Security Working Group                             R. Thayer
     Internet Draft                                     June 1997
     Expire in six months
     
                          The ESP ARCFOUR Algorithm
                       <draft-ietf-ipsec-ciph-arcfour-00.txt>
     
     Status of This Memo
     
     This document is a submission to the IETF Internet Protocol
     Security (IPSEC) Working Group. Comments are solicited and should
     be addressed to the working group mailing list (ipsec@tis.com) or
     to the editor.
     
     This document is an Internet-Draft.  Internet Drafts are working
     documents of the Internet Engineering Task Force (IETF), its areas,
     and its working Groups. Note that other groups may also distribute
     working documents as Internet Drafts.
     
     Internet-Drafts draft documents are valid for a maximum of six
     months and may be updated, replaced, or obsoleted by other
     documents at any time. It is inappropriate to use Internet-Drafts
     as reference material or to cite them other than as "work in
     progress."
     
     To learn the current status of any Internet-Draft, please check the
     "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
     Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
     munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
     ftp.isi.edu (US West Coast).
     
     Distribution of this memo is unlimited.
     
     Abstract
     
     This draft describes the use of the ARCFOUR [Kaukonen] stream
     cipher algorithm to be used with the IPSec Encapsulating Security
     Payload [ESP].
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     Thayer                                              Page [1]
     
     
     
     
     Internet Draft   The ESP ARCFOUR Algorithm         June 1997
     
     
     
     Contents
     
     
     STATUS OF THIS MEMO...............................................1
     
     
     ABSTRACT..........................................................1
     
     
     CONTENTS..........................................................2
     
     
     1. INTRODUCTION...................................................2
     
      1.1 SPECIFICATION OF REQUIREMENTS ...............................3
     
     2. CIPHER ALGORITHM...............................................3
     
     
     3. CIPHER KEY SPECIFICATIONS......................................3
     
     
     4. ESP PAYLOAD....................................................3
     
     
     5. SECURITY CONSIDERATIONS........................................3
     
     
     6. ACKNOWLEDEMENTS................................................3
     
     
     7. REFERENCES.....................................................4
     
     
     8. EDITOR'S ADDRESS...............................................4
     
     
     1. Introduction
     
     This draft describes the use of the ARCFOUR stream algorithm to
     provide confidentiality in conjunction with the IPsec ESP protocol
     [ESP].
     
     This document assumes readers with the terms and concepts in [RFC-
     1825] and in [ESP].  This document follows the IPsec document
     framework described in [Framework].
     
     ARCFOUR is described in detail in [Kaukonen].
     
     
     Thayer                                              [Page 2]


     Internet Draft   The ESP ARCFOUR Algorithm         June 1997
     
     
     1.1 Specification of Requirements
     Interpret the keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD",
     "SHOULD NOT", and "MAY" that appear in this document as described
     in [RFC-2119].
     
     2. Cipher Algorithm
     
     The cipher algorithm specified in this document is the ARCFOUR
     stream cipher.
     
     Hardware implementations of this algorithm are expected to perform
     in the 5-20 megabyte per second range.
     
     3. Cipher Key Specifications
     
     The keys used with this cipher for ESP SHOULD be either 40 or 128
     bits.  All implementations must support 40 bit keys. All
     implementations SHOULD support 128 bit keys.  The use of 40 bit
     keys SHOULD be limited due to known attacks against this algorithm
     with that key length.
     
     The keying material passed from key management MUST be either 40
     bits or 128 bits of key, passed as 5 or 16 bytes.
     
     4. ESP Payload
     
     The ESP packet payload contains only the actual payload data.  No
     IV is required for this cipher.
     
     5. Security Considerations
     
     40 bit keys for ARCFOUR have been shown to be breakable.  128 bit
     keys should be used.  40 bit keys should only be used for
     exportable demonstration implementations.
     
     As with any other encryption technology, one should examine the
     current literature for any new attack strategies discovered after
     this document was published.
     
     6. Acknowledements
     
     An earlier draft discussing the use of this cipher was published in
     1996 by Caronni and Waldvogel, "The ESP Stream Transform", draft-
     caronni-esp-stream-01.txt, September, 1996.
     
     The ARCFOUR algorithm is described in [Schneier] and in the
     Internet Draft draft-ietf-cipher-arcfour-00.txt soon to be
     submitted by Kaukonen and Thayer.
     
     
     
     Thayer                                              [Page 3]


     Internet Draft   The ESP ARCFOUR Algorithm         June 1997
     
     
     The ESP protocol is more recently discussed in draft-ietf-ipsec-
     esp-04.txt.
     
     The IPsec document framework is described in draft-ietf-doc-
     roadmap-00.txt.
     
     7. References
     
     [ESP] Atkinson, R., "IP Encapsulating Security Protocol (ESP)",
     Naval Research Laboratory, July 1995.
     
     [Framework] The IP Security Document Roadmap, RFC-xxxx.
     
     [Kaukonen] The ARCFOUR Stream Cipher, RFC-xxxx.
     
     [RFC-2119] Bradner, S., "Key words for use in RFCs to indicate
     Requirement Levels", ftp://ds.internic.net/rfc/rfc2119.txt, March
     1997
     
     [Schneier] Schneier, B., "Applied Cryptography Second Edition",
     John Wiley & Sons, New York, NY, 1995.  ISBN 0-471-12845-7
     
     8. Editor's Address
     
     Rodney Thayer
     Sable Technology Corporation
     246 Walnut Street
     Newton, Massachusetts U.S.A.
     617 332 7292
     Fax 617 332 7970
     <mailto: rodney@sabletech.com>
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     Thayer                                              [Page 4]