Addition of Camellia Elliptic Curve Cipher Suites with SHA-1 and SHA-2
NTT Software Corporation
+81-45-212-7577+81-45-212-9800kanno-s@po.ntts.co.jp
Nippon Telegraph and Telephone Corporation
+81-422-59-3456+81-422-59-4015 kanda.masayuki@lab.ntt.co.jp
Security
Network Working GroupBlock CipherSecurityCamelliaECCTLSCBCSHA2SHA
This document specifies a set of elliptic curve cipher suites
for the Transport Security Layer (TLS) protocol to support
the Camellia encryption algorithm as a block cipher.
This document describes sixteen new cipher suites for TLS that
specify HMAC-SHA1 and HMAC-SHA2.
This document specifies a set of elliptic curve cipher suites
for the Transport Security Layer (TLS) protocol to support
the Camellia encryption algorithm as a block cipher.
This document describes sixteen new cipher suites for TLS that
specify HMAC-SHA1 and HMAC-SHA2.
The algorithm specification and object identifiers are described in
.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in .
This document defines sixteen new cipher suites to be added to TLS.
All use Elliptic Curve Cryptography for key exchange and digital
signature, as defined in .
The sixteen cipher suites use Camellia in Cipher
Block Chaining (CBC) mode with HMAC-based MAC.
The cipher suites defined here have the following identifiers:
IANA is requested to allocate the following numbers
in the TLS Cipher Suite Registry:
At the time of writing this document, there are no known weak keys
for Camellia.
The security considerations in RFC 5289 apply to this document as well.
&RFC2119;
&RFC3713;
&RFC4492;
&RFC5289;