Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Reference problem in 5201-bis wrt SECP160R1

Robert Moskowitz <rgm@htt-consult.com> Wed, 28 January 2015 15:55 UTC

Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D19E1A876B for <hipsec@ietfa.amsl.com>; Wed, 28 Jan 2015 07:55:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.012
X-Spam-Level:
X-Spam-Status: No, score=-0.012 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 94a1hb658uPA for <hipsec@ietfa.amsl.com>; Wed, 28 Jan 2015 07:55:06 -0800 (PST)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [IPv6:2607:f4b8:3:3:67:15ff:fe00:180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A790C1A876A for <hipsec@ietf.org>; Wed, 28 Jan 2015 07:55:06 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 9B68662070 for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:55:03 -0500 (EST)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Hpy1h9Z02Lpj for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:54:51 -0500 (EST)
Received: from lx120e.htt-consult.com (157.67.83.208.client.htt-consult.com [208.83.67.157]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 3E78262063 for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:54:51 -0500 (EST)
Message-ID: <54C90649.9040203@htt-consult.com>
Date: Wed, 28 Jan 2015 10:54:49 -0500
From: Robert Moskowitz <rgm@htt-consult.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: hipsec@ietf.org
References: <50226886.8000106@htt-consult.com> <5022B162.7080306@gmail.com>
In-Reply-To: <5022B162.7080306@gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/hipsec/-JKUakYCwFNjGgicpHuacApN044>
Subject: Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Reference problem in 5201-bis wrt SECP160R1
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jan 2015 15:55:09 -0000

We have a dangling reference in 5201-bis.

It seems that the old reference for secp160r1 is no longer available.  I 
cannot find anything in my searching.

Can anyone point to a reference for it?

thanks


On 08/08/2012 02:35 PM, Rene Struik wrote:
> Hi Bob:
>
> You are correct that SECG removed the prime curve secp160r1 from the
> SEC1 specification, when moving from v1.0 to v2.0. However, you can
> still access this under the "superseded specifications" tab: the weblink
> should be http://www.secg.org/download/aid-386/sec2_final.pdf.
>
> You may also find this curve specified elsewhere, e.g., (if memory
> serves me well) with some copy protection schemes, such as DTCP.
>
> I hope this helps.
>
> Best regards,
>
> Rene
>
> On 08/08/2012 9:24 AM, Robert Moskowitz wrote:
>> For low security we have SECP160R1 from:
>>
>>     [SECG]                      SECG, "Recommended Elliptic Curve Domain
>>                                 Parameters", SEC 2 , 2000,
>>                                 <http://www.secg.org/>.
>>
>> I went there yesterday to look up some of the information on actual
>> sizes and got to:
>>
>> http://www.secg.org/download/aid-784/sec2-v2.pdf, published Jan 27, 2010.
>>
>> And no SECP160R1, the smallest keysize now is SECP192R1 (sec 2.2.2).
>>
>> So we have a reference problem here as well as giving a developer the
>> parameter values needed to implement SECP160R1.
>>
>> Corrective action options:
>>
>> 1) Directly supply the parameters for SECP160R1 in Appendix D and
>> reference the version of secg they were pulled from.
>>
>> 2) Find a more stable source for SECP160R1 to reference.
>>
>> 3) Move to SECP192R1 (which I am leary of as ver 3.0 of secg could
>> drop that!).
>>
>> I vote for 1) and ask whoever has the older version of secg to forward
>> the parameters for inclusion.
>>
>> BTW, HIP DEX works a bit differently in that the keys generated from
>> the ECDH exchange are only used in protecting HIP packets and a
>> wrapped key exchange within HIP provides the keying material for
>> session keys (eg ESP or 802.15.4 security).  So in DEX, using
>> SECP160R1 may not be as much of a risk as in BEX, so I DO plan on
>> providing the SECP160R1 parameters in DEX.
>>
>>
>> _______________________________________________
>> Hipsec mailing list
>> Hipsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/hipsec
>