[CFRG] I-D Action: draft-irtf-cfrg-aead-limits-08.txt

internet-drafts@ietf.org Mon, 01 April 2024 17:17 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: cfrg@ietf.org
Delivered-To: cfrg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 307EDC14CE51; Mon, 1 Apr 2024 10:17:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: cfrg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.9.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: cfrg@ietf.org
Message-ID: <171199182018.63669.16729896693099458755@ietfa.amsl.com>
Date: Mon, 01 Apr 2024 10:17:00 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/_OY5BfasSgjOaeClOUJZu8f3hDU>
Subject: [CFRG] I-D Action: draft-irtf-cfrg-aead-limits-08.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.39
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2024 17:17:00 -0000

Internet-Draft draft-irtf-cfrg-aead-limits-08.txt is now available. It is a
work item of the Crypto Forum (CFRG) RG of the IRTF.

   Title:   Usage Limits on AEAD Algorithms
   Authors: Felix Günther
            Martin Thomson
            Christopher A. Wood
   Name:    draft-irtf-cfrg-aead-limits-08.txt
   Pages:   21
   Dates:   2024-04-01

Abstract:

   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-irtf-cfrg-aead-limits/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-irtf-cfrg-aead-limits-08.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-irtf-cfrg-aead-limits-08

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts