Internet DRAFT - draft-katagi-ipsecme-clefia
draft-katagi-ipsecme-clefia
Network Working Group M. Katagi
Internet-Draft Sony Corporation
Intended status: Informational April 24, 2012
Expires: October 26, 2012
The CLEFIA Cipher Algorithm and Its Use with IPsec
draft-katagi-ipsecme-clefia-01
Abstract
This document describes the use of the CLEFIA block cipher algorithm
in conjunction with several different modes of operation within IKE
and IPsec.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 26, 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Katagi Expires October 26, 2012 [Page 1]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. CLEFIA . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Modes of Operation . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Encryption . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2. Message Authentication Codes (MACs) . . . . . . . . . . . 4
2.3. Authenticated Encryption . . . . . . . . . . . . . . . . . 4
2.4. Pseudo Random Functions (PRFs) . . . . . . . . . . . . . . 5
3. IKEv1 Conventions . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Phase 1 Identifier . . . . . . . . . . . . . . . . . . . . 6
3.2. Phase 2 Identifier . . . . . . . . . . . . . . . . . . . . 6
4. IKEv2 Conventions . . . . . . . . . . . . . . . . . . . . . . 7
4.1. Transform Type 1 . . . . . . . . . . . . . . . . . . . . . 7
4.2. Transform Type 2 . . . . . . . . . . . . . . . . . . . . . 7
4.3. Transform Type 3 . . . . . . . . . . . . . . . . . . . . . 7
5. Security Considerations . . . . . . . . . . . . . . . . . . . 8
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
7.1. Normative References . . . . . . . . . . . . . . . . . . . 11
7.2. Informative References . . . . . . . . . . . . . . . . . . 12
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 14
Katagi Expires October 26, 2012 [Page 2]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
1. Introduction
This document describes the use of the CLEFIA block cipher algorithm
[RFC6114] in conjunction with several different modes of operation
within IKEv1 [RFC2409], IKEv2 [RFC5996], IPsec-v2 ([RFC2401],
[RFC2402], [RFC2406]), and IPsec-v3 ([RFC4301], [RFC4302],
[RFC4303]).
1.1. CLEFIA
CLEFIA is a 128-bit blockcipher algorithm, with key lengths of 128,
192, and 256 bits. The algorithm of CLEFIA was published in 2007
[FSE07]. Since AES was designed, cryptographic technologies have
been advancing: new techniques on attack, design and implementation
are extensively studied. CLEFIA is designed based on the state-of-
the-art techniques on design and analysis of block ciphers. The
security of CLEFIA has been scrutinized in the public community, and
no security weaknesses have been reported so far.
CLEFIA is a general purpose blockcipher, and offers high performance
in software and hardware. Especially, CLEFIA has an advantage in
efficient hardware implementation over AES, Camellia, and SEED, which
can be used in IPsec. Its gate efficiency, which is defined as the
ratio of speed to gate size, is superior to these ciphers [ISCAS08].
CLEFIA is standardized in ISO/IEC 29192-2 [ISO29192-2]. ISO/IEC
29192 is a standardization project of "LightWeight Cryptography
(LWC)", which is a cryptographic algorithm or protocol tailored for
implementation in constrained environments including RFID tags,
sensors, contactless smart cards and so on. LWC contributes to the
security of the constrained devices connecting with IP. CLEFIA is
also proposed in the CRYPTREC project for the revision of the
e-Government recommended ciphers list in Japan [CRYPTREC].
The algorithm specification is described in RFC6114 [RFC6114].
Further information about CLEFIA, which includes design rationale,
security evaluations, implementation results, and a reference code,
is available from [CLEFIAWEB].
Katagi Expires October 26, 2012 [Page 3]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
2. Modes of Operation
CLEFIA is a 128-bit blockcipher algorithm, with key lengths of 128,
192, and 256 bits. CLEFIA has a common interface with the Advanced
Encryption Standard (AES) [FIPS-197] in terms of a block size and key
lengths. Therefore, CLEFIA modes of operation are easily defined by
replacing AES in modes of operation previously defined within IPsec/
IKE without any limitation. The only difference is that the
underlying encryption primitive is CLEFIA instead of AES.
2.1. Encryption
CBC mode and Counter mode are encryption modes that are based on a
block cipher algorithm.
The use of CLEFIA in CBC mode (CLEFIA-CBC) and Counter mode (CLEFIA-
CTR) for ESP is defined in the same manner as AES-CBC [RFC3602] and
AES-CTR [RFC3686].
The use of CLEFIA-CBC for IKEv1 and IKEv2 is also defined in the same
manner as [RFC3602] and [RFC5996], respectively. The use of CLEFIA-
CTR for IKEv2 is defined in the same manner as [RFC5930].
2.2. Message Authentication Codes (MACs)
Cipher-based Message Authentication Code (CMAC) and Galois Message
Authentication Code (GMAC) are message authentication codes that are
based on a block cipher algorithm. CMAC and GMAC provide integrity
protection of message.
The use of CLEFIA in CMAC mode (CLEFIA-CMAC) and GMAC mode (CLEFIA-
GMAC) for ESP is defined in the same manner as AES-CMAC [RFC4494] and
AES-GMAC [RFC4543]. The key size supported in CLEFIA-CMAC is 128
bits. CLEFIA-CMAC-96 is the CLEFIA-CMAC with 96-bit truncated output
[RFC4494]. The key sizes supported in CLEFIA-GMAC are 128 bits, 192
bits, and 256 bits.
2.3. Authenticated Encryption
CCM mode and Galois/Counter mode are authenticated encryption modes
that are based on a block cipher algorithm.
The use of CLEFIA in CCM mode (CLEFIA-CCM) and Galois/Counter mode
(CLEFIA-GCM) for ESP is defined in the same manner as AES-CCM
[RFC4309] and AES-GCM [RFC4106]. The use of CLEFIA-CCM and CLEFIA-
GCM for IKEv2 is defined in the same manner as [RFC5282].
Based on [RFC4309], the size of integrity check value (ICV) in
Katagi Expires October 26, 2012 [Page 4]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
CLEFIA-CCM also supports 8 octets, 12 octets, and 16 octets. In the
similar way, the size of ICV in CLEFIA-GCM supports 8 octets, 12
octets, and 16 octets.
2.4. Pseudo Random Functions (PRFs)
IKEv2 uses pseudo-random functions (PRFs) to generate the secret keys
that are used in IKE SAs and IPsec SAs.
In the same manner as AES-CMAC-PRF-128 [RFC4615], CLEFIA-CMAC-PRF-128
is identical to CLEFIA-CMAC defined in Section 2.2 except that the
128-bit key length restriction is removed.
Katagi Expires October 26, 2012 [Page 5]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
3. IKEv1 Conventions
As mentioned in Section 2, CLEFIA has a common interface with AES.
Identifiers in Phase 1 and Phase 2 are defined in Section 6.
3.1. Phase 1 Identifier
For IKE phase 1 negotiations, IANA is requested to assign an
Encryption Algorithm Identifier for CLEFIA-CBC. The assigned
identifier is shown in Section 6.
3.2. Phase 2 Identifier
For IKE phase 2 negotiations, IANA is requested to assign nine IPsec
ESP Transform Identifiers for CLEFIA-CBC, CLEFIA-CTR, CLEFIA-CCM, and
CLEFIA-GCM and three identifiers for CLEFIA-GMAC in the
Authentication Algorithms registry. The assigned identifiers are
shown in Section 6.
Katagi Expires October 26, 2012 [Page 6]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
4. IKEv2 Conventions
As mentioned in Section 2, CLEFIA has a common interface with AES.
Identifiers in IKEv2 Transform Types are defined in Section 6.
4.1. Transform Type 1
For IKEv2 negotiations, IANA is requested to assign Transform Type 1
identifiers for CLEFIA-CBC, CLEFIA-CTR, CLEFIA-CCM, and CLEFIA-GCM.
The assigned identifiers are shown in Section 6.
4.2. Transform Type 2
For IKEv2 negotiations, IANA is requested to assign Transform Type 2
identifiers for CLEFIA-CMAC. The assigned identifier is shown in
Section 6.
4.3. Transform Type 3
For IKEv2 negotiations, IANA is requested to assign Transform Type 3
identifiers for CLEFIA-CMAC and CLEFIA-GMAC. The assigned
identifiers are shown in Section 6.
Katagi Expires October 26, 2012 [Page 7]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
5. Security Considerations
The security of CLEFIA algorithm has been scrutinized in the public
community since the algorithm was proposed, and no security
weaknesses have been reported so far.
For other security considerations, please refer to the security
considerations in previous RFCs ([RFC3602], [RFC3686], [RFC4106],
[RFC4309], [RFC4494], [RFC4543], [RFC5930], and [RFC5996]). These
apply to this document as well.
Katagi Expires October 26, 2012 [Page 8]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
6. IANA Considerations
IANA is requested to allocate the Encryption Algorithm Class Values
(Value 1) in the "Internet Key Exchange (IKE) attributes" registry:
Number Name
<TBD1> CLEFIA-CBC
IANA is also requested to allocate the following values in the
"Internet Security Association and Key Management Protocol (ISAKMP)
Identifiers" registry:
IPsec ESP Transform Identifiers
Number Name
<TBD1> ESP_CLEFIA-CBC
<TBD2> ESP_CLEFIA-CTR
<TBD3> ESP_CLEFIA-CCM_8
<TBD4> ESP_CLEFIA-CCM_12
<TBD5> ESP_CLEFIA-CCM_16
<TBD6> ESP_CLEFIA-GCM_8
<TBD7> ESP_CLEFIA-GCM_12
<TBD8> ESP_CLEFIA-GCM_16
<TBD9> ESP_NULL_AUTH_CLEFIA-GMAC
Authentication Algorithms sub-registry
Number Name
<TBD1> CLEFIA-128-GMAC
<TBD2> CLEFIA-192-GMAC
<TBD3> CLEFIA-256-GMAC
IANA is also requested to allocate the following values in the
"Internet Key Exchange Version 2 (IKEv2) Parameters" registry:
Transform Type 1 - Encryption Algorithm Transform IDs
Number Name
<TBD1> ENCR_CLEFIA_CBC
<TBD2> ENCR_CLEFIA_CTR
<TBD3> ENCR_CLEFIA_CCM_8
<TBD4> ENCR_CLEFIA_CCM_12
<TBD5> ENCR_CLEFIA_CCM_16
<TBD6> ENCR_CLEFIA_GCM_8
<TBD7> ENCR_CLEFIA_GCM_12
<TBD8> ENCR_CLEFIA_GCM_16
<TBD9> ENCR_NULL_AUTH_CLEFIA_GMAC
Katagi Expires October 26, 2012 [Page 9]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
Transform Type 2 - Pseudo-random Function Transform IDs
Number Name
<TBD1> PRF_CLEFIA128_CMAC
Transform Type 3 - Integrity Algorithm Transform IDs
Number Name
<TBD1> AUTH_CLEFIA_128_CMAC_96
<TBD2> AUTH_CLEFIA_128_GMAC
<TBD3> AUTH_CLEFIA_192_GMAC
<TBD4> AUTH_CLEFIA_256_GMAC
Katagi Expires October 26, 2012 [Page 10]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
7. References
7.1. Normative References
[RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998.
[RFC2402] Kent, S. and R. Atkinson, "IP Authentication Header",
RFC 2402, November 1998.
[RFC2406] Kent, S. and R. Atkinson, "IP Encapsulating Security
Payload (ESP)", RFC 2406, November 1998.
[RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
(IKE)", RFC 2409, November 1998.
[RFC3602] Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher
Algorithm and Its Use with IPsec", RFC 3602,
September 2003.
[RFC3686] Housley, R., "Using Advanced Encryption Standard (AES)
Counter Mode With IPsec Encapsulating Security Payload
(ESP)", RFC 3686, January 2004.
[RFC4106] Viega, J. and D. McGrew, "The Use of Galois/Counter Mode
(GCM) in IPsec Encapsulating Security Payload (ESP)",
RFC 4106, June 2005.
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301, December 2005.
[RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
December 2005.
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",
RFC 4303, December 2005.
[RFC4309] Housley, R., "Using Advanced Encryption Standard (AES) CCM
Mode with IPsec Encapsulating Security Payload (ESP)",
RFC 4309, December 2005.
[RFC4494] Song, JH., Poovendran, R., and J. Lee, "The AES-CMAC-96
Algorithm and Its Use with IPsec", RFC 4494, June 2006.
[RFC4543] McGrew, D. and J. Viega, "The Use of Galois Message
Authentication Code (GMAC) in IPsec ESP and AH", RFC 4543,
May 2006.
Katagi Expires October 26, 2012 [Page 11]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
[RFC4615] Song, J., Poovendran, R., Lee, J., and T. Iwata, "The
Advanced Encryption Standard-Cipher-based Message
Authentication Code-Pseudo-Random Function-128 (AES-CMAC-
PRF-128) Algorithm for the Internet Key Exchange Protocol
(IKE)", RFC 4615, August 2006.
[RFC5282] Black, D. and D. McGrew, "Using Authenticated Encryption
Algorithms with the Encrypted Payload of the Internet Key
Exchange version 2 (IKEv2) Protocol", RFC 5282,
August 2008.
[RFC5930] Shen, S., Mao, Y., and NSS. Murthy, "Using Advanced
Encryption Standard Counter Mode (AES-CTR) with the
Internet Key Exchange version 02 (IKEv2) Protocol",
RFC 5930, July 2010.
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
"Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 5996, September 2010.
[RFC6114] Katagi, M. and S. Moriai, "The 128-Bit Blockcipher
CLEFIA", RFC 6114, March 2011.
7.2. Informative References
[CLEFIAWEB]
Sony Corporation, "The 128-bit blockcipher CLEFIA",
<http://www.sony.net/clefia>.
[CRYPTREC]
Cryptography Research and Evaluation Committees, "the
revision of the e-Government Recommended Ciphers List",
<http://www.cryptrec.go.jp/>.
[FIPS-197]
National Institute of Standards and Technology, "Advanced
Encryption Standard (AES)", FIPS PUB 197, November 2001, <
http://csrc.nist.gov/publications/fips/fips197/
fips-197.pdf>.
[FSE07] Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and
T. Iwata, "The 128-bit Blockcipher CLEFIA", proceedings of
Fast Software Encryption 2007 - FSE 2007,
LNCS4593, pp.181-195, Springer-Verlag, 2007.
[ISCAS08] Sugawara, T., Homma, N., Aoki, T., and A. Satoh, "High-
performance ASIC implementations of the 128-bit block
cipher CLEFIA", ISCAS 2008, pp.2925-2928, IEEE, 2008.
Katagi Expires October 26, 2012 [Page 12]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
[ISO29192-2]
ISO/IEC 29192-2, "Information technology - Security
techniques - Lightweight cryptography - Part 2: Block
ciphers", <http://www.iso.org/iso/iso_catalogue/
catalogue_tc/catalogue_detail.htm?csnumber=56552>.
Katagi Expires October 26, 2012 [Page 13]
Internet-Draft CLEFIA Cipher Algorithm Use with IPsec April 2012
Author's Address
Masanobu Katagi
Sony Corporation
Phone: +81-3-5448-3701
Fax: +81-3-5448-6438
Email: Masanobu.Katagi@jp.sony.com
Katagi Expires October 26, 2012 [Page 14]