Re: [smartpower-interest] Smart Grid Architecture Committee meeting 17 February

Zach Shelby <zach@sensinode.com> Mon, 22 February 2010 07:17 UTC

Return-Path: <zach@sensinode.com>
X-Original-To: smartpower-interest@core3.amsl.com
Delivered-To: smartpower-interest@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE44B28C25D for <smartpower-interest@core3.amsl.com>; Sun, 21 Feb 2010 23:17:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.445
X-Spam-Level:
X-Spam-Status: No, score=-3.445 tagged_above=-999 required=5 tests=[AWL=0.154, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6I3+G4EkodfU for <smartpower-interest@core3.amsl.com>; Sun, 21 Feb 2010 23:17:25 -0800 (PST)
Received: from auth-smtp.nebula.fi (auth-smtp.nebula.fi [217.30.180.105]) by core3.amsl.com (Postfix) with ESMTP id D435728C261 for <smartpower-interest@ietf.org>; Sun, 21 Feb 2010 23:17:24 -0800 (PST)
Received: from [192.168.1.3] (line-8578.dyn.kponet.fi [85.29.79.226]) (authenticated bits=0) by auth-smtp.nebula.fi (8.13.4/8.13.4) with ESMTP id o1M7JBe0031918 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 22 Feb 2010 09:19:12 +0200
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Zach Shelby <zach@sensinode.com>
In-Reply-To: <4B7ECA70.1060909@vigilsec.com>
Date: Mon, 22 Feb 2010 09:19:11 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <C4A6BB64-2DA3-40EA-A1AE-45CFDBEF112C@sensinode.com>
References: <55FA0F33-F37F-4429-92D0-9E99162BA496@cisco.com> <4B7ECA70.1060909@vigilsec.com>
To: Russ Housley <housley@vigilsec.com>
X-Mailer: Apple Mail (2.1077)
Cc: smartpower-interest@ietf.org
Subject: Re: [smartpower-interest] Smart Grid Architecture Committee meeting 17 February
X-BeenThere: smartpower-interest@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Smart Power Interest <smartpower-interest.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>, <mailto:smartpower-interest-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpower-interest>
List-Post: <mailto:smartpower-interest@ietf.org>
List-Help: <mailto:smartpower-interest-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>, <mailto:smartpower-interest-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2010 07:17:27 -0000

Hi,

On Feb 19, 2010, at 19:29 , Russ Housley wrote:

>> It would be nice if [...] the architecture could specify the use of "suite b
>> cryptographic standards". For those that don't know what that means, it
>> refers to the use of elliptic curve public key cryptography without the
>> IPR considerations that have crippled the industry's ability to use it.
> 
> Suite B is composed of algorithms that are publicly specified, and it is
> defined here: http://www.nsa.gov/ia/programs/suiteb_cryptography.
> 
> Suite B includes:
> 
> Encryption:  AES with 128- and 256-bit keys

Good to hear this. AES-128 is suitable for at least IEEE 802.15.4 based 6LoWPAN networks, as these radio chips include an AES-128 hardware engine which can often be accessed for general purposes as well. 

> 
> Key Exchange: Elliptic Curve One-Pass Diffie Hellman (called ECDH) using
> the curves with 256- and 384-bit prime moduli
> 
> Digital Signature: Elliptic Curve Digital Signature Algorithm (called
> ECDSA) using the curves with 256- and 384-bit prime moduli)
> 
> Hashing: SHA-256 and SHA-384
> 
> The smaller size in each of these choices seems quite reasonable for
> Smart Grid.
> 
> There are intellectual property issues with Elliptic Curve Cryptography
> (ECC), but McGrew seems to have found at least one way to implement
> these algorithms that avoids the known patents.  See:
> http://tools.ietf.org/html/draft-mcgrew-fundamental-ecc-01
> 
>> [...] The lack of a key management
>> infrastructure is a problem, which I would entertain useful proposals for.
> 
> As a starting point for this discussion, can we leverage the work done
> by CableLabs and the WiMAX Forum.  Devices that follow the
> specifications from these groups ship with an embedded private key and a
> certificate.  This is not the complete answer, but it allows anyone to
> authenticate the device.  At some point prior to installation, the
> device still needs to be told some things about the network that it will
> be connected.  This might be as simple as the insertion of some
> configuration data that includes a trust anchor to validate certificates
> from the utility.

This is also a big problem for constrained networks and device such as we see in 6LoWPAN (http://trac.tools.ietf.org/area/app/trac/wiki/6LowApp). Luckily, it is an important topic in a new proposed working group called Constrained RESTful Environments (CoRE) which includes work items related to security bootstrapping and cooperation with the security area on finding suitable security methods. This is being done in cooperation with ZigBee Smart Energy 2.0 which is IPv6 based. Here are a couple related early drafts for those interested:

http://tools.ietf.org/html/draft-struik-6lowapp-security-considerations
http://www.ietf.org/id/draft-oflynn-6lowapp-bootstrapping-00.txt

Zach


-- 
http://www.sensinode.com
http://zachshelby.org - My blog "On the Internet of Things"
http://6lowpan.net - New book - "6LoWPAN: The Wireless Embedded Internet"
Mobile: +358 40 7796297

Zach Shelby
Head of Research
Sensinode Ltd.
Kidekuja 2
88610 Vuokatti, FINLAND

This e-mail and all attached material are confidential and may contain legally privileged information. If you are not the intended recipient, please contact the sender and delete the e-mail from your system without producing, distributing or retaining copies thereof.