How will we specify AES key lengths?

Paul Hoffman / VPNC <paul.hoffman@vpnc.org> Fri, 23 May 2003 21:45 UTC

Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27070 for <ipsec-archive@lists.ietf.org>; Fri, 23 May 2003 17:45:07 -0400 (EDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id PAA12818 Fri, 23 May 2003 15:23:54 -0400 (EDT)
Mime-Version: 1.0
X-Sender: phoffvpnc@mail.vpnc.org
Message-Id: <p0521060ebaf3c05a06c1@[67.31.4.113]>
In-Reply-To: <003201c31d1f$b825c2e0$292e1dc2@YnirNew>
References: <003201c31d1f$b825c2e0$292e1dc2@YnirNew>
X-Habeas-SWE-1: winter into spring
X-Habeas-SWE-2: brightly anticipated
X-Habeas-SWE-3: like Habeas SWE (tm)
X-Habeas-SWE-4: Copyright 2002 Habeas (tm)
X-Habeas-SWE-5: Sender Warranted Email (SWE) (tm). The sender of this
X-Habeas-SWE-6: email in exchange for a license for this Habeas
X-Habeas-SWE-7: warrant mark warrants that this is a Habeas Compliant
X-Habeas-SWE-8: Message (HCM) and not spam. Please report use of this
X-Habeas-SWE-9: mark in spam to <http://www.habeas.com/report>.
Date: Fri, 23 May 2003 05:35:31 -0700
To: ipsec@lists.tislabs.com
From: Paul Hoffman / VPNC <paul.hoffman@vpnc.org>
Subject: How will we specify AES key lengths?
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk

At 11:27 AM +0200 5/18/03, Yoav Nir wrote:
>Sorry I didn't ask about this earlier.  With some vendors already offering
>AES with larger keys (192- and 256-bit), why aren't there numbers assigned
>for these transforms (section 2.1)

Thank you for highlighting a problem that the WG doesn't seem to have 
noticed before now. The WG needs to decide how to specify the key 
length for AES. We now have WG documents that do this in two 
different ways: with the Key Length attribute in IKEv1 and IKEv2, or 
with a different identifier for each of the three key lengths.

draft-ietf-ipsec-ciph-aes-cbc-05.txt for AES in CBC mode says:

    5.3 Key Length Attribute

    Since the AES allows variable key lengths, the Key Length attribute
    MUST be specified in both a Phase 1 exchange [IKE] and a Phase 2
    exchange [DOI].

draft-ietf-ipsec-ciph-aes-ctr-03.txt for AES in CTR mode says:

    9. IANA Considerations

    IANA has assigned three ESP transform numbers for use with AES-CTR
    with an explicit IV, one for each AES key size:

       <TBD1> for AES-CTR with a 128 bit key;
       <TBD2> for AES-CTR with a 192 bit key; and
       <TBD3> for AES-CTR with a 256 bit key.

I propose that the WG standardize on one method. Given that there are 
a fair number of deployed implementations of 
draft-ietf-ipsec-ciph-aes-cbc but few or none of 
draft-ietf-ipsec-ciph-aes-ctr, it seems like 
draft-ietf-ipsec-ciph-aes-ctr should be changed to use the method 
that has already been deployed.

Thoughts?

--Paul Hoffman, Director
--VPN Consortium