1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
|
Transport Layer Security Working Group John Banes
INTERNET-DRAFT Microsoft Corporation
Expires January, 2002 Richard Harrington
Qpass Incorporated
July 19, 2001
56-bit Export Cipher Suites For TLS
draft-ietf-tls-56-bit-ciphersuites-01.txt
1. Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of Section 10 of RFC2026. Internet-Drafts are working documents of
the Internet Engineering Task Force (IETF), its areas, and its
working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or made obsolete by other documents at
any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
2. Introduction
This document describes several cipher suites to be used with the
Transport Layer Security (TLS) protocol. Changes in US export
regulations in 1999 permitted the export of software programs
using 56-bit data encryption and 1024-bit key exchange.
The cipher suites described in this document were designed to take
advantage of this change in the regulations.
3. The CipherSuites
The following values define the CipherSuite codes used in the client
hello and server hello messages.
The following CipherSuite definitions require that the server
provide an RSA certificate that can be used for key exchange. The
server may request either an RSA or a DSS signature-capable
certificate in the certificate request message.
CipherSuite TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA = { 0x00,0x62 };
CipherSuite TLS_RSA_EXPORT1024_WITH_RC4_56_SHA = { 0x00,0x64 };
Banes Expires January, 2002 [Page 1]
INTERNET-DRAFT 56-bit Export TLS January 15, 1999
The following CipherSuite definitions are used for
server-authenticated (and optionally client-authenticated)
Diffie-Hellman. DHE denotes ephemeral Diffie-Hellman, where the
Diffie-Hellman parameters are signed by a DSS certificate, which
has been signed by the CA.
CipherSuite TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA = { 0x00,0x63 };
CipherSuite TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA = { 0x00,0x65 };
CipherSuite TLS_DHE_DSS_WITH_RC4_128_SHA = { 0x00,0x66 };
4. CipherSuite definitions
CipherSuite Is Key Cipher Hash
Exportable Exchange
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA * RSA_EXPORT1024 DES_CBC SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA * RSA_EXPORT1024 RC4_56 SHA
TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA * RSA_EXPORT1024 DES_CBC SHA
TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA * DHE_DSS_EXPORT1024 RC4_56 SHA
TLS_DHE_DSS_WITH_RC4_128_SHA DHE_DSS RC4_128 SHA
* Indicates IsExportable is True
Key
Exchange
Algorithm Description Key size limit
RSA_EXPORT1024 RSA key exchange RSA = 1024 bits
DHE_DSS_EXPORT1024 Ephemeral DH with DSS signatures DH = 1024 bits
Key size limit
The key size limit gives the size of the largest public key that
can be legally used for encryption in cipher suites that are
exportable.
Key Expanded Effective IV Block
Cipher Type Material Key Material Key Bits Size Size
RC4_56 Stream 7 16 56 0 N/A
DES_CBC Block 8 8 56 8 8
5. Implementation Notes
When an RSA_EXPORT1024 cipher suite is used, and the server's RSA
Key is larger than 1024 bits in length, then the server must send
a server key exchange message to the client. This message is to
contain a temporary RSA key, signed by the server. This temporary
RSA key should be the maximum allowable length (i.e., 1024 bits).
Banes Expires January, 2002 [Page 2]
INTERNET-DRAFT 56-bit Export TLS January 15, 1999
Servers with a large RSA key will often maintain two temporary RSA
keys: a 512-bit key used to support the RSA_EXPORT cipher suites,
and a 1024-bit key used to support the RSA_EXPORT1024 cipher suites.
When 56-bit DES keys are derived for an export cipher suite, the
additional export key derivation step must be performed. That is,
the final read and write DES keys (and the IV) are not taken
directly from the key_block.
6. References
[TLS] T. Dierks, C. Allen, The TLS Protocol,
<draft-ietf-tls-protocol-06.txt>, November 1998.
7. Authors
John Banes Richard Harrington
Microsoft Corp. Qpass Inc.
jbanes@microsoft.com rharrington@qpass.com
Banes Expires January, 2002 [Page 3]
|