draft-ietf-ipsec-ike-ecp-groups-00.txt   draft-ietf-ipsec-ike-ecp-groups-01.txt 
IPSec Working Group J. Solinas, NSA IPSec Working Group J. Solinas, NSA
INTERNET-DRAFT INTERNET-DRAFT
Expires October 2, 2005 March 31, 2005 Expires November 27, 2005 May 27, 2005
ECP Groups For IKE ECP Groups For IKE
<draft-ietf-ipsec-ike-ecp-groups-00.txt> <draft-ietf-ipsec-ike-ecp-groups-01.txt>
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
skipping to change at page 2, line 21 skipping to change at page 2, line 21
concept of Oakley Groups, as defined in RFC 2409 [IKE]. concept of Oakley Groups, as defined in RFC 2409 [IKE].
RFC 2409 [IKE] defines five standard Oakley Groups - three modular RFC 2409 [IKE] defines five standard Oakley Groups - three modular
exponentiation groups and two elliptic curve groups over GF[2^N]. exponentiation groups and two elliptic curve groups over GF[2^N].
One modular exponentiation group (768 bits - Oakley Group 1) is One modular exponentiation group (768 bits - Oakley Group 1) is
mandatory for all implementations to support, while the other four mandatory for all implementations to support, while the other four
are optional. Thirteen additional groups subsequently have are optional. Thirteen additional groups subsequently have
been defined and assigned values by IANA. All of these additional been defined and assigned values by IANA. All of these additional
groups are optional. Of the eighteen groups defined so far, eight groups are optional. Of the eighteen groups defined so far, eight
are modular exponentiation groups and ten are elliptic curve groups are modular exponentiation groups and ten are elliptic curve groups
over GF[2^N] with N composite. over GF[2^N].
The purpose of this document is to expand the options available to The purpose of this document is to expand the options available to
implementers of elliptic curve groups by adding three new elliptic implementers of elliptic curve groups by adding three new elliptic
curve groups. Unlike the previous elliptic curve groups, the three curve groups. Unlike the previous elliptic curve groups, the three
groups proposed in this document are defined over GF[p] with p prime. groups proposed in this document are defined over GF[p] with p prime.
The reasons for adding these new groups include the following. The reasons for adding these new groups include the following.
- The groups proposed afford efficiency advantages in software - The groups proposed afford efficiency advantages in software
applications since the underlying arithmetic is integer arithmetic applications since the underlying arithmetic is integer arithmetic
modulo a prime rather than binary field arithmetic. (Additional modulo a prime rather than binary field arithmetic. (Additional
skipping to change at page 10, line 9 skipping to change at page 10, line 9
[X9.63] American National Standards Institute. X9.63-2001, [X9.63] American National Standards Institute. X9.63-2001,
Public Key Cryptography for the Financial Services Industry: Key Public Key Cryptography for the Financial Services Industry: Key
Agreement and Key Transport using Elliptic Curve Cryptography. Agreement and Key Transport using Elliptic Curve Cryptography.
November 2001. November 2001.
7. Author's Address 7. Author's Address
Jerome A. Solinas Jerome A. Solinas
National Security Agency National Security Agency
jsolinas@orion.ncsc.mil jasolin@orion.ncsc.mil
Comments are solicited and should be addressed to the author. Comments are solicited and should be addressed to the author.
Copyright (C) The Internet Society (2005). Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors contained in BCP 78, and except as set forth therein, the authors
retain all their rights. retain all their rights.
This document and the information contained herein are provided on an This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Expires October 2, 2005 Expires November 27, 2005
 End of changes. 6 change blocks. 
5 lines changed or deleted 4 lines changed or added

This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/