I-D Action: draft-wood-cfrg-aead-limits-00.txt
internet-drafts@ietf.org Wed, 20 May 2020 14:17 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4583F3A0A1A for <i-d-announce@ietf.org>; Wed, 20 May 2020 07:17:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-wood-cfrg-aead-limits-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.130.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158998423716.6963.15712585861707579525@ietfa.amsl.com>
Date: Wed, 20 May 2020 07:17:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/rxnANXfca1-gwe1aqGl4WmFVTBM>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 May 2020 14:17:18 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Usage Limits on AEAD Algorithms Authors : Felix Günther Martin Thomson Christopher A. Wood Filename : draft-wood-cfrg-aead-limits-00.txt Pages : 10 Date : 2020-05-20 Abstract: An Authenticated Encryption with Associated Data (AEAD) algorithm provides confidentiality and integrity. Excessive use of the same key can give an attacker advantages in breaking these properties. This document provides simple guidance for users of common AEAD functions about how to limit the use of keys in order to bound the advantage given to an attacker. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-wood-cfrg-aead-limits/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-wood-cfrg-aead-limits-00 https://datatracker.ietf.org/doc/html/draft-wood-cfrg-aead-limits-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- I-D Action: draft-wood-cfrg-aead-limits-00.txt internet-drafts