[AVTCORE] FW: New Version Notification for draft-mattsson-cfrg-aes-gcm-sst-01.txt

John Mattsson <john.mattsson@ericsson.com> Sat, 24 February 2024 10:19 UTC

Return-Path: <john.mattsson@ericsson.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2720FC180B4A; Sat, 24 Feb 2024 02:19:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KVeOFYax1N3V; Sat, 24 Feb 2024 02:19:20 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on2081.outbound.protection.outlook.com [40.107.8.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DEC6C14F5E3; Sat, 24 Feb 2024 02:19:18 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GoMH8yq3cFtueW4PxQ4poKn6GB78Ao3C4Ha7/8izdV4AB9OIogeMSH25WM7mJBHyzaCtLwnKXCCp4wKgROh3aXy0B4uCiADB3Lmuxj1Z6npy736S3sP7CYia4wFvYhX/pP8bCLIKUNDdGyXkOnjVK/oMWcO93bmBCk7hjYfHtVblCFOXkGlZU2jeq4dYNDkxtdpsyNWOuapPF21lUr1ilQ8CVjxkbe9UpUdwm7yBhmb/iJnJ/QTNbWLtvoiEBcI6KsLN3D1DoskfprYPwr1FRtFUnGrNat+mnYgUCgwaXEgrUTgwU8GiebGQjMbDORiM9QRp4KIVx/F4gHXtPqPWuA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IfCK66HLvtlAtAc7fUQ+KBFHKvmlmw5v2MSilq9SK5I=; b=eEqt3O6+u//XWi78CZIarhccCQoyJIgfeqYnRMta3IFLuCM66jEWahOnxCRvFf1yV7vGm5nBvIRAdV3M93Hk9TG27dmFths11Ae4TWnhUzsO6/2XY4r51DLYXCJHCzsElnuHgwkmZufOsSl1biXUOhjJxtjbsGGIsn5RHO/2j1yytCxDn/x5zs4ZfLRZYWtj3Nxne+Kdl8xXtvxpEUfXeNaUdZEZJwN+dnt5eefcaAjr4m/ZhfYS80SzVGsoqx8jxBAgqgpGlo2DVFXeewCB631naVKnwXEZWmDMmgV+2sR2r+Enr6fCr9thnu6OfIvfaxUV/jzSU4OkBpuUIWbzwQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IfCK66HLvtlAtAc7fUQ+KBFHKvmlmw5v2MSilq9SK5I=; b=w/DRxSCqNWhBdiouyqFdEjCVeyNUGmC9r0hCJViwNAR44ZzVz3gNUtN59fuxJddiL4jIQ4LYAu5zX4qXdg0NgohFvDMbmf4NwFZu/zec/Feu5JcrcvCIdE5tz/N/SzVhbwRR1wAb9DvlT9K9t0xj+MbC0amekR/JoQYuKpdDBgg5WYU/sVlwIIt4KjbBfNGgP3fqvHKNaJSjbUKIyofrPW67i1syiW8kzk2gAlPUiHwCIc1aGYr/hSqDH2a5I3LO7PNNg1j2FHRVZAR4hMPtcmVUZEf60VuWEVEyeve3S8jwocaWNPGLYNpRb3StRdy9IXa8tTb4R6RgX/UWXe7LVw==
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com (2603:10a6:150:114::10) by AS1PR07MB8406.eurprd07.prod.outlook.com (2603:10a6:20b:4c6::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.31; Sat, 24 Feb 2024 10:19:15 +0000
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::5052:f515:10db:3c95]) by GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::5052:f515:10db:3c95%3]) with mapi id 15.20.7316.031; Sat, 24 Feb 2024 10:19:14 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: IRTF CFRG <cfrg@irtf.org>, "sframe@ietf.org" <sframe@ietf.org>, "moq@ietf.org" <moq@ietf.org>, IETF AVTCore WG <avt@ietf.org>
Thread-Topic: New Version Notification for draft-mattsson-cfrg-aes-gcm-sst-01.txt
Thread-Index: AQHaZvug/7SdainmMkGeA1rtb74zEbEZQ1SN
Date: Sat, 24 Feb 2024 10:19:14 +0000
Message-ID: <GVXPR07MB967841BBA16AD3A8797C4C3D89542@GVXPR07MB9678.eurprd07.prod.outlook.com>
References: <170876337870.40379.1433548841697201306@ietfa.amsl.com>
In-Reply-To: <170876337870.40379.1433548841697201306@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GVXPR07MB9678:EE_|AS1PR07MB8406:EE_
x-ms-office365-filtering-correlation-id: a865d0c9-969f-40e5-eb2b-08dc35220d30
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVXPR07MB9678.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GVXPR07MB967841BBA16AD3A8797C4C3D89542GVXPR07MB9678eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GVXPR07MB9678.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a865d0c9-969f-40e5-eb2b-08dc35220d30
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2024 10:19:14.5935 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: z9/afVr+BElKKWA1wmvvxwypd6Uxwro1pocshD8YRJ/jgbOzpAWZHMOOxVB5YLVGbXdfSK4LURNjwSY2ZuolSC+fWczVBnhBVfQzi7F8GEU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS1PR07MB8406
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/ieA0fdxvsL7ayrjM3bTZJJTSAkQ>
Subject: [AVTCORE] FW: New Version Notification for draft-mattsson-cfrg-aes-gcm-sst-01.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Feb 2024 10:19:25 -0000

Hi,

We submitted -01 of Galois Counter Mode with Secure Short Tags (GCM-SST).

Our paper on AES-GCM-SST was accepted to the recent NIST workshop on encryption and presented there.

https://csrc.nist.gov/Events/2023/third-workshop-on-block-cipher-modes-of-operation

https://csrc.nist.gov/csrc/media/Events/2023/third-workshop-on-block-cipher-modes-of-operation/documents/accepted-papers/Galois%20Counter%20Mode%20with%20Secure%20Short%20Tags.pdf

https://csrc.nist.gov/Presentations/2023/galois-counter-mode-with-secure-short-tags

3GPP has started work on standardizing code points for the use of GCM-SST with AES-256 and SNOW 5G in 5G Advance (and very likely 6G). The algorithm specification is already done.

Changes from -00 to -01:

   *  Link to NIST decision to remove support for GCM with tags shorter
      than 96-bits based on Mattsson et al.

   *  Mention that 3GPP 5G Advance will use GCM-SST with AES-256 and
      SNOW 5G.

   *  Corrected reference to step numbers during decryption

   *  Changed T to full_tag to align with tag and expected_tag

   *  Link to images from the NIST encryption workshop illustrating the
      GCM-SST encryption and decryption functions.

   *  Updated definitions

   *  Editorial changes.

We are planning to ask for presentation time in CFRG at IETF in Brisbane. We would be happy to present in some media group as well if there is interest.

Cheers,
John Preuß Mattsson

From: internet-drafts@ietf.org <internet-drafts@ietf.org>
Date: Saturday, 24 February 2024 at 09:29
To: John Mattsson <john.mattsson@ericsson.com>, Alexander Maximov <alexander.maximov@ericsson.com>, John Mattsson <john.mattsson@ericsson.com>, Matt Campagna <campagna@amazon.com>, Matthew Campagna <campagna@amazon.com>
Subject: New Version Notification for draft-mattsson-cfrg-aes-gcm-sst-01.txt
A new version of Internet-Draft draft-mattsson-cfrg-aes-gcm-sst-01.txt has
been successfully submitted by John Preuß Mattsson and posted to the
IETF repository.

Name:     draft-mattsson-cfrg-aes-gcm-sst
Revision: 01
Title:    Galois Counter Mode with Secure Short Tags (GCM-SST)
Date:     2024-02-24
Group:    Individual Submission
Pages:    18
URL:      https://www.ietf.org/archive/id/draft-mattsson-cfrg-aes-gcm-sst-01.txt
Status:   https://datatracker.ietf.org/doc/draft-mattsson-cfrg-aes-gcm-sst/
HTML:     https://www.ietf.org/archive/id/draft-mattsson-cfrg-aes-gcm-sst-01.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-mattsson-cfrg-aes-gcm-sst
Diff:     https://author-tools.ietf.org/iddiff?url2=draft-mattsson-cfrg-aes-gcm-sst-01

Abstract:

   This document defines the Galois Counter Mode with Secure Short Tags
   (GCM-SST) Authenticated Encryption with Associated Data (AEAD)
   algorithm.  GCM-SST can be used with any keystream generator, not
   just a block cipher.  The main differences compared to GCM [GCM] is
   that GCM-SST uses an additional subkey Q, that fresh subkeys H and Q
   are derived for each nonce, and that the POLYVAL function from AES-
   GCM-SIV is used instead of GHASH.  This enables short tags with
   forgery probabilities close to ideal.  This document also registers
   several instances of Advanced Encryption Standard (AES) with Galois
   Counter Mode with Secure Short Tags (AES-GCM-SST).

   This document is the product of the Crypto Forum Research Group.



The IETF Secretariat