I-D Action: draft-ietf-ipsecme-implicit-iv-08.txt

internet-drafts@ietf.org Thu, 17 October 2019 02:39 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 26FD412004A; Wed, 16 Oct 2019 19:39:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: ipsec@ietf.org
Subject: I-D Action: draft-ietf-ipsecme-implicit-iv-08.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.105.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: ipsec@ietf.org
Message-ID: <157127994910.9958.5205731502613704306@ietfa.amsl.com>
Date: Wed, 16 Oct 2019 19:39:09 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/craz9Xap0qKtBjsEcbTWhhDPOUQ>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Oct 2019 02:39:09 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions WG of the IETF.

        Title           : Implicit IV for Counter-based Ciphers in Encapsulating Security Payload (ESP)
        Authors         : Daniel Migault
                          Tobias Guggemos
                          Yoav Nir
	Filename        : draft-ietf-ipsecme-implicit-iv-08.txt
	Pages           : 8
	Date            : 2019-10-16

Abstract:
   Encapsulating Security Payload (ESP) sends an initialization vector
   (IV) in each packet.  The size of IV depends on the applied
   transform, being usually 8 or 16 octets for the transforms defined by
   the time this document is written.  Some algorithms such as AES-GCM,
   AES-CCM and ChaCha20-Poly1305 when used with IPsec, take the IV to
   generate a nonce that is used as an input parameter for encrypting
   and decrypting.  These algorithms require a unique IV but do not
   require an unpredictable IV.  As a result, the value provided in the
   ESP Sequence Number (SN) can be used instead to generate the nonce.
   This avoids sending the IV itself, and saves in the case of AES-GCM,
   AES-CCM and ChaCha20-Poly1305 8 octets per packet.  This document
   describes how to do this.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-implicit-iv/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-ipsecme-implicit-iv-08
https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-implicit-iv-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-implicit-iv-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/