[IPsec] Fwd: RFC 5903 on Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2
Paul Hoffman <paul.hoffman@vpnc.org> Sat, 12 June 2010 00:27 UTC
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3D3193A67A1 for <ipsec@core3.amsl.com>; Fri, 11 Jun 2010 17:27:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.628
X-Spam-Level:
X-Spam-Status: No, score=0.628 tagged_above=-999 required=5 tests=[AWL=0.074, BAYES_50=0.001, HELO_MISMATCH_COM=0.553]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XLNYMLxI-shH for <ipsec@core3.amsl.com>; Fri, 11 Jun 2010 17:27:50 -0700 (PDT)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 6049E3A679C for <ipsec@ietf.org>; Fri, 11 Jun 2010 17:27:50 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id o5C0RptX086242 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Fri, 11 Jun 2010 17:27:52 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p062408c2c83884eb0ed1@[10.20.30.158]>
Date: Fri, 11 Jun 2010 17:27:49 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: [IPsec] Fwd: RFC 5903 on Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Jun 2010 00:27:52 -0000
>A new Request for Comments is now available in online RFC libraries. > > > RFC 5903 > > Title: Elliptic Curve Groups modulo a > Prime (ECP Groups) for IKE and > IKEv2 > Author: D. Fu, J. Solinas > Status: Informational > Stream: IETF > Date: June 2010 > Mailbox: defu@orion.ncsc.mil, > jasolin@orion.ncsc.mil > Pages: 16 > Characters: 29175 > Obsoletes: RFC4753 > > I-D Tag: draft-solinas-rfc4753bis-01.txt > > URL: http://www.rfc-editor.org/rfc/rfc5903.txt > >This document describes three Elliptic Curve Cryptography (ECC) groups >for use in the Internet Key Exchange (IKE) and Internet Key Exchange >version 2 (IKEv2) protocols in addition to previously defined groups. >These groups are based on modular arithmetic rather than binary >arithmetic. These groups are defined to align IKE and IKEv2 with >other ECC implementations and standards, particularly NIST standards. >In addition, the curves defined here can provide more efficient >implementation than previously defined ECC groups. This document >obsoletes RFC 4753. This document is not an Internet Standards Track >specification; it is published for informational purposes. > > >INFORMATIONAL: This memo provides information for the Internet community. >It does not specify an Internet standard of any kind. Distribution of >this memo is unlimited.
- [IPsec] Fwd: RFC 5903 on Elliptic Curve Groups mo… Paul Hoffman