Hi, folks. The IESG has received a last call comment recommending
that the new rc4 cipher for ssh be published as informational rather
than as a proposed standard because of weaknesses in rc4. It would be
inappropriate to make a decision based on one comment so I am
soliciting comments on this point.
The argument in favor of publishing this document at proposed is that
the existing arcfour cipher is part of a standard and that many other
IETF protocols use rc4 in standards track documents.
Please submit comments to ietf(_at_)ietf(_dot_)org or iesg(_at_)ietf(_dot_)org
on this issue
Included below is a partial bibliography of RC4 attacks provided to
the IESG by the person making the original comment.
S. Fluhrer, I. Mantin, & A. Shamir, "Weaknesses in the Key Scheduling
Algorithm of RC4", Proceedings of 8th Annual International Workshop
on Selected areas in Cryptography (SAC 2001), Toronto, ON, CA,
J. D. Golic, "Linear Statistical Weakness of RC4 Key Generator",
Procedings of EuroCrypt 1997, Konstanz, DE, May 1997.
S. Fluhrer & D. McGrew, "Statistical Analysis of the RC4 Key
Generator", Proceedings of 7th International Workshop on Fast
Software Encryption (FSE 2000), New York, NY, US, April 2000.
S. Mister & S.E. Tavares, "Cryptanalysis of RC4-like Ciphers",
Proceedings of 5th Annual International Workshop on Selected
Areas in Cryptography (SAC 1998), Kingston, ON, CA, August 1998.
L. Knudsen, W. Meier, B. Preneel, V. Rijmen, & S. Verdoolaege,
"Analysis Method for RC4", Proceedings of AsiaCrypt 1998.
R. Wash, "Lecture Notes on Stream Ciphers and RC4", unpublished,
Case Western Reserve University, OH, US
S. Paul & B. Preneel, "Analysis of Non-fortuitous Predictive States
of the RC4 Key Generator", Proceedings of 4th International Conference
on Cryptology in India (IndoCrypt 2003), New Delhi, IN, December 2003.
Ietf mailing list