IPSec Working Group S. Blake-Wilson, BCI INTERNET-DRAFT D. Brown and Y. Poeluev, Certicom Intended Status: Informational Expires: June 15, 2006 December 15, 2005 Additional ECC Groups For IKE <draft-ietf-ipsec-ike-ecc-groups-07.txt> Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on June 15, 2006. Abstract This document describes new ECC groups for use in IKE [IKE] and IKEv2 [IKEv2] in addition to the Oakley groups included therein. These groups are defined to align IKE with other ECC implementations and standards, and in addition, many of them provide higher strength than the Oakley groups. It should be noted that this document is not self-contained. It uses the notations and definitions of [IKE] and IKEv2 [IKEv2]. Blake-Wilson, Brown and Poeluev [Page 1]

INTERNET-DRAFT NIST Curves for IKE December 2005 Table of Contents 1. Introduction ............................................... 2 2. The NIST Groups ............................................ 3 3. Security Considerations .................................... 5 4. Intellectual Property Rights ............................... 5 5. Acknowledgments ............................................ 5 6. References ................................................. 5 7. Author's Address ........................................... 7 1. Introduction This document describes groups for use in elliptic curve Diffie-Hellman in IKE in addition to the Oakley groups included in [IKE], [IKEv2], and [MODP-IKE]. The document assumes that the reader is familiar with the IKE protocol and the concept of Oakley Groups, as defined in RFC 2409 [IKE] and IKEv2 [IKEv2]. The ECC groups given here are the fifteen groups that NIST recommends in FIPS 186-2 [FIPS-182-2]. RFC2409 [IKE] defines five standard Oakley Groups - three modular exponentiation groups and two elliptic curve groups over GF[2^N]. One modular exponentiation group (768 bits - Oakley Group 1) is mandatory for all implementations to support, while the other four are optional. Both elliptic curve groups (Oakley Groups 3 and 4) are defined over GF[2^N] with N composite. The Internet-Draft "More MODP Groups For IKE" [MODP-IKE] describes several additional groups that can be used with IKE and IKEv2. Detailed descriptions of the ECC groups recommended here for IKE in this are not given in this document but can be found elsewhere: all fifteen groups in each of FIPS 186-2 [FIPS-186-2] and SEC 2 [SEC-2]. The elliptic curve domain paramenters are uniquely identified in this document using the ASN.1 object identifiers provided in ANS X9.62 [X9.62], ANS X9.63 [X9.63], and SEC 2 [SEC-2]. Blake-Wilson, Brown and Poeluev [Page 2]

INTERNET-DRAFT NIST Curves for IKE December 2005 2. The NIST Groups The groups given in this document are capable of providing security consistent with AES keys of 128, 192, and 256 bits, and also with TDES keys of lengths 168 and 112 bits, whose corresponding strengths of 112 and 80 bits, respectively. The following table, based on tables from [HOF] and [LEN], gives approximate comparable key sizes for symmetric systems, ECC systems, and DH/DSA/RSA systems. The estimates are based on the running times of the best algorithms known today. Strength | ECC2N/PR | DH/DSA/RSA 80 | 163/192 | 1024 112 | 233/224 | 2048 128 | 283/256 | 3072 192 | 409/384 | 7680 256 | 571/521 | 15360 Table 1: Comparable key sizes Thus, for example, when securing a 192-bit symmetric key, it is prudent to use either 409-bit ECC or 7680-bit DH/DSA/RSA. Of course it is possible to use shorter asymmetric keys, but it should be recognized in this case that the security of the system is likely dependent on the strength of the public-key algorithm and claims such as "this system is highly secure because it uses 192-bit encryption" are misleading. The fifteen groups proposed in this document use elliptic curves over GF[2^N] with N prime or over GF[P] with P prime. This addresses concerns expressed by many experts regarding curves defined over GF[2^N] with N composite -- concerns highlighted by the recent attacks on such curves due to Gaudry, Hess, and Smart [WEIL] and due to Jacobson, Menezes and Stein [JMS]. Seven of the groups proposed here have been assigned identifiers by IANA [IANA] and the remaining eight might latter be assigned identifiers by IANA. A brief summary of the IANA identified groups for IKE as follows. Groups with IANA numbers 1 through 4 are identified in [IKE]. The group with IANA number 5 is identifed in [MODP-IKE]. The group with IANA number 6, [X9.62] and [SEC 2], with object identifer sect163r1, but it is not one of the fifteen curves that NIST recommends [FIPS-186-2]. The seven groups with IANA numbers numbers between 7 and 13 have also been identified in [ECP-IKE] and are included here, as have the NIST groups with numbers 19, 20 and 21. The remaining five NIST groups are suggested and anticipate to be assigned IANA numbers 22 to 26. Blake-Wilson, Brown and Poeluev [Page 3]

INTERNET-DRAFT NIST Curves for IKE December 2005 The groups recommended for IKE and IKEv2 in this document are the ECC groups that NIST recommends [FIPS-186-2]. These fifteen ECC groups are given in the following table. IANA Group Description SEC 2 OID ---- ----------------- --------- 22 ECPRGF192Random group P-192 secp192r1 23 EC2NGF163Random group B-163 sect163r2 7 EC2NGF163Koblitz group K-163 sect163k1 24 ECPRGF224Random group P-224 secp224r1 25 EC2NGF233Random group B-233 sect233r1 26 EC2NGF233Koblitz group K-233 sect233k1 19 ECPRGF256Random group P-256 secp256r1 27 EC2NGF283Random group B-283 sect283r1 9 EC2NGF283Koblitz group K-283 sect283k1 20 ECPRGF384Random group P-384 secp384r1 10 EC2NGF409Random group B-409 sect409r1 11 EC2NGF409Koblitz group K-409 sect409k1 21 ECPRGF521Random group P-521 secp521r1 12 EC2NGF571Random group B-571 sect571r1 13 EC2NGF571Koblitz group K-571 sect571k1 Three curves are defined at each strength - two curves chosen verifiably at random (as defined in ANSI [X9.62]), one over a binary field and another over a prime field, and a Koblitz curve over a binary field that, which enables especially efficient implementations due to the special structure of the curve [KOB] and [SOL]. Blake-Wilson, Brown and Poeluev [Page 4]

INTERNET-DRAFT NIST Curves for IKE December 2005 3. Security Considerations Since this document proposes new groups for use within IKE, many of the security considerations contained within RFC 2409 apply here as well. Nine of the groups proposed in this document offer higher strength than the groups in RFC 2409. This allows the IKE and IKEv2 to offer security comparable with the proposed AES algorithms. In addition, since all the new groups are defined over GF[P] with P prime or GF[2^N] with N prime, they address the concerns expressed regarding the elliptic curve groups included in RFC 2409, which are curves defined over GF[2^N] with N composite. The work of Gaudry, Hess, and Smart [WEIL] reveal some of the weaknesses in such groups. 4. Intellectual Property Rights The IETF has been notified of intellectual property rights claimed in regard to the specification contained in this document. For more information, consult the online list of claimed rights (http://www.ietf.org/ipr.html). The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. 5. Acknowledgments To be added. Blake-Wilson, Brown and Poeluev [Page 5]

INTERNET-DRAFT NIST Curves for IKE December 2005 6. References [ECP-IKE] J. Solinas, ECP Groups for IKE, draft-ietf-ipsec-ike-ecp-groups-01.txt, work in progress. [IKE] D. Harkins and D. Carrel, The Internet Key Exchange, RFC 2409, November 1998. [IKEv2] C. Kaufman, Editor, Internt Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2-17.txt, work in progress. [IANA] Internet Assigned Numbers Authority. Attribute Assigned Numbers. (http://www.isi.edu/in-notes/iana/assignments/ipsec-registry) [IEEE-1363] Institute of Electrical and Electronics Engineers. IEEE 1363-2000, Standard for Public Key Cryptography. IEEE Microprocessor Standards Committee. August 2001. (http://grouper.ieee.org/groups/1363/index.html) [KOB] N. Koblitz, CM curves with good cryptographic properties. Proceedings of Crypto '91. Pages 279-287. Springer-Verlag, 1992. [FIPS-186-2] U.S. Department of Commerce/National Institute of Standards and Technology. Digital Signature Standard (DSS), FIPS PUB 186-2, January 2000. (http://csrc.nist.gov/fips/fips186-2.pdf) [HOF] P. Hoffman and H. Orman, Determining strengths for public keys used for exchanging symmetric keys, Internet-draft. August 2000. [LEN] A. Lenstra and E. Verhuel, Selecting cryptographic key sizes. Available at: www.cryptosavvy.com. [JMS] M. Jacobson, A. Menezes and A. Stein, Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent, Combinatorics and Optimization Research Report 2001-31, May 2001. Available at http://www.cacr.math.uwaterloo.ca/. [MODP-IKE] T. Kivinen and M. Kojo, More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE), rfc3526.txt, May 2003. [SEC2] Standards for Efficient Cryptography Group. SEC 2 - Recommended Elliptic Curve Domain Parameters. Working Draft Ver. 1.0., 2000. (http://www.secg.org) [SOL] J. Solinas, An improved algorithm for arithmetic on a family of elliptic curves, Proceedings of Crypto '97, Pages 357-371, Springer-Verlag, 1997. Blake-Wilson, Brown and Poeluev [Page 6]

INTERNET-DRAFT NIST Curves for IKE December 2005 [WEIL] Gaudry, P., Hess, F., Smart, Nigel P. Constructive and Destructive Facets of Weil Descent on Elliptic Curves, HP Labs Technical Report No. HPL-2000-10, 2000. (http://www.hpl.hp.com/techreports/2000/HPL-2000-10.html) [X9.62] American National Standards Institute, ANS X9.62-2005: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm. November 2005. [X9.63] American National Standards Institute. ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport using Elliptic Curve Cryptography. November 2001. 7. Authors' Addresses Simon Blake-Wilson Basic Commerce & Industries, Inc. sblakewilson@bcisse.com Daniel R. L. Brown Certicom Corp. dbrown@certicom.com Yuri Poeluev Certicom Corp. ypoeluev@certicom.com 8. Full Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Blake-Wilson, Brown and Poeluev [Page 7]