Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Reference problem in 5201-bis wrt SECP160R1
Robert Moskowitz <rgm@htt-consult.com> Wed, 28 January 2015 15:55 UTC
Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D19E1A876B for <hipsec@ietfa.amsl.com>; Wed, 28 Jan 2015 07:55:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.012
X-Spam-Level:
X-Spam-Status: No, score=-0.012 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 94a1hb658uPA for <hipsec@ietfa.amsl.com>; Wed, 28 Jan 2015 07:55:06 -0800 (PST)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [IPv6:2607:f4b8:3:3:67:15ff:fe00:180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A790C1A876A for <hipsec@ietf.org>; Wed, 28 Jan 2015 07:55:06 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 9B68662070 for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:55:03 -0500 (EST)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Hpy1h9Z02Lpj for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:54:51 -0500 (EST)
Received: from lx120e.htt-consult.com (157.67.83.208.client.htt-consult.com [208.83.67.157]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id 3E78262063 for <hipsec@ietf.org>; Wed, 28 Jan 2015 10:54:51 -0500 (EST)
Message-ID: <54C90649.9040203@htt-consult.com>
Date: Wed, 28 Jan 2015 10:54:49 -0500
From: Robert Moskowitz <rgm@htt-consult.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: hipsec@ietf.org
References: <50226886.8000106@htt-consult.com> <5022B162.7080306@gmail.com>
In-Reply-To: <5022B162.7080306@gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/hipsec/-JKUakYCwFNjGgicpHuacApN044>
Subject: Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Reference problem in 5201-bis wrt SECP160R1
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jan 2015 15:55:09 -0000
We have a dangling reference in 5201-bis. It seems that the old reference for secp160r1 is no longer available. I cannot find anything in my searching. Can anyone point to a reference for it? thanks On 08/08/2012 02:35 PM, Rene Struik wrote: > Hi Bob: > > You are correct that SECG removed the prime curve secp160r1 from the > SEC1 specification, when moving from v1.0 to v2.0. However, you can > still access this under the "superseded specifications" tab: the weblink > should be http://www.secg.org/download/aid-386/sec2_final.pdf. > > You may also find this curve specified elsewhere, e.g., (if memory > serves me well) with some copy protection schemes, such as DTCP. > > I hope this helps. > > Best regards, > > Rene > > On 08/08/2012 9:24 AM, Robert Moskowitz wrote: >> For low security we have SECP160R1 from: >> >> [SECG] SECG, "Recommended Elliptic Curve Domain >> Parameters", SEC 2 , 2000, >> <http://www.secg.org/>. >> >> I went there yesterday to look up some of the information on actual >> sizes and got to: >> >> http://www.secg.org/download/aid-784/sec2-v2.pdf, published Jan 27, 2010. >> >> And no SECP160R1, the smallest keysize now is SECP192R1 (sec 2.2.2). >> >> So we have a reference problem here as well as giving a developer the >> parameter values needed to implement SECP160R1. >> >> Corrective action options: >> >> 1) Directly supply the parameters for SECP160R1 in Appendix D and >> reference the version of secg they were pulled from. >> >> 2) Find a more stable source for SECP160R1 to reference. >> >> 3) Move to SECP192R1 (which I am leary of as ver 3.0 of secg could >> drop that!). >> >> I vote for 1) and ask whoever has the older version of secg to forward >> the parameters for inclusion. >> >> BTW, HIP DEX works a bit differently in that the keys generated from >> the ECDH exchange are only used in protecting HIP packets and a >> wrapped key exchange within HIP provides the keying material for >> session keys (eg ESP or 802.15.4 security). So in DEX, using >> SECP160R1 may not be as much of a risk as in BEX, so I DO plan on >> providing the SECP160R1 parameters in DEX. >> >> >> _______________________________________________ >> Hipsec mailing list >> Hipsec@ietf.org >> https://www.ietf.org/mailman/listinfo/hipsec >
- [Hipsec] Reference problem in 5201-bis wrt SECP16… Robert Moskowitz
- Re: [Hipsec] Reference problem in 5201-bis wrt SE… Rene Struik
- Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Referenc… Robert Moskowitz
- Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Referenc… Miika Komu
- Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Referenc… Robert Moskowitz