[IPsec] Fwd: RFC 5903 on Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2

Paul Hoffman <paul.hoffman@vpnc.org> Sat, 12 June 2010 00:27 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3D3193A67A1 for <ipsec@core3.amsl.com>; Fri, 11 Jun 2010 17:27:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.628
X-Spam-Level:
X-Spam-Status: No, score=0.628 tagged_above=-999 required=5 tests=[AWL=0.074, BAYES_50=0.001, HELO_MISMATCH_COM=0.553]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XLNYMLxI-shH for <ipsec@core3.amsl.com>; Fri, 11 Jun 2010 17:27:50 -0700 (PDT)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 6049E3A679C for <ipsec@ietf.org>; Fri, 11 Jun 2010 17:27:50 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id o5C0RptX086242 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Fri, 11 Jun 2010 17:27:52 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p062408c2c83884eb0ed1@[10.20.30.158]>
Date: Fri, 11 Jun 2010 17:27:49 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: [IPsec] Fwd: RFC 5903 on Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Jun 2010 00:27:52 -0000

>A new Request for Comments is now available in online RFC libraries.
>
>       
>        RFC 5903
>
>        Title:      Elliptic Curve Groups modulo a
>                    Prime (ECP Groups) for IKE and
>                    IKEv2
>        Author:     D. Fu, J. Solinas
>        Status:     Informational
>        Stream:     IETF
>        Date:       June 2010
>        Mailbox:    defu@orion.ncsc.mil,
>                    jasolin@orion.ncsc.mil
>        Pages:      16
>        Characters: 29175
>        Obsoletes:  RFC4753
>
>        I-D Tag:    draft-solinas-rfc4753bis-01.txt
>
>        URL:        http://www.rfc-editor.org/rfc/rfc5903.txt
>
>This document describes three Elliptic Curve Cryptography (ECC) groups
>for use in the Internet Key Exchange (IKE) and Internet Key Exchange
>version 2 (IKEv2) protocols in addition to previously defined groups.
>These groups are based on modular arithmetic rather than binary
>arithmetic.  These groups are defined to align IKE and IKEv2 with
>other ECC implementations and standards, particularly NIST standards.
>In addition, the curves defined here can provide more efficient
>implementation than previously defined ECC groups.  This document
>obsoletes RFC 4753.  This document is not an Internet Standards Track
>specification; it is published for informational purposes.
>
>
>INFORMATIONAL: This memo provides information for the Internet community.
>It does not specify an Internet standard of any kind. Distribution of
>this memo is unlimited.