[CFRG] [Editorial Errata Reported] RFC7539 (8274)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 30 January 2025 13:52 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: cfrg@irtf.org
Delivered-To: cfrg@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C2B2C14F698; Thu, 30 Jan 2025 05:52:33 -0800 (PST)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id 871051BAAF2; Thu, 30 Jan 2025 05:52:32 -0800 (PST)
To: rfc-editor@rfc-editor.org, irsg@irtf.org, cfrg@irtf.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20250130135232.871051BAAF2@rfcpa.rfc-editor.org>
Date: Thu, 30 Jan 2025 05:52:32 -0800
Message-ID-Hash: WGDRD32HBZHCW4ZFXDWDELXXN2OXE6HC
X-Message-ID-Hash: WGDRD32HBZHCW4ZFXDWDELXXN2OXE6HC
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: alina.obst@bsi.bund.de, agl@google.com
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [CFRG] [Editorial Errata Reported] RFC7539 (8274)
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/tnWq_Pm6DLX3HBTm-NLYVl5q4Yo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

The following errata report has been submitted for RFC7539,
"ChaCha20 and Poly1305 for IETF Protocols".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8274

--------------------------------------
Type: Editorial
Reported by: Alina Obst <alina.obst@bsi.bund.de>

Section: 2.3.2

Original Text
-------------
 ChaCha state with the key setup.

       61707865  3320646e  79622d32  6b206574
       03020100  07060504  0b0a0908  0f0e0d0c
       13121110  17161514  1b1a1918  1f1e1d1c
       00000001  09000000  4a000000  00000000

Corrected Text
--------------
 ChaCha state with the key setup.

       61707865  3320646e  79622d32  6b206574
       03020100  07060504  0b0a0908  0f0e0d0c
       13121110  17161514  1b1a1918  1f1e1d1c
       01000000  09000000  4a000000  00000000

Notes
-----
Section 2.3 says: "A 32-bit block count parameter, treated as a 32-bit little-endian integer". In Section 2.3.2 the initial block counter is set to 1 which is 00000001 in big-endian hex. So I think, the corresponding entry in the state matrix (index 12) should be 01000000.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC7539 (draft-irtf-cfrg-chacha20-poly1305-10)
--------------------------------------
Title               : ChaCha20 and Poly1305 for IETF Protocols
Publication Date    : May 2015
Author(s)           : Y. Nir, A. Langley
Category            : INFORMATIONAL
Source              : Crypto Forum Research Group
Stream              : IRTF
Verifying Party     : IRSG