summaryrefslogtreecommitdiff
path: root/doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt')
-rw-r--r--doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt171
1 files changed, 0 insertions, 171 deletions
diff --git a/doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt b/doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt
deleted file mode 100644
index 7a8dd97dcb..0000000000
--- a/doc/protocol/draft-ietf-tls-56-bit-ciphersuites-01.txt
+++ /dev/null
@@ -1,171 +0,0 @@
-
-
-
-
-
-
-Transport Layer Security Working Group John Banes
-INTERNET-DRAFT Microsoft Corporation
-Expires January, 2002 Richard Harrington
- Qpass Incorporated
- July 19, 2001
-
- 56-bit Export Cipher Suites For TLS
- draft-ietf-tls-56-bit-ciphersuites-01.txt
-
-1. Status of this Memo
-
- This document is an Internet-Draft and is subject to all provisions
- of Section 10 of RFC2026. Internet-Drafts are working documents of
- the Internet Engineering Task Force (IETF), its areas, and its
- working groups. Note that other groups may also distribute
- working documents as Internet-Drafts.
-
- Internet-Drafts are draft documents valid for a maximum of six months
- and may be updated, replaced, or made obsolete by other documents at
- any time. It is inappropriate to use Internet-Drafts as reference
- material or to cite them other than as "work in progress."
-
- The list of current Internet-Drafts can be accessed at
- http://www.ietf.org/1id-abstracts.html
-
- The list of Internet-Draft Shadow Directories can be accessed at
- http://www.ietf.org/shadow.html
-
-
-2. Introduction
-
- This document describes several cipher suites to be used with the
- Transport Layer Security (TLS) protocol. Changes in US export
- regulations in 1999 permitted the export of software programs
- using 56-bit data encryption and 1024-bit key exchange.
- The cipher suites described in this document were designed to take
- advantage of this change in the regulations.
-
-3. The CipherSuites
-
- The following values define the CipherSuite codes used in the client
- hello and server hello messages.
-
- The following CipherSuite definitions require that the server
- provide an RSA certificate that can be used for key exchange. The
- server may request either an RSA or a DSS signature-capable
- certificate in the certificate request message.
-
- CipherSuite TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA = { 0x00,0x62 };
- CipherSuite TLS_RSA_EXPORT1024_WITH_RC4_56_SHA = { 0x00,0x64 };
-
-
-Banes Expires January, 2002 [Page 1]
- INTERNET-DRAFT 56-bit Export TLS January 15, 1999
-
-
- The following CipherSuite definitions are used for
- server-authenticated (and optionally client-authenticated)
- Diffie-Hellman. DHE denotes ephemeral Diffie-Hellman, where the
- Diffie-Hellman parameters are signed by a DSS certificate, which
- has been signed by the CA.
-
- CipherSuite TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA = { 0x00,0x63 };
- CipherSuite TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA = { 0x00,0x65 };
- CipherSuite TLS_DHE_DSS_WITH_RC4_128_SHA = { 0x00,0x66 };
-
-
-4. CipherSuite definitions
-
-CipherSuite Is Key Cipher Hash
- Exportable Exchange
-
-TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA * RSA_EXPORT1024 DES_CBC SHA
-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA * RSA_EXPORT1024 RC4_56 SHA
-TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA * RSA_EXPORT1024 DES_CBC SHA
-TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA * DHE_DSS_EXPORT1024 RC4_56 SHA
-TLS_DHE_DSS_WITH_RC4_128_SHA DHE_DSS RC4_128 SHA
-
-* Indicates IsExportable is True
-
- Key
- Exchange
- Algorithm Description Key size limit
-
- RSA_EXPORT1024 RSA key exchange RSA = 1024 bits
- DHE_DSS_EXPORT1024 Ephemeral DH with DSS signatures DH = 1024 bits
-
- Key size limit
- The key size limit gives the size of the largest public key that
- can be legally used for encryption in cipher suites that are
- exportable.
-
- Key Expanded Effective IV Block
- Cipher Type Material Key Material Key Bits Size Size
-
- RC4_56 Stream 7 16 56 0 N/A
- DES_CBC Block 8 8 56 8 8
-
-
-5. Implementation Notes
-
- When an RSA_EXPORT1024 cipher suite is used, and the server's RSA
- Key is larger than 1024 bits in length, then the server must send
- a server key exchange message to the client. This message is to
- contain a temporary RSA key, signed by the server. This temporary
- RSA key should be the maximum allowable length (i.e., 1024 bits).
-
-
-Banes Expires January, 2002 [Page 2]
- INTERNET-DRAFT 56-bit Export TLS January 15, 1999
-
-
- Servers with a large RSA key will often maintain two temporary RSA
- keys: a 512-bit key used to support the RSA_EXPORT cipher suites,
- and a 1024-bit key used to support the RSA_EXPORT1024 cipher suites.
-
- When 56-bit DES keys are derived for an export cipher suite, the
- additional export key derivation step must be performed. That is,
- the final read and write DES keys (and the IV) are not taken
- directly from the key_block.
-
-6. References
-
- [TLS] T. Dierks, C. Allen, The TLS Protocol,
- <draft-ietf-tls-protocol-06.txt>, November 1998.
-
-7. Authors
-
- John Banes Richard Harrington
- Microsoft Corp. Qpass Inc.
- jbanes@microsoft.com rharrington@qpass.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Banes Expires January, 2002 [Page 3]