[smime] New ID of possible interest

"Herzog, Jonathan - 0668 - MITLL" <jherzog@ll.mit.edu> Thu, 21 April 2011 14:09 UTC

Return-Path: <prvs=30927f3b01=jherzog@ll.mit.edu>
X-Original-To: smime@ietfc.amsl.com
Delivered-To: smime@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 26064E06F7 for <smime@ietfc.amsl.com>; Thu, 21 Apr 2011 07:09:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.222
X-Spam-Level:
X-Spam-Status: No, score=-6.222 tagged_above=-999 required=5 tests=[AWL=-0.375, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_OBFU_ALL=0.751, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id neYkzOUWBfeH for <smime@ietfc.amsl.com>; Thu, 21 Apr 2011 07:09:25 -0700 (PDT)
Received: from mx2.ll.mit.edu (MX2.LL.MIT.EDU [129.55.12.46]) by ietfc.amsl.com (Postfix) with ESMTP id 6D8A9E0655 for <smime@ietf.org>; Thu, 21 Apr 2011 07:09:25 -0700 (PDT)
Received: from LLE2K7-HUB01.mitll.ad.local (LLE2K7-HUB01.mitll.ad.local) by mx2.ll.mit.edu (unknown) with ESMTP id p3LE9MLk002550; Thu, 21 Apr 2011 10:09:23 -0400
From: "Herzog, Jonathan - 0668 - MITLL" <jherzog@ll.mit.edu>
To: "smime@ietf.org" <smime@ietf.org>
Date: Thu, 21 Apr 2011 10:09:21 -0400
Thread-Topic: New ID of possible interest
Thread-Index: AcwALbZ5D0jQmrsvRUK501eSSz3YpA==
Message-ID: <A442A367-4DB0-4F9C-B794-5F4B7AC70089@ll.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/signed; boundary="Apple-Mail-19-817730673"; protocol="application/pkcs7-signature"; micalg="sha1"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2011-04-21_02:2011-04-21, 2011-04-21, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=7 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=6.0.2-1012030000 definitions=main-1104210062
Cc: "Khazan, Roger - 0668 - MITLL" <rkh@ll.mit.edu>, "draft-herzog-withmac-keywrap@tools.ietf.org" <draft-herzog-withmac-keywrap@tools.ietf.org>
Subject: [smime] New ID of possible interest
X-BeenThere: smime@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SMIME Working Group <smime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/smime>, <mailto:smime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smime>
List-Post: <mailto:smime@ietf.org>
List-Help: <mailto:smime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smime>, <mailto:smime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2011 14:09:26 -0000

I would like to inform the SMIME working group of a newly-submitted
Internet Draft that may be of interest:


 The With-MAC key-wrapping algorithm for Cryptographic Message Syntax

  draft-herzog-withmac-keywrap-00

Abstract:

   This document describes a new key-wrapping algorithm to be used in
   the EnvelopedData, AuthenticatedData and AuthEnvelopedData structures
   of the Cryptographic Message Syntax.  Because these structures do not
   provide data-origin authentication, a recipient cannot
   cryptographically verify that the plaintext received was the
   plaintext encapsulated by the message's original sender.  The With-
   MAC key-wrapping algorithm allows an EncryptedKey value to hold both
   a wrapped symmetric key and a MAC value on the data to be
   authenticated.  When used in EnvelopedData, AuthenticatedData and
   AuthEnvelopedData structures, therefore, these structures can achieve
   data-origin authentication (in some circumstances) using only
   symmetric-key algorithms.


https://datatracker.ietf.org/doc/draft-herzog-withmac-keywrap/


A side note: this draft should probably be read in combination with our previous draft on static-static ECDH (https://datatracker.ietf.org/doc/draft-herzog-static-ecdh/). That draft described how a sender might use a certified ECDH key to create an EnvelopedData structure (for example). It is unclear, however, how such a sender could also provide data-origin authentication without using digital signatures. However, that requires a certified signature-capable key, something they may not have. This draft provides an alternate approach-- the sender provides a MAC value for each recipient.

We welcome all comments and reviews.

Thank you.

-- 
Jonathan Herzog							voice:  (781) 981-2356
Technical Staff							fax:    (781) 981-7687
Cyber Systems and Technology Group		email:  jherzog@ll.mit.edu
MIT Lincoln Laboratory               			www:    http://www.ll.mit.edu/CST/
244 Wood Street    
Lexington, MA 02420-9185