1 / 8

Secure Content Encryption and Authentication: IETF Guidelines

Learn about IETF design goals for S/MIME WG session, support for authenticated encryption modes, AES-CCM and AES-GCM usage, and key management. Details on AuthEnvelopedData syntax and processing steps included.

lpaine
Download Presentation

Secure Content Encryption and Authentication: IETF Guidelines

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CMS AuthEnvelopedData<draft-ietf-smime-cms-auth-enveloped-02.txt>AES-CCM and AES-GCM<draft-ietf-smime-cms-aes-ccm-and-gcm-01.txt> Russ Housley IETF 68 – S/MIME WG Session

  2. Design Goals • Support authenticated encryption modes • Content is authenticated and encrypted • Some attributes can also be authenticated • Allow all of the usual key management alternatives Note: I first tried to meet these goals using EnvelopedData, but it was a very poor fit

  3. The Syntax AuthEnvelopedData ::= SEQUENCE { version CMSVersion, originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, recipientInfos RecipientInfos, authAttrs [1] IMPLICIT AuthAttributes OPTIONAL, authEncryptedContentInfo EncryptedContentInfo, mac MessageAuthenticationCode, unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }

  4. Processing • Generate a random content-authenticated-encryption key • Pad content, if needed • DER encode the authenticated attributes, and pad the result, if needed • Apply authenticated-encryption algorithm, carrying a nonce in the algorithm parameters, if needed

  5. AES-CCM and AES-GCM • Separate document shows how to use these two authenticated-encryption AES modes with AuthEnvelopedData: draft-ietf-smime-cms-aes-ccm-and-gcm-01.txt

  6. Way Forward (1 of 2) • Already had some discussion on S/MIME WG mail list • Resolution of comments is clear • Almost ready for WG Last Call for Proposed Standard for both documents: • draft-ietf-smime-cms-auth-enveloped-03.txt • One open issue to resolve, then it will be ready • draft-ietf-smime-cms-aes-ccm-and-gcm-01.txt • Appeared today!

  7. Way Forward (2 of 2) • Open issue involve the encoding of authenticated attributes • Do it exactly the same as SignedData • Use the encoding that will be transmitted • Personal preference for the transmission encoding, but do not want to impose an implementation burden • Implementer suggestions desired • Hum?

  8. Questions?

More Related