Hi, folks. The IESG has received a last call comment recommending that the new rc4 cipher for ssh be published as informational rather than as a proposed standard because of weaknesses in rc4. It would be inappropriate to make a decision based on one comment so I am soliciting comments on this point. The argument in favor of publishing this document at proposed is that the existing arcfour cipher is part of a standard and that many other IETF protocols use rc4 in standards track documents. Please submit comments to ietf@xxxxxxxx or iesg@xxxxxxxx on this issue by 2005-06-28. Included below is a partial bibliography of RC4 attacks provided to the IESG by the person making the original comment. S. Fluhrer, I. Mantin, & A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", Proceedings of 8th Annual International Workshop on Selected areas in Cryptography (SAC 2001), Toronto, ON, CA, August 2001. J. D. Golic, "Linear Statistical Weakness of RC4 Key Generator", Procedings of EuroCrypt 1997, Konstanz, DE, May 1997. S. Fluhrer & D. McGrew, "Statistical Analysis of the RC4 Key Generator", Proceedings of 7th International Workshop on Fast Software Encryption (FSE 2000), New York, NY, US, April 2000. S. Mister & S.E. Tavares, "Cryptanalysis of RC4-like Ciphers", Proceedings of 5th Annual International Workshop on Selected Areas in Cryptography (SAC 1998), Kingston, ON, CA, August 1998. L. Knudsen, W. Meier, B. Preneel, V. Rijmen, & S. Verdoolaege, "Analysis Method for RC4", Proceedings of AsiaCrypt 1998. R. Wash, "Lecture Notes on Stream Ciphers and RC4", unpublished, Case Western Reserve University, OH, US http://acm.cwru.edu/files/2002%20Spring/talks/latex_samp2_4_09_02.pdf S. Paul & B. Preneel, "Analysis of Non-fortuitous Predictive States of the RC4 Key Generator", Proceedings of 4th International Conference on Cryptology in India (IndoCrypt 2003), New Delhi, IN, December 2003. _______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf