|
|
Subscribe / Log in / New account

OpenSSL incorporates the Camellia cypher

From:  "JCN Newswire" <newsroom-AT-japancorp.net>
To:  <pr-AT-lwn.net>
Subject:  The Open Source Community OpenSSL Project Adopts the Next Generation International Standard Cipher 'Camellia', Developed in Japan
Date:  Wed, 8 Nov 2006 21:25:59 +0900

The Open Source Community OpenSSL Project Adopts the Next Generation
International Standard Cipher 'Camellia', Developed in Japan

Tokyo, Japan, Nov. 08, 2006 - (JCN Newswire) - The OpenSSL Project, an
international open source community, adopted "Camellia," a 128-bit block
cipher(1) algorithm jointly developed in 2000 by Nippon Telegraph and
Telephone Corporation ('NTT') and Mitsubishi Electric Corporation
('Mitsubishi'), into its OpenSSL toolkit for use in the development of
SSL/TLS(2) protocol.

To support a secure advanced information society, and with the goal of
disseminating Camellia, which was selected as a major international
standard and recommended cipher, NTT released Camellia source codes as
open source on April 13, 2006 so that Camellia can be freely used as an
international basic technology. NTT has also provided its source codes to
open source communities.

As a result, in September of this year Camellia was incorporated into
OpenSSL version 0.9.8c.

The adoption of Camellia into the OpenSSL toolkit means that Camellia
provides security and performance equivalent to the US government standard
cipher AES(3) and is the world's only alternative to AES. From now on,
since the OpenSSL toolkit equipped with Camellia will be installed into
WWW servers worldwide and used as a world leading open cryptographic
toolkit, we anticipate that Camellia will be spread even further through
its use and commercialization on a global scale.

Camellia Website: http://info.isl.ntt.co.jp/crypt/eng/camellia/index.html
Information related to open source:
http://info.isl.ntt.co.jp/crypt/eng/camellia/source.html
OpenSSL Project Website: http://www.openssl.org/


Background and Significance of Adoption into OpenSSL

Camellia, the next generation encryption algorithm that provides the
world's highest security and performance, is an international standard and
recommended cipher. Camellia was selected into the first ISO/IEC
international standard cipher(4), EU (NESSIE) recommended cipher(5), and
Japanese e-government recommended cipher(6), and is internationally
recognized as the de facto representative of Japanese encryption
algorithm. Furthermore, Camellia was adopted as the IETF standard track
RFC(7) encryption algorithm in mainstream Internet encryption
communications protocols such as SSL/TLS, IPsec, S/MIME, and XML.

NTT released free of charge the source codes (C language and Java) as open
source and is providing an environment in which any Camellia users can use
the Camellia essential patents at no charge without concluding the
royalty-free licensing agreement so that more people can benefit from the
merits of Camellia, which are highly evaluated worldwide. Furthermore, NTT
is providing the Camellia source codes to open source communities and
undertaking continuous activities for adoption.

The OpenSSL toolkit has three types of functionality: SSL/TLS de facto
stack, encryption engine, and PKI application development toolkit.

Many current standard ciphers, such as Triple DES and RC4, are available
in it as engines for symmetric key encryption, but only AES has been
supported as the next generation encryption algorithm in OpenSSL version
0.9.7 and later. This time since Camellia will be equipped in OpenSSL
version 0.9.8c and later, an environment* is available in which multiple
ciphers can be used as next generation encryption algorithms, and we
believe that this will contribute to the actualization of more secure
advanced information society.

Currently, more than 60% of the WWW servers worldwide have the OpenSSL
toolkit installed, and in the future Camellia will be sequentially
installed into these servers. Since the OpenSSL toolkit is used in various
commercial developments and the selection of Camellia can be made easily,
we anticipate that the use and commercial development of Camellia will
accelerate.


Significance of Disclosing Specifications and Releasing Camellia as Open
Source

From the beginning, the specification for Camellia was publicly disclosed,
and cryptographic researchers worldwide have already evaluated the
security and performance of the algorithm a great many times. The
evaluation results were published in reports and presented at
international cryptographic conferences, etc. These form the technical
basis for the reputation of Camellia as one of the world's most excellent
encryption algorithm and provide the rationale behind its selection as the
internationally standardized and recommended specifications.

In the future, since the open source code of Camellia incorporated in the
OpenSSL toolkit will be distributed worldwide, engineers around the world
will evaluate, improve, and implement Camellia codes as part of
implementation process. We anticipate that it will become easier to use
Camellia.

Although, for practical products, vulnerability in the implementation
could be a threat to the reliability and security, engineers worldwide
will inspect the implementation by disclosing the encryption engine as
open source in the same way as the algorithm is disclosed. Therefore we
anticipate that the security based on that implementation will improve as
a result.


Merits and History of Camellia

Camellia is a 128-bit block cipher (with allowable key lengths of 128,
192, and 256 bits) that was jointly developed by NTT and Mitsubishi in
2000. Camellia not only maintains the world's highest security, but also
can be built into high-speed software implementation independent of the
platform such as PCs or IC cards and the world's smallest hardware
implementation with the highest efficiency among 128-bit block ciphers.
That is, Camellia is simultaneously equipped with excellent security and
performance.

According to third party evaluations and verifications performed by many
cryptographers worldwide over the last few years concerning these
features, compared to the current mainstream 64-bit block cipher Triple
DES, the security of Camellia is extraordinarily high and the processing
speed is four to five times faster. Based on these results, Camellia is
internationally recognized as Japan's representative cipher with security
and performance equivalent to those of AES, and the world's only 128-bit
block cipher alternative to AES.

Camellia, with NTT's fundamental objective of sound development of the
advanced information society as a criterion to open source, has followed
the sequence of events provided below to arrive at its current state.

March 2000:    Camellia encryption algorithm is released by NTT and
Mitsubishi
April 2001:    Camellia royalty-free licenses are granted
Feb. 2003:     Camellia is selected as the Japanese e-government
recommended
                cipher by CRYPTREC
February 2003: Camellia is selected as the European Union recommended
cipher
                by NESSIE
February 2003: Camellia is adopted as the DRM encryption by TV-Anytime
Forum
January 2004:  Camellia is accepted as the IETF standard cipher
                for S/MIME [RFC3657]
April 2005:    Camellia is accepted as the IETF standard cipher
                for XML security URIs [RFC4051]
May 2005:      Camellia is adopted as the ISO/IEC standard cipher
[ISO/IEC18033-3]
July 2005:     Camellia is accepted as the IETF standard cipher for
                SSL/TLS Cipher suites [RFC4132]
December 2005: Camellia is accepted as the IETF standard cipher for
                IPsec [RFC4312]
April 2006:    Open source codes of Camellia are released
Sept. 2006:    Camellia is adopted into OpenSSL
                (adopted from OpenSSL version 0.9.8c)

Future Plan

In order to widen further the use of Camellia, NTT did not stop working
with the adoption of Camellia into the OpenSSL toolkit. It is continuing
with activities toward the adoption into other open source communities
such as Linux and FreeBSD.
Furthermore, in addition to NTT's positively influencing development of
products and services equipped with Camellia, we plan to cooperate with
hopeful corporations and enterprises for their development,
industrialization, and introduction of Camellia-equipped products.


Glossary

1) 128-bit block cipher
The 128-bit block cipher is a symmetric key encryption that encrypts data
in 128-bit long (the size of the data bundle) blocks. Symmetric key
encryption is an encryption scheme that uses the same secret key to
encrypt and decrypt data. Since it achieves high-speed processing, it is
used widely in various applications such as communication sessions that
deal with large-volume data, file encryption, and mobile terminal
authentication.
64-bit block ciphers (64-bit long blocks) such as Triple DES and MISTY1
were constructed by the mid 1990's. And 128-bit block ciphers such as
Camellia and AES were produced in and after the second half of the 1990's.

2) SSL/TLS (Secure Socket Layer /Transport Layer Security)
The Netscape Communications Corporation developed the SSL protocol, which
provides a secure communications mechanism by encrypting transmitted data
for Internet communications. The next version of SSL3.0 was renamed as TLS
and was standardized by the IETF.
Since SSL/TLS is normally equipped in current browsers such as IE and
Firefox, when accessing sites such as EC sites and services such as
internet banking, it is common that SSL/TLS is used when transmitting
passwords, credit card numbers, and personal information. Recently, in
many sites where encrypted communications is required, SSL/TLS is
automatically used without the user's awakening.

3) AES (Advanced Encryption Standard)
In 2001, the National Institute of Standards and Technology (NIST)
established the US Government standard 128-bit block cipher called the
Advanced Encryption Standard. The AES project ran from 1997 to 2000, and
AES was based on the "Rijndael" algorithm, proposed by J. Daemen and V.
Rijmen, whose security and performance were considered to be the highest
among the proposed algorithms.

4) ISO/IEC international standard ciphers
These are the first international standard cipher algorithms selected by
the International Organization for Standardization (ISO) and International
Electrotechnical Commission (IEC). After changing the focus from
ISO/IEC9979 (encryption algorithm registration system), ISO/IEC18033 was
standardized as the first international standard cipher, based on third
party (NESSIE, CRYPTREC, etc.) security and performance evaluation
reports. The 128-bit block ciphers, AES, Camellia, and SEED, are the only
ciphers adopted as the next generation standard.

5) EU recommended ciphers
These are recommended encryption primitives selected based on high-level
security and performance by the New European Schemes for Signature,
Integrity, and Encryption (NESSIE) project conducted from 2000 to 2003 by
the European Union (EU). Out of the total 44, including the 39 proposed
encryption algorithms, 17 encryption algorithms were selected. The
Japanese ciphers Camellia (128-bit block cipher by NTT/Mitsubishi), MISTY1
(64-bit block cipher by Mitsubishi), and PSEC-KEM (Public key encryption
by NTT) were selected.

6) Japanese e-government recommended ciphers
These are recommended cryptographic techniques suitable for the Japanese
electronic government selected by the Cryptography Research and Evaluation
Committees (CRYPTREC) organized to investigate and evaluate them from the
viewpoints of various objective specialists in terms of security. Out of
the total 66, including the 52 proposed encryption techniques, 31
encryption techniques were selected.

7) Standard Track RFC (Standard Track Requests For Comments)
This is an official draft document opened to the public as a specification
for an Internet Standard.
The RFC number is given to all documents that the IETF issues. They are
classified into Standard Track RFC for which the IETF holds a standard
discussion, approves, and manages as Internet standards, and Non-standard
Track RFC which is opened to the public with the aim of dissemination.

About NTT
NTT Group is comprised of NTT (the holding company) and 542 subsidiaries
and affiliates (of which 397 are consolidated subsidiaries). NTT Group's
principal business activities are regional communications, long distance
and international communications, mobile communications, and data
communications. As the leader of Japan's telecommunications industry, NTT
Group has devoted its efforts to the growth of the market. With a
full-scale broadband and ubiquitous era approaching, NTT Group is
endeavoring to anticipate the needs of the times and changes in the
Information Technology (IT) market and take full advantage of the Group's
management resources to develop new broadband businesses that will serve
as new revenue sources into the future. The NTT Group is also focusing its
efforts on the development of its fiber-optic access infrastructure and
the creation of a next-generation totally Internet Protocol (IP) based
network. For more information, please visit www.ntt.co.jp.

Contact

Chizuka, Sano, Nakamura
Public Relations Section
Planning Department
NTT Information Sharing Laboratory Group
Nippon Telegraph and Telephone Corporation
Phone: +81-422-59-3663
E-mail: islg-pr@lab.ntt.co.jp

Nov. 08, 2006, 18:36 (JST)
Source: NTT
NTT (TSE: 9432)
http://www.ntt.co.jp/index_e.html
>From the Japan Corporate News Network

View NTT 's Company Profile On JCN Network
http://www.japancorp.net/company_show.asp?compid=3182

http://www.japancorp.net
Topic: Press release summary
Sectors: Programming and Development, Communications, IT General, Linux &
Open Source


Copyright(C) 2006 www.japancorp.net JCN Newswire. A division of Japan
Corporate News Network KK. All rights reserved.

If you believe you have received this news in error or would like to be
removed from our mailing list please respond to
https://www.japancorp.net/unsubscribe.asp and you will be removed from our
mailing list.



to post comments

OpenSSL incorporates the Camellia cypher

Posted Nov 8, 2006 20:28 UTC (Wed) by nix (subscriber, #2304) [Link]

I think you mean `NTT has sent out'. I can't see much sign that OpenSSL
itself was involved in this: among other things, if it were, wouldn't it
have been likely to send out a press release about Camellia's
incorporation into 0.9.8c at around the time 0.9.8c was released, or at
the very least before it became obsolete? (0.9.8d was released well over a
month ago.)

This looks like puffery from NTT, nothing more.

OpenSSL incorporates the Camellia cypher

Posted Nov 9, 2006 14:29 UTC (Thu) by i3839 (guest, #31386) [Link] (3 responses)

Googling and comparing a bit it appears that Camellia is both much slower and bigger in binary size than Rijndael (the cipher used in AES) is. I doubt that it's really that more secure, and they say it's comparable to AES, so it probably isn't. Maybe in hardware it's smaller and faster, but for software I see nor reason why Camellia should be prefered.

OpenSSL incorporates the Camellia cypher

Posted Nov 10, 2006 8:50 UTC (Fri) by khim (subscriber, #9252) [Link]

Maybe in hardware it's smaller and faster

Probably not: I do know that it's possible to implement AES in 256 bytes for 4bit CPU (some embedded Samsung CPU; my friend did it - full implementation, not just the code), so any advantage Camellia has there is marginal.

Did some googling myself

Posted Nov 10, 2006 15:23 UTC (Fri) by jd (guest, #26381) [Link] (1 responses)

Found a reference to a potential attack on Camellia. The cipher is not listed in the Block Cipher Lounge, far as I can tell, so it's hard to know if this attack claim still stands. Nonetheless, I would be a little wary of it.

Does that mean OpenSSL shouldn't include it? No. I believe a cipher library should provide the greatest flexibility and then DISABLE everything that isn't watertight unless the user specifically wants it. (Why? Because if you're wanting to work with legacy systems or systems secured a specific way through policy, you can't afford to be picky. The rest of the world is however it is.)

Did some googling myself

Posted Nov 12, 2006 13:49 UTC (Sun) by i3839 (guest, #31386) [Link]

Sure OpenSSL should include it, but it makes one wonder why anyone would prefer Camellia above other, apparently better ciphers. As I am looking around a bit for which cipher to use, I couldn't help notice that I didn't encounter a single advantage. What a contrast to the marketing message.

Most ciphers have a potential attack, it's what is deemed the weakest spot of the cipher. Most are also broken for reduced versions (less encryption rounds than the full version). I don't remember the exact numbers, but e.g. Rijndael is insecure up till 6 rounds, but the normal version uses something like 12 rounds (which isn't twice as secure, but much more).

OpenSSL incorporates the Camellia cypher

Posted Nov 9, 2006 20:45 UTC (Thu) by TRauMa (guest, #16483) [Link] (2 responses)

No CAMELLIA-128-ECB in my (gentoo) openssl, so I guess it isn't compiled in by default - I presume "From now on, since the OpenSSL toolkit equipped with Camellia will be installed into WWW servers worldwide and used as a world leading open cryptographic toolkit, we anticipate that Camellia will be spread even further through its use and commercialization on a global scale." is japanese for "This is a fringe cipher we managed to get into openssl, so interested parties can activate it more easily, but don't expect it to be enabled on your system."

OpenSSL incorporates the Camellia cypher

Posted Oct 7, 2008 13:44 UTC (Tue) by TRauMa (guest, #16483) [Link] (1 responses)

How time flies - today I noticed that a vanilla Windows Firefox 3.0.3, connecting to my Gentoo Apache, negotiates Camellia-256 as encryption algorithm. Time to find out how openssl selects ciphers if there are multiple choices, I guess.

OpenSSL incorporates the Camellia cypher

Posted Oct 7, 2008 14:08 UTC (Tue) by TRauMa (guest, #16483) [Link]

OK, if anyone happens to read this, the Camellia team managed to get their cipher into NSS, and in the default security-prefs.js of a recent Firefox, the camellia options precede the AES options, so if your openssl has camellia support included, all recent Firefoxes will negotiate it over AES. Sneaky. :)

More info: http://boblord.livejournal.com/16968.html

OpenSSL incorporates the Camellia cypher

Posted Nov 10, 2006 22:35 UTC (Fri) by zooko (guest, #2589) [Link]

I don't like this bit of puffery: "The world's only alternative to AES.". If you don't want to risk all your eggs in the AES basket, there are several good alternatives, such as Serpent, TwoFish, and Salsa20. You can also combine multiple ciphers. You can also tweak an existing cipher by e.g. adding rounds.


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds