ipsec September 2011 archive
Main Archive Page > Month Archives  > ipsec archives
ipsec: Re: [IPsec] Request for review: The ARIA Cipher Algorithm

Re: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec

From: <Paul_Koning_at_nospam>
Date: Thu Sep 15 2011 - 10:52:32 GMT
To: <whkim5@ensec.re.kr>, <ipsec@ietf.org>

Should this be added to IPSec? It's not clear to me that proliferation of ciphers is helpful. A small set of very well vetted ciphers is better than a larger set that add others without a strong track record.

                paul

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Woo-Hwan Kim
Sent: Thursday, September 15, 2011 4:24 AM
To: ipsec@ietf.org
Cc: Daesung Kwon; Jungkeon Lee; Je Hong Park
Subject: [IPsec] Request for review: The ARIA Cipher Algorithm and Its Use with IPsec

IPsec experts,

Let me make a request for review
on the draft "The ARIA Cipher Algorithm and Its Use with IPsec".

Any comments would be appreciated.

http://tools.ietf.org/html/draft-nsri-ipsecme-aria-ipsec-00

---------- Forwarded message ----------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: 2011/9/15
Subject: New Version Notification for draft-nsri-ipsecme-aria-ipsec-00.txt
To: whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr>
Cc: ds_kwon@ensec.re.kr<mailto:ds_kwon@ensec.re.kr>, whkim5@ensec.re.kr<mailto:whkim5@ensec.re.kr>, jhpark@ensec.re.kr<mailto:jhpark@ensec.re.kr>, jklee@ensec.re.kr<mailto:jklee@ensec.re.kr>

A new version of I-D, draft-nsri-ipsecme-aria-ipsec-00.txt has been successfully submitted by Woo-Hwan Kim and posted to the IETF repository.

Filename: draft-nsri-ipsecme-aria-ipsec
Revision: 00
Title: The ARIA Cipher Algorithm and Its Use with IPsec
Creation date: 2011-09-15
WG ID: Individual Submission
Number of pages: 10

Abstract:
  This document describes the use of the ARIA block cipher algorithm in
  conjunction with several different modes of operation within IKE and
  IPsec. It describes the use of ARIA in CBC, CTR, GCM and CCM modes
  to encrypt and/or authenticate IKE and ESP traffic. It also
  describes the use of ARIA in XCBC, CMAC, and GMAC modes to
  authenticate IKE, ESP and AH traffic. The use of ARIA in XCBC and
  CMAC modes for pseudorandom functions is also included.

The IETF Secretariat

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec