The ARIA Algorithm and Its Use with the Secure Real-time Transport Protocol(SRTP)
draft-ietf-avtcore-aria-srtp-08

 
Document Type Active Internet-Draft (avtcore WG)
Last updated 2015-05-29
Replaces draft-nsri-avtcore-aria-srtp
Stream IETF
Intended RFC status Proposed Standard
Formats plain text pdf html
Stream WG state Submitted to IESG for Publication Dec 2013
Consensus Unknown
Document shepherd Roni Even
Shepherd write-up Show (last changed 2013-11-20)
IESG IESG state Waiting for Writeup
Telechat date
Responsible AD Ben Campbell
Send notices to avtcore-chairs@ietf.org, draft-ietf-avtcore-aria-srtp@ietf.org
IANA IANA review state Version Changed - Review Needed
IANA action state None
AVTCore                                                           W. Kim
Internet-Draft                                                    J. Lee
Intended status: Informational                                   J. Park
Expires: November 30, 2015                                       D. Kwon
                                                                    NSRI
                                                            May 29, 2015

   The ARIA Algorithm and Its Use with the Secure Real-time Transport
                             Protocol(SRTP)
                    draft-ietf-avtcore-aria-srtp-08

Abstract

   This document defines the use of the ARIA block cipher algorithm
   within the Secure Real-time Transport Protocol (SRTP) for providing
   confidentiality for the Real-time Transport Protocol (RTP) traffic
   and for the control traffic for RTP, the RTP Control Protocol (RTCP).
   It details two modes of operation (CTR, GCM) and a SRTP Key
   Derivation Function for ARIA.  Additionally, this document defines
   DTLS-SRTP protection profiles and MIKEY parameter sets for the use
   with ARIA.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 30, 2015.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of

Kim, et al.             Expires November 30, 2015               [Page 1]
Internet-Draft           ARIA Algorithm for SRTP                May 2015

   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  ARIA  . . . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Cryptographic Transforms  . . . . . . . . . . . . . . . . . .   3
     2.1.  ARIA-CTR  . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  ARIA-GCM  . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Key Derivation Functions  . . . . . . . . . . . . . . . . . .   4
   4.  Protection Profiles . . . . . . . . . . . . . . . . . . . . .   4
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   8
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   8
     6.1.  DTLS-SRTP . . . . . . . . . . . . . . . . . . . . . . . .   8
     6.2.  MIKEY . . . . . . . . . . . . . . . . . . . . . . . . . .   9
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   9
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .   9
     7.2.  Informative References  . . . . . . . . . . . . . . . . .  10
   Appendix A.  Test Vectors . . . . . . . . . . . . . . . . . . . .  12
     A.1.  ARIA-CTR Test Vectors . . . . . . . . . . . . . . . . . .  12
       A.1.1.  SRTP_ARIA_128_CTR_HMAC_SHA1_80  . . . . . . . . . . .  12
       A.1.2.  SRTP_ARIA_192_CTR_HMAC_SHA1_80  . . . . . . . . . . .  13
       A.1.3.  SRTP_ARIA_256_CTR_HMAC_SHA1_80  . . . . . . . . . . .  14
     A.2.  ARIA-GCM Test Vectors . . . . . . . . . . . . . . . . . .  15
       A.2.1.  SRTP_AEAD_ARIA_128_GCM  . . . . . . . . . . . . . . .  16
       A.2.2.  SRTP_AEAD_ARIA_256_GCM  . . . . . . . . . . . . . . .  16
     A.3.  Key Derivation Test Vector  . . . . . . . . . . . . . . .  17
       A.3.1.  ARIA_128_CTR_PRF  . . . . . . . . . . . . . . . . . .  17
       A.3.2.  ARIA_192_CTR_PRF  . . . . . . . . . . . . . . . . . .  18
       A.3.3.  ARIA_256_CTR_PRF  . . . . . . . . . . . . . . . . . .  20
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  21

1.  Introduction

   This document defines the use of the ARIA [RFC5794] block cipher
Show full document text