OpenSSL incorporates the Camellia cypher
From: | "JCN Newswire" <newsroom-AT-japancorp.net> | |
To: | <pr-AT-lwn.net> | |
Subject: | The Open Source Community OpenSSL Project Adopts the Next Generation International Standard Cipher 'Camellia', Developed in Japan | |
Date: | Wed, 8 Nov 2006 21:25:59 +0900 |
The Open Source Community OpenSSL Project Adopts the Next Generation International Standard Cipher 'Camellia', Developed in Japan Tokyo, Japan, Nov. 08, 2006 - (JCN Newswire) - The OpenSSL Project, an international open source community, adopted "Camellia," a 128-bit block cipher(1) algorithm jointly developed in 2000 by Nippon Telegraph and Telephone Corporation ('NTT') and Mitsubishi Electric Corporation ('Mitsubishi'), into its OpenSSL toolkit for use in the development of SSL/TLS(2) protocol. To support a secure advanced information society, and with the goal of disseminating Camellia, which was selected as a major international standard and recommended cipher, NTT released Camellia source codes as open source on April 13, 2006 so that Camellia can be freely used as an international basic technology. NTT has also provided its source codes to open source communities. As a result, in September of this year Camellia was incorporated into OpenSSL version 0.9.8c. The adoption of Camellia into the OpenSSL toolkit means that Camellia provides security and performance equivalent to the US government standard cipher AES(3) and is the world's only alternative to AES. From now on, since the OpenSSL toolkit equipped with Camellia will be installed into WWW servers worldwide and used as a world leading open cryptographic toolkit, we anticipate that Camellia will be spread even further through its use and commercialization on a global scale. Camellia Website: http://info.isl.ntt.co.jp/crypt/eng/camellia/index.html Information related to open source: http://info.isl.ntt.co.jp/crypt/eng/camellia/source.html OpenSSL Project Website: http://www.openssl.org/ Background and Significance of Adoption into OpenSSL Camellia, the next generation encryption algorithm that provides the world's highest security and performance, is an international standard and recommended cipher. Camellia was selected into the first ISO/IEC international standard cipher(4), EU (NESSIE) recommended cipher(5), and Japanese e-government recommended cipher(6), and is internationally recognized as the de facto representative of Japanese encryption algorithm. Furthermore, Camellia was adopted as the IETF standard track RFC(7) encryption algorithm in mainstream Internet encryption communications protocols such as SSL/TLS, IPsec, S/MIME, and XML. NTT released free of charge the source codes (C language and Java) as open source and is providing an environment in which any Camellia users can use the Camellia essential patents at no charge without concluding the royalty-free licensing agreement so that more people can benefit from the merits of Camellia, which are highly evaluated worldwide. Furthermore, NTT is providing the Camellia source codes to open source communities and undertaking continuous activities for adoption. The OpenSSL toolkit has three types of functionality: SSL/TLS de facto stack, encryption engine, and PKI application development toolkit. Many current standard ciphers, such as Triple DES and RC4, are available in it as engines for symmetric key encryption, but only AES has been supported as the next generation encryption algorithm in OpenSSL version 0.9.7 and later. This time since Camellia will be equipped in OpenSSL version 0.9.8c and later, an environment* is available in which multiple ciphers can be used as next generation encryption algorithms, and we believe that this will contribute to the actualization of more secure advanced information society. Currently, more than 60% of the WWW servers worldwide have the OpenSSL toolkit installed, and in the future Camellia will be sequentially installed into these servers. Since the OpenSSL toolkit is used in various commercial developments and the selection of Camellia can be made easily, we anticipate that the use and commercial development of Camellia will accelerate. Significance of Disclosing Specifications and Releasing Camellia as Open Source From the beginning, the specification for Camellia was publicly disclosed, and cryptographic researchers worldwide have already evaluated the security and performance of the algorithm a great many times. The evaluation results were published in reports and presented at international cryptographic conferences, etc. These form the technical basis for the reputation of Camellia as one of the world's most excellent encryption algorithm and provide the rationale behind its selection as the internationally standardized and recommended specifications. In the future, since the open source code of Camellia incorporated in the OpenSSL toolkit will be distributed worldwide, engineers around the world will evaluate, improve, and implement Camellia codes as part of implementation process. We anticipate that it will become easier to use Camellia. Although, for practical products, vulnerability in the implementation could be a threat to the reliability and security, engineers worldwide will inspect the implementation by disclosing the encryption engine as open source in the same way as the algorithm is disclosed. Therefore we anticipate that the security based on that implementation will improve as a result. Merits and History of Camellia Camellia is a 128-bit block cipher (with allowable key lengths of 128, 192, and 256 bits) that was jointly developed by NTT and Mitsubishi in 2000. Camellia not only maintains the world's highest security, but also can be built into high-speed software implementation independent of the platform such as PCs or IC cards and the world's smallest hardware implementation with the highest efficiency among 128-bit block ciphers. That is, Camellia is simultaneously equipped with excellent security and performance. According to third party evaluations and verifications performed by many cryptographers worldwide over the last few years concerning these features, compared to the current mainstream 64-bit block cipher Triple DES, the security of Camellia is extraordinarily high and the processing speed is four to five times faster. Based on these results, Camellia is internationally recognized as Japan's representative cipher with security and performance equivalent to those of AES, and the world's only 128-bit block cipher alternative to AES. Camellia, with NTT's fundamental objective of sound development of the advanced information society as a criterion to open source, has followed the sequence of events provided below to arrive at its current state. March 2000: Camellia encryption algorithm is released by NTT and Mitsubishi April 2001: Camellia royalty-free licenses are granted Feb. 2003: Camellia is selected as the Japanese e-government recommended cipher by CRYPTREC February 2003: Camellia is selected as the European Union recommended cipher by NESSIE February 2003: Camellia is adopted as the DRM encryption by TV-Anytime Forum January 2004: Camellia is accepted as the IETF standard cipher for S/MIME [RFC3657] April 2005: Camellia is accepted as the IETF standard cipher for XML security URIs [RFC4051] May 2005: Camellia is adopted as the ISO/IEC standard cipher [ISO/IEC18033-3] July 2005: Camellia is accepted as the IETF standard cipher for SSL/TLS Cipher suites [RFC4132] December 2005: Camellia is accepted as the IETF standard cipher for IPsec [RFC4312] April 2006: Open source codes of Camellia are released Sept. 2006: Camellia is adopted into OpenSSL (adopted from OpenSSL version 0.9.8c) Future Plan In order to widen further the use of Camellia, NTT did not stop working with the adoption of Camellia into the OpenSSL toolkit. It is continuing with activities toward the adoption into other open source communities such as Linux and FreeBSD. Furthermore, in addition to NTT's positively influencing development of products and services equipped with Camellia, we plan to cooperate with hopeful corporations and enterprises for their development, industrialization, and introduction of Camellia-equipped products. Glossary 1) 128-bit block cipher The 128-bit block cipher is a symmetric key encryption that encrypts data in 128-bit long (the size of the data bundle) blocks. Symmetric key encryption is an encryption scheme that uses the same secret key to encrypt and decrypt data. Since it achieves high-speed processing, it is used widely in various applications such as communication sessions that deal with large-volume data, file encryption, and mobile terminal authentication. 64-bit block ciphers (64-bit long blocks) such as Triple DES and MISTY1 were constructed by the mid 1990's. And 128-bit block ciphers such as Camellia and AES were produced in and after the second half of the 1990's. 2) SSL/TLS (Secure Socket Layer /Transport Layer Security) The Netscape Communications Corporation developed the SSL protocol, which provides a secure communications mechanism by encrypting transmitted data for Internet communications. The next version of SSL3.0 was renamed as TLS and was standardized by the IETF. Since SSL/TLS is normally equipped in current browsers such as IE and Firefox, when accessing sites such as EC sites and services such as internet banking, it is common that SSL/TLS is used when transmitting passwords, credit card numbers, and personal information. Recently, in many sites where encrypted communications is required, SSL/TLS is automatically used without the user's awakening. 3) AES (Advanced Encryption Standard) In 2001, the National Institute of Standards and Technology (NIST) established the US Government standard 128-bit block cipher called the Advanced Encryption Standard. The AES project ran from 1997 to 2000, and AES was based on the "Rijndael" algorithm, proposed by J. Daemen and V. Rijmen, whose security and performance were considered to be the highest among the proposed algorithms. 4) ISO/IEC international standard ciphers These are the first international standard cipher algorithms selected by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). After changing the focus from ISO/IEC9979 (encryption algorithm registration system), ISO/IEC18033 was standardized as the first international standard cipher, based on third party (NESSIE, CRYPTREC, etc.) security and performance evaluation reports. The 128-bit block ciphers, AES, Camellia, and SEED, are the only ciphers adopted as the next generation standard. 5) EU recommended ciphers These are recommended encryption primitives selected based on high-level security and performance by the New European Schemes for Signature, Integrity, and Encryption (NESSIE) project conducted from 2000 to 2003 by the European Union (EU). Out of the total 44, including the 39 proposed encryption algorithms, 17 encryption algorithms were selected. The Japanese ciphers Camellia (128-bit block cipher by NTT/Mitsubishi), MISTY1 (64-bit block cipher by Mitsubishi), and PSEC-KEM (Public key encryption by NTT) were selected. 6) Japanese e-government recommended ciphers These are recommended cryptographic techniques suitable for the Japanese electronic government selected by the Cryptography Research and Evaluation Committees (CRYPTREC) organized to investigate and evaluate them from the viewpoints of various objective specialists in terms of security. Out of the total 66, including the 52 proposed encryption techniques, 31 encryption techniques were selected. 7) Standard Track RFC (Standard Track Requests For Comments) This is an official draft document opened to the public as a specification for an Internet Standard. The RFC number is given to all documents that the IETF issues. They are classified into Standard Track RFC for which the IETF holds a standard discussion, approves, and manages as Internet standards, and Non-standard Track RFC which is opened to the public with the aim of dissemination. About NTT NTT Group is comprised of NTT (the holding company) and 542 subsidiaries and affiliates (of which 397 are consolidated subsidiaries). NTT Group's principal business activities are regional communications, long distance and international communications, mobile communications, and data communications. As the leader of Japan's telecommunications industry, NTT Group has devoted its efforts to the growth of the market. With a full-scale broadband and ubiquitous era approaching, NTT Group is endeavoring to anticipate the needs of the times and changes in the Information Technology (IT) market and take full advantage of the Group's management resources to develop new broadband businesses that will serve as new revenue sources into the future. The NTT Group is also focusing its efforts on the development of its fiber-optic access infrastructure and the creation of a next-generation totally Internet Protocol (IP) based network. For more information, please visit www.ntt.co.jp. Contact Chizuka, Sano, Nakamura Public Relations Section Planning Department NTT Information Sharing Laboratory Group Nippon Telegraph and Telephone Corporation Phone: +81-422-59-3663 E-mail: islg-pr@lab.ntt.co.jp Nov. 08, 2006, 18:36 (JST) Source: NTT NTT (TSE: 9432) http://www.ntt.co.jp/index_e.html >From the Japan Corporate News Network View NTT 's Company Profile On JCN Network http://www.japancorp.net/company_show.asp?compid=3182 http://www.japancorp.net Topic: Press release summary Sectors: Programming and Development, Communications, IT General, Linux & Open Source Copyright(C) 2006 www.japancorp.net JCN Newswire. A division of Japan Corporate News Network KK. All rights reserved. If you believe you have received this news in error or would like to be removed from our mailing list please respond to https://www.japancorp.net/unsubscribe.asp and you will be removed from our mailing list.
Posted Nov 8, 2006 20:28 UTC (Wed)
by nix (subscriber, #2304)
[Link]
This looks like puffery from NTT, nothing more.
Posted Nov 9, 2006 14:29 UTC (Thu)
by i3839 (guest, #31386)
[Link] (3 responses)
Posted Nov 10, 2006 8:50 UTC (Fri)
by khim (subscriber, #9252)
[Link]
Maybe in hardware it's smaller and faster Probably not: I do know that it's possible to implement AES in 256 bytes for 4bit CPU (some embedded Samsung CPU; my friend did it - full implementation, not just the code), so any advantage Camellia has there is marginal.
Posted Nov 10, 2006 15:23 UTC (Fri)
by jd (guest, #26381)
[Link] (1 responses)
Does that mean OpenSSL shouldn't include it? No. I believe a cipher
library should provide the greatest flexibility and then DISABLE
everything that isn't watertight unless the user specifically wants it.
(Why? Because if you're wanting to work with legacy systems or systems
secured a specific way through policy, you can't afford to be picky. The
rest of the world is however it is.)
Posted Nov 12, 2006 13:49 UTC (Sun)
by i3839 (guest, #31386)
[Link]
Most ciphers have a potential attack, it's what is deemed the weakest spot of the cipher. Most are also broken for reduced versions (less encryption rounds than the full version). I don't remember the exact numbers, but e.g. Rijndael is insecure up till 6 rounds, but the normal version uses something like 12 rounds (which isn't twice as secure, but much more).
Posted Nov 9, 2006 20:45 UTC (Thu)
by TRauMa (guest, #16483)
[Link] (2 responses)
Posted Oct 7, 2008 13:44 UTC (Tue)
by TRauMa (guest, #16483)
[Link] (1 responses)
Posted Oct 7, 2008 14:08 UTC (Tue)
by TRauMa (guest, #16483)
[Link]
More info: http://boblord.livejournal.com/16968.html
Posted Nov 10, 2006 22:35 UTC (Fri)
by zooko (guest, #2589)
[Link]
I think you mean `NTT has sent out'. I can't see much sign that OpenSSL OpenSSL incorporates the Camellia cypher
itself was involved in this: among other things, if it were, wouldn't it
have been likely to send out a press release about Camellia's
incorporation into 0.9.8c at around the time 0.9.8c was released, or at
the very least before it became obsolete? (0.9.8d was released well over a
month ago.)
Googling and comparing a bit it appears that Camellia is both much slower and bigger in binary size than Rijndael (the cipher used in AES) is. I doubt that it's really that more secure, and they say it's comparable to AES, so it probably isn't. Maybe in hardware it's smaller and faster, but for software I see nor reason why Camellia should be prefered. OpenSSL incorporates the Camellia cypher
OpenSSL incorporates the Camellia cypher
Found a reference to a potential attack on
Camellia. The cipher is not listed in the Block Cipher Lounge, far as
I can tell, so it's hard to know if this attack claim still stands.
Nonetheless, I would be a little wary of it.
Did some googling myself
Sure OpenSSL should include it, but it makes one wonder why anyone would prefer Camellia above other, apparently better ciphers. As I am looking around a bit for which cipher to use, I couldn't help notice that I didn't encounter a single advantage. What a contrast to the marketing message.Did some googling myself
No CAMELLIA-128-ECB in my (gentoo) openssl, so I guess it isn't compiled in by default - I presume "From now on, since the OpenSSL toolkit equipped with Camellia will be installed into WWW servers worldwide and used as a world leading open cryptographic toolkit, we anticipate that Camellia will be spread even further through its use and commercialization on a global scale." is japanese for "This is a fringe cipher we managed to get into openssl, so interested parties can activate it more easily, but don't expect it to be enabled on your system."
OpenSSL incorporates the Camellia cypher
OpenSSL incorporates the Camellia cypher
OpenSSL incorporates the Camellia cypher
I don't like this bit of puffery: "The world's only alternative to AES.". If you don't want to risk all your eggs in the AES basket, there are several good alternatives, such as Serpent, TwoFish, and Salsa20. You can also combine multiple ciphers. You can also tweak an existing cipher by e.g. adding rounds.OpenSSL incorporates the Camellia cypher