[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Evaluation: draft-ietf-ipsec-ciph-aes-xcbc-mac - The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec to Proposed Standard



Last Call to expire on: August 6, 2002

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain  


Harald Alvestrand   [   ]     [   ]       [   ]      [   ] 
Steve Bellovin      [   ]     [   ]       [   ]      [   ] 
Scott Bradner       [   ]     [   ]       [   ]      [   ] 
Randy Bush          [   ]     [   ]       [   ]      [   ] 
Patrik Faltstrom    [   ]     [   ]       [   ]      [   ] 
Bill Fenner         [   ]     [   ]       [   ]      [   ] 
Ned Freed           [   ]     [   ]       [   ]      [   ] 
Allison Mankin      [   ]     [   ]       [   ]      [   ] 
Thomas Narten       [   ]     [   ]       [   ]      [   ] 
Erik Nordmark       [   ]     [   ]       [   ]      [   ] 
Jeff Schiller       [ X ]     [   ]       [   ]      [   ] 
Bert Wijnen         [   ]     [   ]       [   ]      [   ]
Alex Zinin          [   ]     [   ]       [   ]      [   ] 

 2/3 (9) Yes or No-Objection opinions needed to pass. 
 
 * Indicate reason if 'Discuss'.
 
^L
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>, ipsec@lists.tislabs.com
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: The AES-XCBC-MAC-96 Algorithm and Its Use
	 With IPsec to Proposed Standard
-------------

The IESG has approved "The AES-XCBC-MAC-96 Algorithm and Its Use With
IPsec" <draft-ietf-ipsec-ciph-aes-xcbc-mac-02.txt> as a Proposed
Standard.

The IESG contact persons are Steve Bellovin and Jeff Schiller

Technical Summary

This document defines a new hash algorithm for use in IPsec ESP. It
is a variant of the traditional use of a cipher in Cipher Block
Chaining (CBC) Mode to compute a hash value. However traditional CBC
mode hashes are vulnerable to attack if the amount of data to be
protected is of variable length. This document defines a variant of
this approach, applied to the Advanced Encryption Standard (AES)
that is proof against this vulnerability.

Working Group Summary

      There was working group consensus on this document.

Protocol Quality

      These documents were reviewed by Jeff Schiller.