[CFRG] I-D Action: draft-irtf-cfrg-aead-limits-03.txt
internet-drafts@ietf.org Mon, 12 July 2021 22:10 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: cfrg@ietf.org
Delivered-To: cfrg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E4103A115E; Mon, 12 Jul 2021 15:10:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: cfrg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.34.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: cfrg@ietf.org
Message-ID: <162612785399.26970.4146859955479841761@ietfa.amsl.com>
Date: Mon, 12 Jul 2021 15:10:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/9oPLFJWf4AiKR8R8dUnKy9c0odA>
Subject: [CFRG] I-D Action: draft-irtf-cfrg-aead-limits-03.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.29
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jul 2021 22:11:01 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Crypto Forum RG of the IRTF. Title : Usage Limits on AEAD Algorithms Authors : Felix Günther Martin Thomson Christopher A. Wood Filename : draft-irtf-cfrg-aead-limits-03.txt Pages : 17 Date : 2021-07-12 Abstract: An Authenticated Encryption with Associated Data (AEAD) algorithm provides confidentiality and integrity. Excessive use of the same key can give an attacker advantages in breaking these properties. This document provides simple guidance for users of common AEAD functions about how to limit the use of keys in order to bound the advantage given to an attacker. It considers limits in both single- and multi-key settings. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-irtf-cfrg-aead-limits/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-irtf-cfrg-aead-limits-03.html A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-irtf-cfrg-aead-limits-03 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [CFRG] I-D Action: draft-irtf-cfrg-aead-limits-03… internet-drafts