AES Encryption with HMAC-SHA2 for Kerberos 5
draft-ietf-kitten-aes-cts-hmac-sha2-00

The information below is for an old version of the document
Document Type Active Internet-Draft (kitten WG)
Authors Kelley Burgin  , Michael Peck 
Last updated 2013-04-19
Stream IETF
Intended RFC status (None)
Formats pdf htmlized (tools) htmlized bibtex
Reviews
Stream WG state WG Document
Document shepherd None
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)
Network Working Group                                          K. Burgin
Internet Draft                                  National Security Agency
Intended Status: Informational                                   M. Peck
Expires: October 21, 2013                          The MITRE Corporation
                                                          April 19, 2013

              AES Encryption with HMAC-SHA2 for Kerberos 5
                 draft-ietf-kitten-aes-cts-hmac-sha2-00

Abstract

   This document specifies two encryption types and two corresponding
   checksum types for Kerberos 5.  The new types use AES in CTS mode
   (CBC mode with ciphertext stealing) for confidentiality and HMAC with
   a SHA-2 hash for integrity.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on October 21, 2013.

Copyright and License Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.
 

Burgin & Peck           Expires October 21, 2013                [Page 1]
Internet-Draft      AES-CTS HMAC-SHA2 For Kerberos 5      April 19, 2013

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Conventions used in this Document  . . . . . . . . . . . . . .  3
   3.  Protocol Key Representation  . . . . . . . . . . . . . . . . .  3
   4.  Key Generation from Pass Phrases . . . . . . . . . . . . . . .  3
   5.  Key Derivation Function  . . . . . . . . . . . . . . . . . . .  4
   6.  Kerberos Algorithm Protocol Parameters . . . . . . . . . . . .  5
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  8
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . .  8
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     9.1.  Normative References . . . . . . . . . . . . . . . . . . .  9
     9.2.  Informative References . . . . . . . . . . . . . . . . . .  9
   Appendix A.  Test Vectors  . . . . . . . . . . . . . . . . . . . . 10
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12

 

Burgin & Peck           Expires October 21, 2013                [Page 2]
Internet-Draft      AES-CTS HMAC-SHA2 For Kerberos 5      April 19, 2013

1.  Introduction

   This document defines two encryption types and two corresponding
   checksum types for Kerberos 5 using AES with 128-bit or 256-bit keys.
   The new types conform to the framework specified in [RFC3961], but do
   not use the simplified profile.

   The new encryption types use AES in CTS mode (CBC mode with
   ciphertext stealing) similar to [RFC3962] but with several
   variations.

   The new types use the PBKDF2 algorithm for key generation from
   strings, with a modification to the use in [RFC3962] that the
   pseudorandom function used by PBKDF2 is HMAC-SHA-256 or HMAC-SHA-384
   instead of HMAC-SHA-1.

   The new types use key derivation to produce keys for encryption,
   integrity protection, and checksum operations as in [RFC3962].
   However, a key derivation function from [SP800-108] which uses the
   SHA-256 or SHA-384 hash algorithm is used in place of the DK key
   derivation function used in [RFC3961].

   The new types use the HMAC algorithm with a hash from the SHA-2
   family for integrity protection and checksum operations.

2.  Conventions used in this Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

3.  Protocol Key Representation

   The AES key space is dense, so we can use random or pseudorandom
Show full document text