rfc9206v2.txt   rfc9206.txt 
skipping to change at line 203 skipping to change at line 203
User Interface (UI) suites [RFC4308] are named suites that cover some User Interface (UI) suites [RFC4308] are named suites that cover some
typical security policy options for IPsec. Use of UI suites does not typical security policy options for IPsec. Use of UI suites does not
change the IPsec protocol in any way. The following UI suites change the IPsec protocol in any way. The following UI suites
provide cryptographic algorithm choices for ESP [RFC4303] and for provide cryptographic algorithm choices for ESP [RFC4303] and for
IKEv2 [RFC7296]. The selection of a UI suite will depend on the key IKEv2 [RFC7296]. The selection of a UI suite will depend on the key
exchange algorithm. The suite names indicate the Advanced Encryption exchange algorithm. The suite names indicate the Advanced Encryption
Standard [FIPS197] mode, AES key length specified for encryption, and Standard [FIPS197] mode, AES key length specified for encryption, and
the key exchange algorithm. the key exchange algorithm.
Although RSA is also a CNSA-approved key establishment algorithm, Although RSA is also a CNSA-approved key establishment algorithm,
only DH or ECDH are specified for key exchange in IKEv2 [RFC7296]. only DH and ECDH are specified for key exchange in IKEv2 [RFC7296].
RSA in IPsec is used only for digital signatures. See Section 6. RSA in IPsec is used only for digital signatures. See Section 6.
ESP requires negotiation of both a confidentiality algorithm and an ESP requires negotiation of both a confidentiality algorithm and an
integrity algorithm. However, algorithms for Authenticated integrity algorithm. However, algorithms for Authenticated
Encryption with Associated Data (AEAD) [RFC5116] do not require a Encryption with Associated Data (AEAD) [RFC5116] do not require a
separate integrity algorithm to be negotiated. In particular, since separate integrity algorithm to be negotiated. In particular, since
AES-GCM is an AEAD algorithm, ESP implementing AES-GCM MUST either AES-GCM is an AEAD algorithm, ESP implementing AES-GCM MUST either
offer no integrity algorithm or indicate the single integrity offer no integrity algorithm or indicate the single integrity
algorithm NONE (see Section 3.3 of [RFC7296]). algorithm NONE (see Section 3.3 of [RFC7296]).
skipping to change at line 349 skipping to change at line 349
9. The Key Exchange Payload in the IKE_SA_INIT Exchange 9. The Key Exchange Payload in the IKE_SA_INIT Exchange
The key exchange payload is used to exchange Diffie-Hellman public The key exchange payload is used to exchange Diffie-Hellman public
numbers as part of a Diffie-Hellman key exchange. The CNSA-compliant numbers as part of a Diffie-Hellman key exchange. The CNSA-compliant
initiator and responder MUST each generate an ephemeral key pair to initiator and responder MUST each generate an ephemeral key pair to
be used in the key exchange. be used in the key exchange.
If the Elliptic Curve Diffie-Hellman (ECDH) key exchange is selected If the Elliptic Curve Diffie-Hellman (ECDH) key exchange is selected
for the SA, the initiator and responder both MUST generate an for the SA, the initiator and responder both MUST generate an
elliptic curve (EC) key pair using the P-384 elliptic curve. elliptic curve (EC) key pair using the P-384 elliptic curve. The
ephemeral public keys MUST be stored in the key exchange payload as
described in [RFC5903].
If the Diffie-Hellman (DH) key exchange is selected for the SA, the If the Diffie-Hellman (DH) key exchange is selected for the SA, the
initiator and responder both MUST generate a key pair using the initiator and responder both MUST generate a key pair using the
appropriately sized MODP group as described in [RFC3526]. The size appropriately sized MODP group as described in [RFC3526]. The size
of the MODP group will be determined by the selection of either a of the MODP group will be determined by the selection of either a
3072-bit or greater modulus for the SA. 3072-bit or greater modulus for the SA.
10. Generating Key Material for the IKE SA 10. Generating Key Material for the IKE SA
As noted in Section 7 of [RFC5903], the shared secret result of an As noted in Section 7 of [RFC5903], the shared secret result of an
 End of changes. 2 change blocks. 
2 lines changed or deleted 4 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/