draft-ietf-avtcore-aria-sdes-01.txt   draft-ietf-avtcore-aria-sdes-02.txt 
AVTCore W. Kim AVTCore W. Kim
Internet-Draft J. Lee Internet-Draft J. Lee
Intended status: Standards Track J. Park Intended status: Standards Track J. Park
Expires: May 29, 2016 D. Kwon Expires: May 17, 2017 D. Kwon
NSRI NSRI
November 26, 2015 D. Kim
Kookmin Univ.
November 13, 2016
The Addition of SRTP crypto suites based on the ARIA algorithms to the The Addition of SRTP crypto suites based on the ARIA algorithms to the
SDP Security Descritpions SDP Security Descriptions
draft-ietf-avtcore-aria-sdes-01 draft-ietf-avtcore-aria-sdes-02
Abstract Abstract
This document defines SRTP crypto suites based on the ARIA block This document defines SRTP crypto suites based on the ARIA block
cipher algorithm for use with the Session Descritpion Protocol (SDP) cipher algorithm for use with the Session Description Protocol (SDP)
security descriptions. security descriptions.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 29, 2016. This Internet-Draft will expire on May 17, 2017.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 2, line 41 skipping to change at page 2, line 42
rounds, depending on the key size. It is secure and suitable for rounds, depending on the key size. It is secure and suitable for
most software and hardware implementations on 32-bit and 8-bit most software and hardware implementations on 32-bit and 8-bit
processors. It was established as a Korean standard block cipher processors. It was established as a Korean standard block cipher
algorithm in 2004 [ARIAKS] and has been widely used in Korea, algorithm in 2004 [ARIAKS] and has been widely used in Korea,
especially for government-to-public services. It was included in especially for government-to-public services. It was included in
PKCS #11 in 2007 [ARIAPKCS]. The algorithm specification and object PKCS #11 in 2007 [ARIAPKCS]. The algorithm specification and object
identifiers are described in [RFC5794]. identifiers are described in [RFC5794].
1.2. SRTP Crypto Suites 1.2. SRTP Crypto Suites
The transforms based on ARIA and the correspoding SRTP protection The transforms based on ARIA and the corresponding SRTP protection
profiles for DTLS-SRTP are defined in [I-D.ietf-avtcore-aria-srtp]. profiles for DTLS-SRTP are defined in [I-D.ietf-avtcore-aria-srtp].
The SDP Security Descriptions [RFC4568] crypto suites corresponding The SDP Security Descriptions [RFC4568] crypto suites corresponding
to ARIA transforms [I-D.ietf-avtcore-aria-srtp] are sets as shown in to ARIA transforms [I-D.ietf-avtcore-aria-srtp] are sets as shown in
Table 1. Table 1.
+---------------------------+-----------------+------------------+ +---------------------------+-----------------+------------------+
| Name | Enc. Key Length | Auth. Tag Length | | Name | Enc. Key Length | Auth. Tag Length |
+---------------------------+-----------------+------------------+ +---------------------------+-----------------+------------------+
| ARIA_128_CTR_HMAC_SHA1_80 | 16 octets | 10 octets | | ARIA_128_CTR_HMAC_SHA1_80 | 16 octets | 10 octets |
| ARIA_128_CTR_HMAC_SHA1_32 | 16 octets | 4 octets | | ARIA_128_CTR_HMAC_SHA1_32 | 16 octets | 4 octets |
skipping to change at page 7, line 31 skipping to change at page 7, line 31
"AEAD_ARIA_256_GCM" / "AEAD_ARIA_256_GCM" /
srtp-crypto-suite-ext srtp-crypto-suite-ext
4. References 4. References
4.1. Normative References 4.1. Normative References
[I-D.ietf-avtcore-aria-srtp] [I-D.ietf-avtcore-aria-srtp]
Kim, W., Lee, J., Park, J., and D. Kwon, "The ARIA Kim, W., Lee, J., Park, J., and D. Kwon, "The ARIA
Algorithm and Its Use with the Secure Real-time Transport Algorithm and Its Use with the Secure Real-time Transport
Protocol(SRTP)", draft-ietf-avtcore-aria-srtp-08 (work in Protocol(SRTP)", draft-ietf-avtcore-aria-srtp-09 (work in
progress), May 2015. progress), November 2015.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>. <http://www.rfc-editor.org/info/rfc2119>.
[RFC4568] Andreasen, F., Baugher, M., and D. Wing, "Session [RFC4568] Andreasen, F., Baugher, M., and D. Wing, "Session
Description Protocol (SDP) Security Descriptions for Media Description Protocol (SDP) Security Descriptions for Media
Streams", RFC 4568, DOI 10.17487/RFC4568, July 2006, Streams", RFC 4568, DOI 10.17487/RFC4568, July 2006,
<http://www.rfc-editor.org/info/rfc4568>. <http://www.rfc-editor.org/info/rfc4568>.
skipping to change at page 8, line 15 skipping to change at page 8, line 15
[RFC5794] Lee, J., Lee, J., Kim, J., Kwon, D., and C. Kim, "A [RFC5794] Lee, J., Lee, J., Kim, J., Kwon, D., and C. Kim, "A
Description of the ARIA Encryption Algorithm", RFC 5794, Description of the ARIA Encryption Algorithm", RFC 5794,
DOI 10.17487/RFC5794, March 2010, DOI 10.17487/RFC5794, March 2010,
<http://www.rfc-editor.org/info/rfc5794>. <http://www.rfc-editor.org/info/rfc5794>.
Authors' Addresses Authors' Addresses
Woo-Hwan Kim Woo-Hwan Kim
National Security Research Institute National Security Research Institute
P.O.Box 1, Yuseong P.O.Box 1, Yuseong
Daejeon 305-350 Daejeon 34188
Korea Korea
EMail: whkim5@ensec.re.kr EMail: whkim5@nsr.re.kr
Jungkeun Lee Jungkeun Lee
National Security Research Institute National Security Research Institute
P.O.Box 1, Yuseong P.O.Box 1, Yuseong
Daejeon 305-350 Daejeon 34188
Korea Korea
EMail: jklee@ensec.re.kr EMail: jklee@nsr.re.kr
Je-Hong Park Je Hong Park
National Security Research Institute National Security Research Institute
P.O.Box 1, Yuseong P.O.Box 1, Yuseong
Daejeon 305-350 Daejeon 34188
Korea Korea
EMail: jhpark@ensec.re.kr EMail: jhpark@nsr.re.kr
Daesung Kwon Daesung Kwon
National Security Research Institute National Security Research Institute
P.O.Box 1, Yuseong P.O.Box 1, Yuseong
Daejeon 305-350 Daejeon 34188
Korea Korea
EMail: ds_kwon@ensec.re.kr EMail: ds_kwon@nsr.re.kr
Dong-Chan Kim
Kookmin University
77 Jeongneung-ro, Seongbuk-gu
Seoul 02707
Korea
EMail: dckim@kookmin.ac.kr
 End of changes. 17 change blocks. 
18 lines changed or deleted 20 lines changed or added

This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/