[rfc-dist] RFC 8750 on Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)

rfc-editor@rfc-editor.org Wed, 11 March 2020 22:55 UTC

Return-Path: <rfc-dist-bounces@rfc-editor.org>
X-Original-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Delivered-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F6053A0A21 for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Wed, 11 Mar 2020 15:55:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.9
X-Spam-Level:
X-Spam-Status: No, score=-2.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RnUoVZ1TZff4 for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Wed, 11 Mar 2020 15:55:28 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECADD3A0A1B for <rfc-dist-archive-yuw6Xa6hiena@ietf.org>; Wed, 11 Mar 2020 15:55:28 -0700 (PDT)
Received: from rfcpa.amsl.com (localhost [IPv6:::1]) by rfc-editor.org (Postfix) with ESMTP id AEEB8F40742; Wed, 11 Mar 2020 15:55:13 -0700 (PDT)
X-Original-To: rfc-dist@rfc-editor.org
Delivered-To: rfc-dist@rfc-editor.org
Received: by rfc-editor.org (Postfix, from userid 30) id 543D2F40743; Wed, 11 Mar 2020 15:55:12 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20200311225512.543D2F40743@rfc-editor.org>
Date: Wed, 11 Mar 2020 15:55:12 -0700
Subject: [rfc-dist] RFC 8750 on Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)
X-BeenThere: rfc-dist@rfc-editor.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Announcements <rfc-dist.rfc-editor.org>
List-Unsubscribe: <https://www.rfc-editor.org/mailman/options/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <http://www.rfc-editor.org/pipermail/rfc-dist/>
List-Post: <mailto:rfc-dist@rfc-editor.org>
List-Help: <mailto:rfc-dist-request@rfc-editor.org?subject=help>
List-Subscribe: <https://www.rfc-editor.org/mailman/listinfo/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=subscribe>
Cc: ipsec@ietf.org, drafts-update-ref@iana.org, rfc-editor@rfc-editor.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: rfc-dist-bounces@rfc-editor.org
Sender: rfc-dist <rfc-dist-bounces@rfc-editor.org>

A new Request for Comments is now available in online RFC libraries.

        
        RFC 8750

        Title:      Implicit Initialization Vector (IV) for 
                    Counter-Based Ciphers in Encapsulating 
                    Security Payload (ESP) 
        Author:     D. Migault,
                    T. Guggemos,
                    Y. Nir
        Status:     Standards Track
        Stream:     IETF
        Date:       March 2020
        Mailbox:    daniel.migault@ericsson.com, 
                    guggemos@nm.ifi.lmu.de, 
                    ynir.ietf@gmail.com
        Pages:      8
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-ipsecme-implicit-iv-11.txt

        URL:        https://www.rfc-editor.org/info/rfc8750

        DOI:        10.17487/RFC8750

Encapsulating Security Payload (ESP) sends an initialization vector
(IV) in each packet. The size of the IV depends on the applied
transform and is usually 8 or 16 octets for the transforms defined at
the time this document was written. When used with IPsec, some
algorithms, such as AES-GCM, AES-CCM, and ChaCha20-Poly1305, take the
IV to generate a nonce that is used as an input parameter for
encrypting and decrypting. This IV must be unique but can be
predictable.  As a result, the value provided in the ESP Sequence
Number (SN) can be used instead to generate the nonce. This avoids
sending the IV itself and saves 8 octets per packet in the case of
AES-GCM, AES-CCM, and ChaCha20-Poly1305. This document describes how
to do this.

This document is a product of the IP Security Maintenance and Extensions Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC
_______________________________________________
rfc-dist mailing list
rfc-dist@rfc-editor.org
https://www.rfc-editor.org/mailman/listinfo/rfc-dist
http://www.rfc-editor.org