A set-key attribute for symmetric-key packages
draft-herzog-setkey-05

The information below is for an old version of the document
Document Type Active Internet-Draft (individual in sec area)
Last updated 2012-03-02
Stream IETF
Intended RFC status Informational
Formats plain text pdf html bibtex
Stream WG state (None)
Document shepherd None
IESG IESG state AD is watching
Consensus Boilerplate Unknown
Telechat date
Responsible AD Stephen Farrell
IESG note Jonathan Herzog (jherzog@ll.mit.edu) is the document Shepherd.
Send notices to jherzog@ll.mit.edu, rkh@ll.mit.edu, draft-herzog-setkey@tools.ietf.org
Network Working Group                                          J. Herzog
Internet-Draft                                                 R. Khazan
Intended status: Experimental                     MIT Lincoln Laboratory
Expires: August 31, 2012                               February 28, 2012

             A set-key attribute for symmetric-key packages
                         draft-herzog-setkey-05

Abstract

   A set-key is a symmetric key (or set of keys) associated with an
   immutable set of participants.  This document defines a set-key
   attribute for use in the CMS-based symmetric-key package structure
   [RFC6031].

Disclaimer

   This work is sponsored by the United States Air Force under Air Force
   Contract FA8721-05-C-0002.  Opinions, interpretations, conclusions
   and recommendations are those of the authors and are not necessarily
   endorsed by the United States Government.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on August 31, 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of

Herzog & Khazan          Expires August 31, 2012                [Page 1]
Internet-Draft             A set-key attribute             February 2012

   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Set-keys . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.2.  Symmetric key packages . . . . . . . . . . . . . . . . . .  4
     1.3.  Intended Usage . . . . . . . . . . . . . . . . . . . . . .  5
     1.4.  Requirements Terminology . . . . . . . . . . . . . . . . .  5
   2.  The set-key attribute  . . . . . . . . . . . . . . . . . . . .  5
   3.  Attribute generation . . . . . . . . . . . . . . . . . . . . .  9
   4.  Attribute processing . . . . . . . . . . . . . . . . . . . . . 12
   5.  Security Considerations  . . . . . . . . . . . . . . . . . . . 16
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 16
   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 17
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
     8.1.  Normative References . . . . . . . . . . . . . . . . . . . 17
     8.2.  Informative References . . . . . . . . . . . . . . . . . . 18
   Appendix A.  ASN.1 Module  . . . . . . . . . . . . . . . . . . . . 18
   Appendix B.  ASN.1 structures for Attributes . . . . . . . . . . . 19
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 20

Herzog & Khazan          Expires August 31, 2012                [Page 2]
Internet-Draft             A set-key attribute             February 2012

1.  Introduction

   This document defines a new set-key attribute for use in the
   symmetric-key package structure defined in [RFC6031].

1.1.  Set-keys

   A 'set-key' is a symmetric key associated with (and to be limited to)
   a specific set of participants (entities).  The exact definition of
   'participant', in the context of a particular key, will depend on the
   key's intended application.  Roughly speaking, however, the set of
   participants corresponds to the collection of individual agents which
   must possess and use the key for the key's intended purpose.  In
   practice, a 'participant' will often be an entity with a certified
   public key, but other definitions of 'participant' are possible.

   A set-key can be used in many ways, including:

   o  To secure broadcast or multicasts of e.g., pay-per-view movies,

   o  To secure group-communication such as chat rooms, or

   o  To secure data-at-rest which belongs to a group (such as on an
      encrypted file-system or on a server).

   The only requirement of a set-key is that it be associated with a
Show full document text