[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: RADEXT WG re-charter



Bernard Aboba writes...

> At IETF 71, the technical discussion brought up the following points:
> 
> a.  The integrity protection for keywrap is considerably *weaker* 
> (e.g. 64 bits) than for standard MIC algorithms.
> b.  Encryption algorithms for keywrap cannot be securely used to do
> bulk encryption of data, but algorithms that can do bulk encryption
> can securely be used to encrypt keys.

Are there specific recommendations (e.g. an "SP" series document) from NIST
that cover the use of bulk encryption algorithms to encrypt keys?

> c. Existing IETF standards (such as Diameter EAP, RFC 4702) use TLS to
> protect keys.

> Given this, I would suggest that assertions made about NIST positions
> should be ruled out of scope, unless they come directly from
> representatives of NIST.

Or presumably from existing NIST publications...

I tend to think (individual opinion) that facilitating FIPS "certifiable"
implementations might be a reasonable requirement to be added into the
RADIUS Crypto-Agility Requirements draft, assuming the reference is to an
existing NIST publication.  I understand that these publications would
discuss algorithms and modes only, and not cover how to encapsulate a key in
a RADIUS attribute.



--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>