How will we specify AES key lengths?
Paul Hoffman / VPNC <paul.hoffman@vpnc.org> Fri, 23 May 2003 21:45 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27070 for <ipsec-archive@lists.ietf.org>; Fri, 23 May 2003 17:45:07 -0400 (EDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id PAA12818 Fri, 23 May 2003 15:23:54 -0400 (EDT)
Mime-Version: 1.0
X-Sender: phoffvpnc@mail.vpnc.org
Message-Id: <p0521060ebaf3c05a06c1@[67.31.4.113]>
In-Reply-To: <003201c31d1f$b825c2e0$292e1dc2@YnirNew>
References: <003201c31d1f$b825c2e0$292e1dc2@YnirNew>
X-Habeas-SWE-1: winter into spring
X-Habeas-SWE-2: brightly anticipated
X-Habeas-SWE-3: like Habeas SWE (tm)
X-Habeas-SWE-4: Copyright 2002 Habeas (tm)
X-Habeas-SWE-5: Sender Warranted Email (SWE) (tm). The sender of this
X-Habeas-SWE-6: email in exchange for a license for this Habeas
X-Habeas-SWE-7: warrant mark warrants that this is a Habeas Compliant
X-Habeas-SWE-8: Message (HCM) and not spam. Please report use of this
X-Habeas-SWE-9: mark in spam to <http://www.habeas.com/report>.
Date: Fri, 23 May 2003 05:35:31 -0700
To: ipsec@lists.tislabs.com
From: Paul Hoffman / VPNC <paul.hoffman@vpnc.org>
Subject: How will we specify AES key lengths?
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
At 11:27 AM +0200 5/18/03, Yoav Nir wrote: >Sorry I didn't ask about this earlier. With some vendors already offering >AES with larger keys (192- and 256-bit), why aren't there numbers assigned >for these transforms (section 2.1) Thank you for highlighting a problem that the WG doesn't seem to have noticed before now. The WG needs to decide how to specify the key length for AES. We now have WG documents that do this in two different ways: with the Key Length attribute in IKEv1 and IKEv2, or with a different identifier for each of the three key lengths. draft-ietf-ipsec-ciph-aes-cbc-05.txt for AES in CBC mode says: 5.3 Key Length Attribute Since the AES allows variable key lengths, the Key Length attribute MUST be specified in both a Phase 1 exchange [IKE] and a Phase 2 exchange [DOI]. draft-ietf-ipsec-ciph-aes-ctr-03.txt for AES in CTR mode says: 9. IANA Considerations IANA has assigned three ESP transform numbers for use with AES-CTR with an explicit IV, one for each AES key size: <TBD1> for AES-CTR with a 128 bit key; <TBD2> for AES-CTR with a 192 bit key; and <TBD3> for AES-CTR with a 256 bit key. I propose that the WG standardize on one method. Given that there are a fair number of deployed implementations of draft-ietf-ipsec-ciph-aes-cbc but few or none of draft-ietf-ipsec-ciph-aes-ctr, it seems like draft-ietf-ipsec-ciph-aes-ctr should be changed to use the method that has already been deployed. Thoughts? --Paul Hoffman, Director --VPN Consortium
- RE: feedback on algorithms-00 Gregory Lebovitz
- More on algorithms for IKEv2 Paul Hoffman / VPNC
- RE: More on algorithms for IKEv2 Yoav Nir
- How will we specify AES key lengths? Paul Hoffman / VPNC