The Internet Archive discovers and captures web pages through many different web crawls.
At any given time several distinct crawls are running, some for months, and some every day or longer.
View the web archive through the Wayback Machine.
TLS Working Group D. McGrew
Internet-Draft Cisco Systems
Intended status: Informational D. Bailey
Expires: January 13, 2014 RSA/EMC
M. Campagna
R. Dugal
Certicom Corp.
July 12, 2013
AES-CCM ECC Cipher Suites for TLS
draft-mcgrew-tls-aes-ccm-ecc-07
Abstract
This memo describes the use of the Advanced Encryption Standard (AES)
in the Counter and CBC-MAC Mode (CCM) of operation within Transport
Layer Security (TLS) to provide confidentiality and data origin
authentication. The AES-CCM algorithm is amenable to compact
implementations, making it suitable for constrained environments.
The ciphersuites defined in this document use Elliptic Curve
Cryptography (ECC), and are advantageous in networks with limited
bandwidth.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 13, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
McGrew, et al. Expires January 13, 2014 [Page 1]Internet-Draft AES-CCM ECC TLS July 2013
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions Used In This Document . . . . . . . . . . . . . 3
2. ECC based AES-CCM Cipher Suites . . . . . . . . . . . . . . . . 3
2.1. AEAD algorithms . . . . . . . . . . . . . . . . . . . . . . 5
2.2. Requirements on Curves and Hashes . . . . . . . . . . . . . 5
3. TLS Versions . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
6. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
6.1. Perfect Forward Secrecy . . . . . . . . . . . . . . . . . . 7
6.2. Counter Reuse . . . . . . . . . . . . . . . . . . . . . . . 7
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 7
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
8.1. Normative References . . . . . . . . . . . . . . . . . . . 7
8.2. Informative References . . . . . . . . . . . . . . . . . . 8
Appendix A. Recommended Curves and Algorithms . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 9
McGrew, et al. Expires January 13, 2014 [Page 2]Internet-Draft AES-CCM ECC TLS July 20131. Introduction
This document describes the use of Advanced Encryption Standard (AES)
[AES] in Counter with CBC-MAC Mode (CCM) [CCM] in several TLS
ciphersuites. AES-CCM provides both authentication and
confidentiality and uses as its only primitive the AES encrypt
operation (the AES decrypt operation is not needed). This makes it
amenable to compact implementations, which is advantageous in
constrained environments. Of course, adoption outside of constrained
environments is necessary to enable interoperability, such as that
between web clients and embedded servers, or between embedded clients