Additional Key Algorithms for Host Identity ProtocolHelsinki Institute for Information TechnologyHIIT, PO Box 9800TKKFIN-02015Finlandoleg.ponomarev@hiit.fi
Host Identity Protocol
Host Identity ProtocolThis document specifies how to use Elliptic Curve
Cryptography (ECC) public-key algorithms in the Host Identity Protocol
(HIP)Elliptic Curve Cryptography (ECC) is an approach to public-key
cryptography offering equivalent security with smaller key sizes than
RSA or DSA . The smaller keys
result in less computational costs and therefore better performance for
HIP . Its reduced power consumption is
also important for mobile devices. This document describes additions to HIP to support ECC, applicable
to RFC5201 . ECC keys may be used both as Host
Identity to authenticate the hosts and in the Diffie-Hellman key
exchange to generate a piece of keying material.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.The following additional Group IDs MAY be used:The groups are defined in RFC 5114 .The following additional algorithm MAY be supported by the Host
Identity Protocol ImplementationsThis section will be added later on.This section will be added later on.NIST SP 800-57, Recommendation for Key Management — Part 1: General (Revised)