[MSEC] draft-cakulev-mikey-ibake-00

"Cakulev, Violeta (Violeta)" <cakulev@alcatel-lucent.com> Fri, 16 October 2009 15:18 UTC

Return-Path: <cakulev@alcatel-lucent.com>
X-Original-To: msec@core3.amsl.com
Delivered-To: msec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F27328C216 for <msec@core3.amsl.com>; Fri, 16 Oct 2009 08:18:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q90A6JhEVRuO for <msec@core3.amsl.com>; Fri, 16 Oct 2009 08:18:28 -0700 (PDT)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 83FBB3A685B for <msec@ietf.org>; Fri, 16 Oct 2009 08:18:28 -0700 (PDT)
Received: from ihrh1.emsr.lucent.com (h135-1-218-53.lucent.com [135.1.218.53]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id n9GFIVWx017330 for <msec@ietf.org>; Fri, 16 Oct 2009 10:18:31 -0500 (CDT)
Received: from USNAVSXCHHUB02.ndc.alcatel-lucent.com (usnavsxchhub02.ndc.alcatel-lucent.com [135.3.39.111]) by ihrh1.emsr.lucent.com (8.13.8/emsr) with ESMTP id n9GFIVCU020323 for <msec@ietf.org>; Fri, 16 Oct 2009 10:18:31 -0500 (CDT)
Received: from USNAVSXCHMBSA3.ndc.alcatel-lucent.com ([135.3.39.127]) by USNAVSXCHHUB02.ndc.alcatel-lucent.com ([135.3.39.111]) with mapi; Fri, 16 Oct 2009 10:18:31 -0500
From: "Cakulev, Violeta (Violeta)" <cakulev@alcatel-lucent.com>
To: "msec@ietf.org" <msec@ietf.org>
Date: Fri, 16 Oct 2009 10:18:30 -0500
Thread-Topic: draft-cakulev-mikey-ibake-00
Thread-Index: AcpNA8oqxN9jopXsSnyBqbllpSn+WQBbjeIw
Message-ID: <AAE76B481E7A0E4C96610790A852B9A624EE5897F4@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Subject: [MSEC] draft-cakulev-mikey-ibake-00
X-BeenThere: msec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multicast Security List <msec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/msec>, <mailto:msec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/msec>
List-Post: <mailto:msec@ietf.org>
List-Help: <mailto:msec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/msec>, <mailto:msec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Oct 2009 15:18:29 -0000

All,
I've uploaded a draft on a new mode of MIKEY that is based on Identity Based Authenticated Key Exchange framework.
Identity Based Authenticated Key Exchange (IBAKE) framework was presented in the last saag meeting.
This draft specifies the application of IBAKE for multimedia Internet keying.

All comments are highly appreciated.

Thanks,
-Violeta


A new version of I-D, draft-cakulev-mikey-ibake-00.txt has been successfuly submitted by Violeta Cakulev and posted to the IETF repository.

Filename:        draft-cakulev-mikey-ibake
Revision:        00
Title:           MIKEY-IBAKE: Identity-Based Mode of Key Distribution in Multimedia Internet KEYing (MIKEY)
Creation_date:   2009-10-14
WG ID:           Independent Submission
Number_of_pages: 33

Abstract:
This document describes a key management protocol variant for the multimedia Internet keying (MIKEY) protocol which relies on trusted key management service.  In particular, this variant utilizes Identity Based Authenticated Key Exchange framework which allows the participating clients to perform mutual authentication and derive a session key in an 'asymmetric identity based encryption' framework.
This framework, in addition to providing mutual authentication, eliminates the key escrow problem that is common in standard Identity Based Encryption while simultaneously providing perfect forward and backwards secrecy.



The IETF Secretariat.