Request for Comments: 1828 Category: Standards Track Daydreamer August 1995

Similar documents
Network Working Group Request for Comments: 1829 Category: Standards Track Piermont W. Simpson Daydreamer August 1995

Network Working Group Request for Comments: 2085 Category: Standards Track NIST February HMAC-MD5 IP Authentication with Replay Prevention

Network Working Group Request for Comments: DayDreamer March 1999

Message Authentication with MD5 *

Category: Informational Alcatel January 2006

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011

Request for Comments: 2537 Category: Standards Track March RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)

Request for Comments: 3110 Obsoletes: 2537 May 2001 Category: Standards Track. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

Network Working Group Request for Comments: 1993 Category: Informational Newbridge W. Simpson DayDreamer August 1996

Category: Standards Track Cisco Systems Inc. November 1998

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)

Network Working Group Request for Comments: 4432 March 2006 Category: Standards Track

Network Working Group. Category: Standards Track NIST November 1998

A Related-Key Cryptanalysis of RC4

Internet Engineering Task Force (IETF) Request for Comments: 6194 Category: Informational. IECA P. Hoffman VPN Consortium March 2011

Request for Comments: 2420 Category: Standards Track September The PPP Triple-DES Encryption Protocol (3DESE)

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Related-key Attacks on Triple-DES and DESX Variants

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude

Network Working Group. A. Keromytis U. of Pennsylvania March DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Network Working Group Request for Comments: 4419 Category: Standards Track March 2006

Cryptographic Hash Functions. William R. Speirs

Category: Standards Track Sun Microsystems Laboratories November 2000

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011

Request for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)

Request for Comments: Obsoletes: 2095 September IMAP/POP AUTHorize Extension for Simple Challenge/Response

Network Working Group. Obsoletes: RFC 1103 October 1990

M. Rose Dover Beach Consulting, Inc. February 1993

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: October 2015

Request for Comments: 2230 Category: Informational November 1997

Category: Informational May Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP)

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP)

Spring 2010: CS419 Computer Security

Request for Comments: 2539 Category: Standards Track March Storage of Diffie-Hellman Keys in the Domain Name System (DNS)

Network Working Group Request for Comments: October 1996

Category: Standards Track October 2006

Network Working Group. Category: Informational DayDreamer August 1996

Category: Standards Track May Default IP MTU for use over ATM AAL5. Status of this Memo

CSCE 715: Network Systems Security

Request for Comments: 1652

Attacking MD5: Tunneling & Multi- Message Modification. Team Short Bus: Daniel Liu John Floren Tim Sperr

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139

June The Internet-standard Network Management Framework consists of three components. They are:

Internet Engineering Task Force (IETF) Updates: 6376 January 2018 Category: Standards Track ISSN:

September Copyright (C) The Internet Society (2000). All Rights Reserved.

The Linux Kernel Cryptographic API

Network Working Group. Category: Standards Track January 2006

Obsoletes: 1545 June 1994 Category: Experimental. FTP Operation Over Big Address Records (FOOBAR)

Network Working Group. Category: Standards Track September The SRP Authentication and Key Exchange System

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins

Telemetry Data Sharing Using S/MIME

< INC-PROJECT, WINSTON-RFC.NLS.6, >, 11-Jun-85 21:31-PDT JBP ;;;;

Internet Engineering Task Force (IETF) Category: Standards Track March 2011 ISSN:

Category: Informational May 1996

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Fast Block Cipher Proposal

Internet Engineering Task Force (IETF) Request for Comments: 6994 Category: Standards Track August 2013 ISSN:

Network Working Group Request for Comments: Category: Standards Track August 2008

Network Working Group. Category: Standards Track June 1996

Internet Engineering Task Force (IETF) Request for Comments: 5754 Updates: 3370 January 2010 Category: Standards Track ISSN:

Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1

Network Working Group

Network Working Group Request for Comments: December 2004

Jaap van Ginkel Security of Systems and Networks

Network Working Group. February 2005

Network Working Group. Category: Informational March IPv4 Option for Sender Directed Multi-Destination Delivery

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

ETSI TS V1.3.1 ( )

Network Working Group. Category: Informational February 1997

Key Separation in Twofish

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.

CSE 127: Computer Security Cryptography. Kirill Levchenko

Network Working Group. Category: Standards Track June Protocol Independent Multicast (PIM) Bootstrap Router MIB

Network Working Group. Extreme Networks July Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication

Network Working Group Request for Comments: November 1998

Provable Partial Key Escrow

Digital Signature Generation using Fingerprint, Password and Smart Card

Network Working Group Request for Comments: 2043 Category: Standards Track October 1996

Cryptography and Network Security

Category: Standards Track January 1994

Category: Informational March Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME

Cryptographic Mechanisms: Recommendations and Key Lengths

Internet Engineering Task Force (IETF) S. Jiang Huawei Technologies Co., Ltd June The Secure Neighbor Discovery (SEND) Hash Threat Analysis

Category: Informational January 2010 ISSN:

Network Working Group Request for Comments: 1115 IAB Privacy Task Force August 1989

Category: Informational April 1996

Updates: 2453 Category: Standards Track February RIPv2 Cryptographic Authentication. Status of This Memo

Internet Engineering Task Force (IETF) Request for Comments: 5959 Category: Standards Track August 2010 ISSN:

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Hash Function. Guido Bertoni Luca Breveglieri. Fundations of Cryptography - hash function pp. 1 / 18

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Category: Standards Track LabN Consulting, LLC July 2008

Multiple forgery attacks against Message Authentication Codes

A Related Key Attack on the Feistel Type Block Ciphers

INTERNET-DRAFT The DNS TKEY RR April Abstract

Transcription:

Network Working Group Request for Comments: 1828 Category: Standards Track P. Metzger Piermont W. Simpson Daydreamer August 1995 IP Authentication using Keyed MD5 Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes the use of keyed MD5 with the IP Authentication Header. Table of Contents 1. Introduction... 1 1.1 Keys... 1 1.2 Data Size... 1 1.3 Performance... 1 2. Calculation... 2 SECURITY CONSIDERATIONS... 2 ACKNOWLEDGEMENTS... 3 REFERENCES... 3 AUTHOR S ADDRESS... 4 Metzger & Simpson Standards Track [Page i]

1. Introduction The Authentication Header (AH) [RFC-1826] provides integrity and authentication for IP datagrams. This specification describes the AH use of keys with Message Digest 5 (MD5) [RFC-1321]. All implementations that claim conformance or compliance with the Authentication Header specification MUST implement this keyed MD5 mechanism. This document assumes that the reader is familiar with the related document "Security Architecture for the Internet Protocol" [RFC- 1825], which defines the overall security plan for IP, and provides important background for this specification. 1.1. Keys The secret authentication key shared between the communicating parties SHOULD be a cryptographically strong random number, not a guessable string of any sort. The shared key is not constrained by this transform to any particular size. Lengths of up to 128 bits MUST be supported by the implementation, although any particular key may be shorter. Longer keys are encouraged. 1.2. Data Size MD5 s 128-bit output is naturally 64-bit aligned. Typically, there is no further padding of the Authentication Data field. 1.3. Performance MD5 software speeds are adequate for commonly deployed LAN and WAN links, but reportedly are too slow for newer link technologies [RFC- 1810]. Nota Bene: Suggestions are sought on alternative authentication algorithms that have significantly faster throughput, are not patentencumbered, and still retain adequate cryptographic strength. Metzger & Simpson Standards Track [Page 1]

2. Calculation The 128-bit digest is calculated as described in [RFC-1321]. The specification of MD5 includes a portable C programming language description of the MD5 algorithm. The form of the authenticated message is key, keyfill, datagram, key, MD5fill First, the variable length secret authentication key is filled to the next 512-bit boundary, using the same pad with length technique defined for MD5. Then, the filled key is concatenated with (immediately followed by) the invariant fields of the entire IP datagram (variant fields are zeroed), concatenated with (immediately followed by) the original variable length key again. A trailing pad with length to the next 512-bit boundary for the entire message is added by MD5 itself. The 128-bit MD5 digest is calculated, and the result is inserted into the Authentication Data field. Discussion: When the implementation adds the keys and padding in place before and after the IP datagram, care must be taken that the keys and/or padding are not sent over the link by the link driver. Security Considerations Users need to understand that the quality of the security provided by this specification depends completely on the strength of the MD5 hash function, the correctness of that algorithm s implementation, the security of the key management mechanism and its implementation, the strength of the key [CN94], and upon the correctness of the implementations in all of the participating nodes. At the time of writing of this document, it is known to be possible to produce collisions in the compression function of MD5 [dbb93]. There is not yet a known method to exploit these collisions to attack MD5 in practice, but this fact is disturbing to some authors [Schneier94]. It has also recently been determined [vow94] that it is possible to build a machine for $10 Million that could find two chosen text Metzger & Simpson Standards Track [Page 2]

variants with a common MD5 hash value. However, it is unclear whether this attack is applicable to a keyed MD5 transform. This attack requires approximately 24 days. The same form of attack is useful on any iterated n-bit hash function, and the time is entirely due to the 128-bit length of the MD5 hash. Although there is no substantial weakness for most IP security applications, it should be recognized that current technology is catching up to the 128-bit hash length used by MD5. Applications requiring extremely high levels of security may wish to move in the near future to algorithms with longer hash lengths. Acknowledgements This document was reviewed by the IP Security Working Group of the Internet Engineering Task Force (IETF). Comments should be submitted to the ipsec@ans.net mailing list. Some of the text of this specification was derived from work by Randall Atkinson for the SIP, SIPP, and IPv6 Working Groups. The basic concept and use of MD5 is derived in large part from the work done for SNMPv2 [RFC-1446]. Steve Bellovin, Phil Karn, Charles Lynn, Dave Mihelcic, Hilarie Orman, Jeffrey Schiller, Joe Touch, and David Wagner provided useful critiques of earlier versions of this draft. References [CN94] Carroll, J.M., and Nudiati, S., "On Weak Keys and Weak Data: Foiling the Two Nemeses", Cryptologia, Vol. 18 No. 23 pp. 253-280, July 1994. [dbb93] den Boer, B., and Bosselaers, A., "Collisions for the Compression function of MD5", Advances in Cryptology -- Eurocrypt 93 Proceedings, Berlin: Springer-Verlag 1994 [KR95] Kaliski, B., and Robshaw, M., "Message authentication with MD5", CryptoBytes (RSA Labs Technical Newsletter), vol.1 no.1, Spring 1995. Metzger & Simpson Standards Track [Page 3]

[RFC-1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, MIT and RSA Data Security, Inc., April 1992. [RFC-1446] Galvin, J., and K. McCloghrie, "Security Protocols for Version 2 of the Simple Network Management Protocol (SNMPv2)", RFC 1446, TIS, Hughes LAN Systems, April 1993. [RFC-1700] Reynolds, J., and J. Postel, "Assigned Numbers", STD 2, RFC 1700, USC/Information Sciences Institute, October 1994. [RFC-1800] Postel, J., "Internet Official Protocol Standards", STD 1, RFC 1800, USC/Information Sciences Institute, July 1995. [RFC-1810] Touch, J., "Report on MD5 Performance", RFC 1810, USC/Information Sciences Institute, June 1995. [RFC-1825] Atkinson, R., "Security Architecture for the Internet Protocol", RFC 1825, NRL, August 1995. [RFC-1826] Atkinson, R., "IP Authentication Header", RFC 1826, NRL August 1995. [Schneier94] Schneier, B., "Applied Cryptography", John Wiley & Sons, New York, NY, 1994. ISBN 0-471-59756-2 [vow94] van Oorschot, P. C., and Wiener, M. J., "Parallel Collision Search with Applications to Hash Functions and Discrete Logarithms", Proceedings of the 2nd ACM Conf. Computer and Communications Security, Fairfax, VA, November 1994. Metzger & Simpson Standards Track [Page 4]

Author s Address Questions about this memo can also be directed to: Perry Metzger Piermont Information Systems Inc. 160 Cabrini Blvd., Suite #2 New York, NY 10033 perry@piermont.com William Allen Simpson Daydreamer Computer Systems Consulting Services 1384 Fontaine Madison Heights, Michigan 48071 Bill.Simpson@um.cc.umich.edu bsimpson@morningstar.com Metzger & Simpson Standards Track [Page 5]