Re: [Crypto-panel] [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt

"Paterson, Kenny" <> Sun, 29 October 2017 16:08 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 7CB6C13F57B for <>; Sun, 29 Oct 2017 09:08:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.91
X-Spam-Status: No, score=-2.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 8rWzo2iRmD_i for <>; Sun, 29 Oct 2017 09:08:06 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 7007013F56C for <>; Sun, 29 Oct 2017 09:08:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=selector1-rhul-ac-uk; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kKwZVqfFZlNhRCOG55JbAd4P9+g+QCGomjgA9WRFcPg=; b=BBifOxhMOxxZUmqkJ6nz1SIrT18n6Gc+Tr/pWYvp8gj3S1is3yS9qqx8Y5oIL+lTWfNtNjKThSidbrDl7h5F8PHSq+ARQSISr+qytA5aymj8K9aU4qDT0poOBr6EiP8iauNzVKv2shAcNTljeAU1CJxIGFobM9KkVvCNtLbropc=
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id; Sun, 29 Oct 2017 16:08:02 +0000
Received: from ([fe80::adb1:d3e2:d068:a07]) by ([fe80::adb1:d3e2:d068:a07%13]) with mapi id 15.20.0178.012; Sun, 29 Oct 2017 16:08:02 +0000
From: "Paterson, Kenny" <>
To: "" <>
CC: "" <>, "Stanislav V. Smyshlyaev" <>
Thread-Topic: [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt
Thread-Index: AQHTQQwfM0WFHhVcKUqZTJkmYc/n/6LboHAAgB9tZgA=
Date: Sun, 29 Oct 2017 16:08:02 +0000
Message-ID: <>
References: <> <>
In-Reply-To: <>
Accept-Language: en-GB, en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/
authentication-results: spf=none (sender IP is );
x-originating-ip: []
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0301MB1907; 6:r2lO+szUfRcEq5ei5qQTQgOigeY78R7uDWc7QBT3fYTcWz7zY/X9T1GzuZSrQdWtwm3UxBKeKjQ7SVCTS2Z7E2ESPAJuHWFBV/XlDdb91QIyJxFG+z6DsDSuduBwTp1Yggxg1e4I0lgNz6cTLsiKEi6l2ETOpIseY2+iOhV4o2Uuw4p7iEZibY1lcfutZ1a1woEUpbI1jw2/rPlHlbbCpNbSaOESA6xdmR0fuaXFQddEKjpkZV7M25Uoth0OrROB5oEwKQ2bO2dhONID9PTGFgIwh2KIcigmatqO5u6RlPRDlCmrOknc9VJFDewvMYJ7MYD3Iv/K/IO2LRlOgFBEtkjG3fYWe0n7EE3ffgM7ikE=; 5:yOcW6h0oppIMdskWzmum2r4F5MZvBsIBN62PiayVkNpufVUGA3J+vWDdkPx2MNRafOui7wG0sh1fJWNSn3mHwxQMAcflhsriHikEdTIh9hZfXXLisOTy2VruC2WfVRqTR4Gp4NaCa09Zutz5iKYr9kAH6K8niVBH9VzQcD5UrCo=; 24:/UQZ6LlwpEzsVgQDB3aDrkL+eBo+Hy5GGrzp5/n5gryY/4qLPBF1K25CXs5u3wkPlUdCEpjde2F7iggaACTmxdrpDdEapkecT2C9Tpyq6uQ=; 7:cwFOJ/of5VCVfhkehA2ct1QFJckx0VkGR7cRchl/1Uvn5y9HrJ3szwt02bs3gQaXo/Yg/SkccBhWYUfFxXQs7p3AhwQBSvoZukFHLonqVM6PgUB96mWmJHjBz0FlC5dPDbeVwihQgIxvL4yAhThgWlqlqlxsydYLtoQzKf2s5Z/mlpsIjlQ/1tp/dtLM1ePG5pcASRWjg+SSZc9LJ2C77zj0vqLc6UDfSZZpbMypMWtelUAIT3OVHHxZ1jMExZ63
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10009020)(6009001)(346002)(376002)(377424004)(189002)(199003)(24454002)(68736007)(54906003)(58126008)(105586002)(106356001)(81156014)(81166006)(53546010)(8676002)(2351001)(101416001)(3280700002)(230783001)(6116002)(102836003)(3846002)(8936002)(25786009)(14454004)(86362001)(74482002)(76176999)(54356999)(50986999)(189998001)(3660700001)(6506006)(478600001)(6436002)(2900100001)(66066001)(5250100002)(6486002)(6246003)(5660300001)(4326008)(39060400002)(83506002)(5640700003)(97736004)(72206003)(2906002)(68196006)(36756003)(7736002)(229853002)(305945005)(6916009)(42882006)(2950100002)(99286003)(6512007)(6306002)(2501003)(316002)(53936002)(786003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0301MB1907;; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-ms-office365-filtering-correlation-id: 2f05e0f9-a5d1-4c48-b201-08d51ee73b32
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(4534020)(4602075)(2017052603199); SRVR:AM4PR0301MB1907;
x-ms-traffictypediagnostic: AM4PR0301MB1907:
x-exchange-antispam-report-test: UriScan:(120809045254105);
x-microsoft-antispam-prvs: <>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(100000703101)(100105400095)(10201501046)(3002001)(3231020)(93006095)(93001095)(6041248)(20161123558100)(20161123564025)(20161123562025)(20161123560025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM4PR0301MB1907; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM4PR0301MB1907;
x-forefront-prvs: 0475418F50
received-spf: None ( does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2f05e0f9-a5d1-4c48-b201-08d51ee73b32
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Oct 2017 16:08:02.1468 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2efd699a-1922-4e69-b601-108008d28a2e
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0301MB1907
Archived-At: <>
Subject: Re: [Crypto-panel] [Cfrg] I-D Action: draft-irtf-cfrg-re-keying-08.txt
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sun, 29 Oct 2017 16:08:07 -0000

Dear CFRG panel members,

( is ready for
panel review. 

Any volunteers to look at this one?

(We don't expect too many more review requests for a while after this and



On 09/10/2017 16:14, "Stanislav V. Smyshlyaev" <> wrote:

>Dear colleagues,
>In Prague, we listed several todo's about our Re-keying draft; thanks to
>the efforts of the persons listed in the contributors and "thanks to"
>lists now we have a new version, addressing the comments and concerns
>that have been
> discussed earlier.
>There have been several updates of the draft, major changes from the July
>version (discussed at IETF 99 CFRG meeting) are the following:
>1) New test examples have been added: external re-keying with a parallel
>construction based on AES-256, external re-keying with a serial
>construction based on SHA-256, OMAC-ACPKM-Master mode with AES-256,
> as agreed.
>2) CCM-ACPKM and CCM-ACPKM-Master, OFB-ACPKM-Master modes have been
>removed from the document, as agreed.
>3) “Key Hierarchy Construction” section has been added.
>4) The more restrictive terminology for different types of keys has been
>introduced: "initial key", "section key" (data processing key in internal
>re-keying), "master key", "section key material", "subkey",
> "frame key" (data processing key in external re-keying).
>5) The additional hash calculation for ICB value (if c!=32) has been
>removed from GCM-ACPKM and GCM-ACPKM-Master modes.
>The current version
>( seems to take
>all concerns and considerations we've discussed (in Chicago, in Prague
> and in e-mails) into account – please let me know if we've missed
>something. If there won't be any objections, I think we should start
>thinking about moving to the review phase.
>Kindest regards,
>2017-10-09 17:36 GMT+03:00 <>rg>:
>A New Internet-Draft is available from the on-line Internet-Drafts
>This draft is a work item of the Crypto Forum RG of the IRTF.
>        Title           : Re-keying Mechanisms for Symmetric Keys
>        Author          : Stanislav Smyshlyaev
>        Filename        : draft-irtf-cfrg-re-keying-08.txt
>        Pages           : 49
>        Date            : 2017-10-09
>   A certain maximum amount of data can be safely encrypted when
>   encryption is performed under a single key.  This amount is called
>   "key lifetime".  This specification describes a variety of methods to
>   increase the lifetime of symmetric keys.  It provides external and
>   internal re-keying mechanisms based on hash functions and on block
>   ciphers, that can be used with modes of operations such as CTR, GCM,
>   CBC, CFB and OMAC.
>The IETF datatracker status page for this draft is:
>There are also htmlized versions available at:
>A diff from the previous version is available at:
>Please note that it may take a couple of minutes from the time of
>until the htmlized version and diff are available at
> <>.
>Internet-Drafts are also available by anonymous FTP at:
>Cfrg mailing list