Re: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec

<Paul_Koning@Dell.com> Thu, 15 September 2011 10:50 UTC

Return-Path: <Paul_Koning@Dell.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7831721F86EE for <ipsec@ietfa.amsl.com>; Thu, 15 Sep 2011 03:50:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ro-7405NynMH for <ipsec@ietfa.amsl.com>; Thu, 15 Sep 2011 03:50:33 -0700 (PDT)
Received: from ausc60pc101.us.dell.com (ausc60pc101.us.dell.com [143.166.85.206]) by ietfa.amsl.com (Postfix) with ESMTP id 44CF421F84E1 for <ipsec@ietf.org>; Thu, 15 Sep 2011 03:50:31 -0700 (PDT)
X-Loopcount0: from 10.175.216.250
From: Paul_Koning@Dell.com
To: whkim5@ensec.re.kr, ipsec@ietf.org
Date: Thu, 15 Sep 2011 05:52:32 -0500
Thread-Topic: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec
Thread-Index: AcxzgTsr2MLIMph8RXaI/s5sD26sEAAFCrSQ
Message-ID: <09787EF419216C41A903FD14EE5506DD0307EF973F@AUSX7MCPC103.AMER.DELL.COM>
References: <CAMRi9CeFWKHwZb69beN6XxtS9o5CDv=cvxkPCJzsm+UPTiLHAw@mail.gmail.com>
In-Reply-To: <CAMRi9CeFWKHwZb69beN6XxtS9o5CDv=cvxkPCJzsm+UPTiLHAw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_09787EF419216C41A903FD14EE5506DD0307EF973FAUSX7MCPC103A_"
MIME-Version: 1.0
Cc: ds_kwon@ensec.re.kr, jhpark@ensec.re.kr, jklee@ensec.re.kr
Subject: Re: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Sep 2011 10:50:35 -0000

Should this be added to IPSec?  It's not clear to me that proliferation of ciphers is helpful.  A small set of very well vetted ciphers is better than a larger set that add others without a strong track record.

                paul

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Woo-Hwan Kim
Sent: Thursday, September 15, 2011 4:24 AM
To: ipsec@ietf.org
Cc: Daesung Kwon; Jungkeon Lee; Je Hong Park
Subject: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec

IPsec experts,

Let me make a request for review
on the draft "The ARIA Cipher Algorithm and Its Use with IPsec".

Any comments would be appreciated.

http://tools.ietf.org/html/draft-nsri-ipsecme-aria-ipsec-00

---------- Forwarded message ----------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: 2011/9/15
Subject: New Version Notification for draft-nsri-ipsecme-aria-ipsec-00.txt
To: whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr>
Cc: ds_kwon@ensec.re.kr<mailto:ds_kwon@ensec.re.kr>, whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr>, jhpark@ensec.re.kr<mailto:jhpark@ensec.re.kr>, jklee@ensec.re.kr<mailto:jklee@ensec.re.kr>


A new version of I-D, draft-nsri-ipsecme-aria-ipsec-00.txt has been successfully submitted by Woo-Hwan Kim and posted to the IETF repository.

Filename:        draft-nsri-ipsecme-aria-ipsec
Revision:        00
Title:           The ARIA Cipher Algorithm and Its Use with IPsec
Creation date:   2011-09-15
WG ID:           Individual Submission
Number of pages: 10

Abstract:
  This document describes the use of the ARIA block cipher algorithm in
  conjunction with several different modes of operation within IKE and
  IPsec.  It describes the use of ARIA in CBC, CTR, GCM and CCM modes
  to encrypt and/or authenticate IKE and ESP traffic.  It also
  describes the use of ARIA in XCBC, CMAC, and GMAC modes to
  authenticate IKE, ESP and AH traffic.  The use of ARIA in XCBC and
  CMAC modes for pseudorandom functions is also included.




The IETF Secretariat