2017 16:08:07 -0000

Dear CFRG panel members,

draft-irtf-cfrg-re-keying-08
(https://tools.ietf.org/html/draft-irtf-cfrg-re-keying-08) is ready for
panel review. 

Any volunteers to look at this one?

(We don't expect too many more review requests for a while after this and
draft-mcgrew-hash-sigs.)

Regards,

Kenny  

On 09/10/2017 16:14, "Stanislav V. Smyshlyaev" <smyshsv@gmail.com> wrote:

>Dear colleagues,
>
>
>In Prague, we listed several todo's about our Re-keying draft; thanks to
>the efforts of the persons listed in the contributors and "thanks to"
>lists now we have a new version, addressing the comments and concerns
>that have been
> discussed earlier.
>There have been several updates of the draft, major changes from the July
>version (discussed at IETF 99 CFRG meeting) are the following:
>
>
>1) New test examples have been added: external re-keying with a parallel
>construction based on AES-256, external re-keying with a serial
>construction based on SHA-256, OMAC-ACPKM-Master mode with AES-256,
> as agreed.
>2) CCM-ACPKM and CCM-ACPKM-Master, OFB-ACPKM-Master modes have been
>removed from the document, as agreed.
>3) “Key Hierarchy Construction” section has been added.
>4) The more restrictive terminology for different types of keys has been
>introduced: "initial key", "section key" (data processing key in internal
>re-keying), "master key", "section key material", "subkey",
> "frame key" (data processing key in external re-keying).
>5) The additional hash calculation for ICB value (if c!=32) has been
>removed from GCM-ACPKM and GCM-ACPKM-Master modes.
>
>
>The current version
>(https://tools.ietf.org/html/draft-irtf-cfrg-re-keying-08) seems to take
>all concerns and considerations we've discussed (in Chicago, in Prague
> and in e-mails) into account – please let me know if we've missed
>something. If there won't be any objections, I think we should start
>thinking about moving to the review phase.
>
>
>Kindest regards,
>Stanislav
>
>
>
>
>
>
>
>
>2017-10-09 17:36 GMT+03:00 <internet-drafts@ietf.org>:
>
>
>A New Internet-Draft is available from the on-line Internet-Drafts
>directories.
>This draft is a work item of the Crypto Forum RG of the IRTF.
>
>        Title           : Re-keying Mechanisms for Symmetric Keys
>        Author          : Stanislav Smyshlyaev
>        Filename        : draft-irtf-cfrg-re-keying-08.txt
>        Pages           : 49
>        Date            : 2017-10-09
>
>Abstract:
>   A certain maximum amount of data can be safely encrypted when
>   encryption is performed under a single key.  This amount is called
>   "key lifetime".  This specification describes a variety of methods to
>   increase the lifetime of symmetric keys.  It provides external and
>   internal re-keying mechanisms based on hash functions and on block
>   ciphers, that can be used with modes of operations such as CTR, GCM,
>   CBC, CFB and OMAC.
>
>
>The IETF datatracker status page for this draft is:
>https://datatracker.ietf.org/doc/draft-irtf-cfrg-re-keying/
>
>There are also htmlized versions available at:
>https://tools.ietf.org/html/draft-irtf-cfrg-re-keying-08
>https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-re-keying-08
>
>A diff from the previous version is available at:
>https://www.ietf.org/rfcdiff?url2=draft-irtf-cfrg-re-keying-08
>
>
>Please note that it may take a couple of minutes from the time of
>submission
>until the htmlized version and diff are available at
>tools.ietf.org <http://tools.ietf.org>.
>
>Internet-Drafts are also available by anonymous FTP at:
>ftp://ftp.ietf.org/internet-drafts/
>
>_______________________________________________
>Cfrg mailing list
>Cfrg@irtf.org
>https://www.irtf.org/mailman/listinfo/cfrg
>
>
>
>
>
>