Re: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec
<Paul_Koning@Dell.com> Thu, 15 September 2011 10:50 UTC
Return-Path: <Paul_Koning@Dell.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7831721F86EE for <ipsec@ietfa.amsl.com>; Thu, 15 Sep 2011 03:50:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ro-7405NynMH for <ipsec@ietfa.amsl.com>; Thu, 15 Sep 2011 03:50:33 -0700 (PDT)
Received: from ausc60pc101.us.dell.com (ausc60pc101.us.dell.com [143.166.85.206]) by ietfa.amsl.com (Postfix) with ESMTP id 44CF421F84E1 for <ipsec@ietf.org>; Thu, 15 Sep 2011 03:50:31 -0700 (PDT)
X-Loopcount0: from 10.175.216.250
From: Paul_Koning@Dell.com
To: whkim5@ensec.re.kr, ipsec@ietf.org
Date: Thu, 15 Sep 2011 05:52:32 -0500
Thread-Topic: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec
Thread-Index: AcxzgTsr2MLIMph8RXaI/s5sD26sEAAFCrSQ
Message-ID: <09787EF419216C41A903FD14EE5506DD0307EF973F@AUSX7MCPC103.AMER.DELL.COM>
References: <CAMRi9CeFWKHwZb69beN6XxtS9o5CDv=cvxkPCJzsm+UPTiLHAw@mail.gmail.com>
In-Reply-To: <CAMRi9CeFWKHwZb69beN6XxtS9o5CDv=cvxkPCJzsm+UPTiLHAw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_09787EF419216C41A903FD14EE5506DD0307EF973FAUSX7MCPC103A_"
MIME-Version: 1.0
Cc: ds_kwon@ensec.re.kr, jhpark@ensec.re.kr, jklee@ensec.re.kr
Subject: Re: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Sep 2011 10:50:35 -0000
Should this be added to IPSec? It's not clear to me that proliferation of ciphers is helpful. A small set of very well vetted ciphers is better than a larger set that add others without a strong track record. paul From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Woo-Hwan Kim Sent: Thursday, September 15, 2011 4:24 AM To: ipsec@ietf.org Cc: Daesung Kwon; Jungkeon Lee; Je Hong Park Subject: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec IPsec experts, Let me make a request for review on the draft "The ARIA Cipher Algorithm and Its Use with IPsec". Any comments would be appreciated. http://tools.ietf.org/html/draft-nsri-ipsecme-aria-ipsec-00 ---------- Forwarded message ---------- From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>> Date: 2011/9/15 Subject: New Version Notification for draft-nsri-ipsecme-aria-ipsec-00.txt To: whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr> Cc: ds_kwon@ensec.re.kr<mailto:ds_kwon@ensec.re.kr>, whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr>, jhpark@ensec.re.kr<mailto:jhpark@ensec.re.kr>, jklee@ensec.re.kr<mailto:jklee@ensec.re.kr> A new version of I-D, draft-nsri-ipsecme-aria-ipsec-00.txt has been successfully submitted by Woo-Hwan Kim and posted to the IETF repository. Filename: draft-nsri-ipsecme-aria-ipsec Revision: 00 Title: The ARIA Cipher Algorithm and Its Use with IPsec Creation date: 2011-09-15 WG ID: Individual Submission Number of pages: 10 Abstract: This document describes the use of the ARIA block cipher algorithm in conjunction with several different modes of operation within IKE and IPsec. It describes the use of ARIA in CBC, CTR, GCM and CCM modes to encrypt and/or authenticate IKE and ESP traffic. It also describes the use of ARIA in XCBC, CMAC, and GMAC modes to authenticate IKE, ESP and AH traffic. The use of ARIA in XCBC and CMAC modes for pseudorandom functions is also included. The IETF Secretariat
- [IPsec] Request for review: The ARIA Cipher Algor… Woo-Hwan Kim
- Re: [IPsec] Request for review: The ARIA Cipher A… Paul_Koning
- Re: [IPsec] Request for review: The ARIA Cipher A… Paul Hoffman
- Re: [IPsec] Request for review: The ARIA Cipher A… Paul_Koning