Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

The ESP CBC-Mode Cipher Algorithms (RFC2451)

IP.com Disclosure Number: IPCOM000003029D
Original Publication Date: 1998-Nov-01
Included in the Prior Art Database: 2000-Sep-13
Document File: 11 page(s) / 24K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Pereira: AUTHOR [+2]

Abstract

This document describes how to use CBC-mode cipher algorithms with the IPSec ESP (Encapsulating Security Payload) Protocol. It not only clearly states how to use certain cipher algorithms, but also how to use all CBC-mode cipher algorithms.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 11% of the total text.

Network Working Group R. Pereira

Request for Comments: 2451 TimeStep Corporation

Category: Standards Track R. Adams

Cisco Systems Inc.

November 1998

The ESP CBC-Mode Cipher Algorithms

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1998). All Rights Reserved.

Abstract

This document describes how to use CBC-mode cipher algorithms with

the IPSec ESP (Encapsulating Security Payload) Protocol. It not only

clearly states how to use certain cipher algorithms, but also how to

use all CBC-mode cipher algorithms.

Table of Contents

1. Introduction...................................................2

1.1 Specification of Requirements...............................2

1.2 Intellectual Property Rights Statement......................2

2. Cipher Algorithms..............................................2

2.1 Mode........................................................3

2.2 Key Size....................................................3

2.3 Weak Keys...................................................4

2.4 Block Size and Padding......................................5

2.5 Rounds......................................................6

2.6 Backgrounds.................................................6

2.7 Performance.................................................8

3. ESP Payload....................................................8

3.1 ESP Environmental Considerations............................9

3.2 Keying Material.............................................9

4. Security Considerations........................................9

5. References....................................................10

6. Acknowledgments...............................................11

7. Editors' Addresses............................................12

8. Full Copyright Statement......................................14

1. Introduction

The Encapsulating Security Payload (ESP) [Kent98] provides

confidentiality for IP datagrams by encrypting the payload data to be

protected. This specification describes the ESP use of C...