rfc4543.txt 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787
  1. Network Working Group D. McGrew
  2. Request for Comments: 4543 Cisco Systems, Inc.
  3. Category: Standards Track J. Viega
  4. McAfee, Inc.
  5. May 2006
  6. The Use of Galois Message Authentication Code (GMAC) in
  7. IPsec ESP and AH
  8. Status of This Memo
  9. This document specifies an Internet standards track protocol for the
  10. Internet community, and requests discussion and suggestions for
  11. improvements. Please refer to the current edition of the "Internet
  12. Official Protocol Standards" (STD 1) for the standardization state
  13. and status of this protocol. Distribution of this memo is unlimited.
  14. Copyright Notice
  15. Copyright (C) The Internet Society (2006).
  16. Abstract
  17. This memo describes the use of the Advanced Encryption Standard (AES)
  18. Galois Message Authentication Code (GMAC) as a mechanism to provide
  19. data origin authentication, but not confidentiality, within the IPsec
  20. Encapsulating Security Payload (ESP) and Authentication Header (AH).
  21. GMAC is based on the Galois/Counter Mode (GCM) of operation, and can
  22. be efficiently implemented in hardware for speeds of 10 gigabits per
  23. second and above, and is also well-suited to software
  24. implementations.
  25. McGrew & Viega Standards Track [Page 1]
  26. RFC 4543 GMAC in IPsec ESP and AH May 2006
  27. Table of Contents
  28. 1. Introduction ....................................................2
  29. 1.1. Conventions Used in This Document ..........................3
  30. 2. AES-GMAC ........................................................3
  31. 3. The Use of AES-GMAC in ESP ......................................3
  32. 3.1. Initialization Vector ......................................4
  33. 3.2. Nonce Format ...............................................4
  34. 3.3. AAD Construction ...........................................5
  35. 3.4. Integrity Check Value (ICV) ................................6
  36. 3.5. Differences with AES-GCM-ESP ...............................6
  37. 3.6. Packet Expansion ...........................................7
  38. 4. The Use of AES-GMAC in AH .......................................7
  39. 5. IKE Conventions .................................................8
  40. 5.1. Phase 1 Identifier .........................................8
  41. 5.2. Phase 2 Identifier .........................................8
  42. 5.3. Key Length Attribute .......................................9
  43. 5.4. Keying Material and Salt Values ............................9
  44. 6. Test Vectors ....................................................9
  45. 7. Security Considerations ........................................10
  46. 8. Design Rationale ...............................................11
  47. 9. IANA Considerations ............................................11
  48. 10. Acknowledgements ..............................................11
  49. 11. References ....................................................12
  50. 11.1. Normative References .....................................12
  51. 11.2. Informative References ...................................12
  52. 1. Introduction
  53. This document describes the use of AES-GMAC mode (AES-GMAC) as a
  54. mechanism for data origin authentication in ESP [RFC4303] and AH
  55. [RFC4302]. We refer to these methods as ENCR_NULL_AUTH_AES_GMAC and
  56. AUTH_AES_GMAC, respectively. ENCR_NULL_AUTH_AES_GMAC is a companion
  57. to the AES Galois/Counter Mode ESP [RFC4106], which provides
  58. authentication as well as confidentiality. ENCR_NULL_AUTH_AES_GMAC
  59. is intended for cases in which confidentiality is not desired. Like
  60. GCM, GMAC is efficient and secure, and is amenable to high-speed
  61. implementations in hardware. ENCR_NULL_AUTH_AES_GMAC and
  62. AUTH_AES_GMAC are designed so that the incremental cost of
  63. implementation, given an implementation is AES-GCM-ESP, is small.
  64. This document does not cover implementation details of GCM or GMAC.
  65. Those details can be found in [GCM], along with test vectors.
  66. McGrew & Viega Standards Track [Page 2]
  67. RFC 4543 GMAC in IPsec ESP and AH May 2006
  68. 1.1. Conventions Used in This Document
  69. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  70. "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  71. document are to be interpreted as described in [RFC2119].
  72. 2. AES-GMAC
  73. GMAC is a block cipher mode of operation providing data origin
  74. authentication. It is defined in terms of the GCM authenticated
  75. encryption operation as follows. The GCM authenticated encryption
  76. operation has four inputs: a secret key, an initialization vector
  77. (IV), a plaintext, and an input for additional authenticated data
  78. (AAD). It has two outputs, a ciphertext whose length is identical to
  79. the plaintext and an authentication tag. GMAC is the special case of
  80. GCM in which the plaintext has a length of zero. The (zero-length)
  81. ciphertext output is ignored, of course, so that the only output of
  82. the function is the Authentication Tag. In the following, we
  83. describe how the GMAC IV and AAD are formed from the ESP and AH
  84. fields, and how the ESP and AH packets are formed from the
  85. Authentication Tag.
  86. Below we refer to the AES-GMAC IV input as a nonce, in order to
  87. distinguish it from the IV fields in the packets. The same nonce and
  88. key combination MUST NOT be used more than once, since reusing a
  89. nonce/key combination destroys the security guarantees of AES-GMAC.
  90. Because of this restriction, it can be difficult to use this mode
  91. securely when using statically configured keys. For the sake of good
  92. security, implementations MUST use an automated key management
  93. system, such as the Internet Key Exchange (IKE) (either version two
  94. [RFC4306] or version one [RFC2409]), to ensure that this requirement
  95. is met.
  96. 3. The Use of AES-GMAC in ESP
  97. The AES-GMAC algorithm for ESP is defined as an ESP "combined mode"
  98. algorithm (see Section 3.2.3 of [RFC4303]), rather than an ESP
  99. integrity algorithm. It is called ENCR_NULL_AUTH_AES_GMAC to
  100. highlight the fact that it performs no encryption and provides no
  101. confidentiality.
  102. Rationale: ESP makes no provision for integrity transforms to
  103. place an initialization vector within the Payload field; only
  104. encryption transforms are expected to use IVs. Defining GMAC as
  105. an encryption transform avoids this issue, and allows GMAC to
  106. benefit from the same pipelining as does GCM.
  107. McGrew & Viega Standards Track [Page 3]
  108. RFC 4543 GMAC in IPsec ESP and AH May 2006
  109. Like all ESP combined modes, it is registered in IKEv2 as an
  110. encryption transform, or "Type 1" transform. It MUST NOT be used in
  111. conjunction with any other ESP encryption transform (within a
  112. particular ESP encapsulation). If confidentiality is desired, then
  113. GCM ESP [RFC4106] SHOULD be used instead.
  114. 3.1. Initialization Vector
  115. With ENCR_NULL_AUTH_AES_GMAC, an explicit Initialization Vector (IV)
  116. is included in the ESP Payload, at the outset of that field. The IV
  117. MUST be eight octets long. For a given key, the IV MUST NOT repeat.
  118. The most natural way to meet this requirement is to set the IV using
  119. a counter, but implementations are free to set the IV field in any
  120. way that guarantees uniqueness, such as a linear feedback shift
  121. register (LFSR). Note that the sender can use any IV generation
  122. method that meets the uniqueness requirement without coordinating
  123. with the receiver.
  124. 3.2. Nonce Format
  125. The nonce passed to the AES-GMAC authentication algorithm has the
  126. following layout:
  127. 0 1 2 3
  128. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  129. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  130. | Salt |
  131. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  132. | Initialization Vector |
  133. | |
  134. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  135. Figure 1: Nonce Format
  136. The components of the nonce are as follows:
  137. Salt
  138. The salt field is a four-octet value that is assigned at the
  139. beginning of the security association, and then remains constant
  140. for the life of the security association. The salt SHOULD be
  141. unpredictable (i.e., chosen at random) before it is selected, but
  142. need not be secret. We describe how to set the salt for a
  143. Security Association established via the Internet Key Exchange in
  144. Section 5.4.
  145. Initialization Vector
  146. The IV field is described in Section 3.1.
  147. McGrew & Viega Standards Track [Page 4]
  148. RFC 4543 GMAC in IPsec ESP and AH May 2006
  149. 3.3. AAD Construction
  150. Data integrity and data origin authentication are provided for the
  151. SPI, (Extended) Sequence Number, Authenticated Payload, Padding, Pad
  152. Length, and Next Header fields. This is done by including those
  153. fields in the AES-GMAC Additional Authenticated Data (AAD) field.
  154. Two formats of the AAD are defined: one for 32-bit sequence numbers,
  155. and one for 64-bit extended sequence numbers. The format with 32-bit
  156. sequence numbers is shown in Figure 2, and the format with 64-bit
  157. extended sequence numbers is shown in Figure 3.
  158. 0 1 2 3
  159. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  160. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  161. | SPI |
  162. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  163. | 32-bit Sequence Number |
  164. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  165. | |
  166. ~ Authenticated Payload (variable) ~
  167. | |
  168. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  169. | Padding (0-255 bytes) |
  170. + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  171. | | Pad Length | Next Header |
  172. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  173. Figure 2: AAD Format with 32-bit Sequence Number
  174. 0 1 2 3
  175. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  176. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  177. | SPI |
  178. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  179. | 64-bit Extended Sequence Number |
  180. | |
  181. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  182. | |
  183. ~ Authenticated Payload (variable) ~
  184. | |
  185. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  186. | Padding (0-255 bytes) |
  187. + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  188. | | Pad Length | Next Header |
  189. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  190. Figure 3: AAD Format with 64-bit Extended Sequence Number
  191. McGrew & Viega Standards Track [Page 5]
  192. RFC 4543 GMAC in IPsec ESP and AH May 2006
  193. The use of 32-bit sequence numbers vs. 64-bit extended sequence
  194. numbers is determined by the security association (SA) management
  195. protocol that is used to create the SA. For IKEv2 [RFC4306] this is
  196. negotiated via Transform Type 5, and the default for ESP is to use
  197. 64-bit extended sequence numbers in the absence of negotiation (e.g.,
  198. see Section 2.2.1 of [RFC4303]).
  199. 3.4. Integrity Check Value (ICV)
  200. The ICV consists solely of the AES-GMAC Authentication Tag. The
  201. Authentication Tag MUST NOT be truncated, so the length of the ICV is
  202. 16 octets.
  203. 3.5. Differences with AES-GCM-ESP
  204. In this section, we highlight the differences between this
  205. specification and AES-GCM-ESP [RFC4106]. The essential difference is
  206. that in this document, the AAD consists of the SPI, Sequence Number,
  207. and ESP Payload, and the AES-GCM plaintext is zero-length, while in
  208. AES-GCM-ESP, the AAD consists only of the SPI and Sequence Number,
  209. and the AES-GCM plaintext consists of the ESP Payload. These
  210. differences are illustrated in Figure 4. This figure shows the case
  211. in which the Extended Sequence Number option is not used. When that
  212. option is exercised, the Sequence Number field in the figure would be
  213. replaced with the Extended Sequence Number.
  214. Importantly, ENCR_NULL_AUTH_AES_GMAC is *not* equivalent to AES-GCM-
  215. ESP with encryption "turned off". However, the ICV computations
  216. performed in both cases are similar because of the structure of the
  217. GHASH function [GCM].
  218. McGrew & Viega Standards Track [Page 6]
  219. RFC 4543 GMAC in IPsec ESP and AH May 2006
  220. +-> +-----------------------+ <-+
  221. AES-GCM-ESP | | SPI | |
  222. AAD -------+ +-----------------------+ |
  223. | | Sequence Number | |
  224. +-> +-----------------------+ |
  225. | Authentication | |
  226. | IV | |
  227. +->+-> +-----------------------+ +
  228. AES-GCM-ESP | | | |
  229. Plaintext -+ ~ ESP Payload ~ |
  230. | | | |
  231. | +-----------+-----+-----+ |
  232. | | Padding | PL | NH | |
  233. +----> +-----------+-----+-----+ <-+
  234. |
  235. ENCR_NULL_AUTH_AES_GMAC AAD --+
  236. Figure 4: Differences between ENCR_NULL_AUTH_AES_GMAC and AES-GCM-ESP
  237. 3.6. Packet Expansion
  238. The IV adds an additional eight octets to the packet and the ICV adds
  239. an additional 16 octets. These are the only sources of packet
  240. expansion, other than the 10-13 bytes taken up by the ESP SPI,
  241. Sequence Number, Padding, Pad Length, and Next Header fields (if the
  242. minimal amount of padding is used).
  243. 4. The Use of AES-GMAC in AH
  244. In AUTH_AES_GMAC, the AH Authentication Data field consists of the IV
  245. and the Authentication Tag, as shown in Figure 5. Unlike the usual
  246. AH case, the Authentication Data field contains both an input to the
  247. authentication algorithm (the IV) and the output of the
  248. authentication algorithm (the tag). No padding is required in the
  249. Authentication Data field, because its length is a multiple of 64
  250. bits.
  251. McGrew & Viega Standards Track [Page 7]
  252. RFC 4543 GMAC in IPsec ESP and AH May 2006
  253. 0 1 2 3
  254. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  255. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  256. | Initialization Vector (IV) |
  257. | (8 octets) |
  258. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  259. | |
  260. | Integrity Check Value (ICV) (16 octets) |
  261. | |
  262. | |
  263. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  264. Figure 5: The AUTH_AES_GMAC Authentication Data Format
  265. The IV is as described in Section 3.1. The Integrity Check Value
  266. (ICV) is as described in Section 3.4.
  267. The GMAC Nonce input is formed as described in Section 3.2. The GMAC
  268. AAD input consists of the authenticated data as defined in Section
  269. 3.1 of [RFC4302]. These values are provided as to that algorithm,
  270. along with the secret key, and the resulting authentication tag given
  271. as output is used to form the ICV.
  272. 5. IKE Conventions
  273. This section describes the conventions used to generate keying
  274. material and salt values for use with ENCR_NULL_AUTH_AES_GMAC and
  275. AUTH_AES_GMAC using the Internet Key Exchange (IKE) versions one
  276. [RFC2409] and two [RFC4306].
  277. 5.1. Phase 1 Identifier
  278. This document does not specify the conventions for using AES-GMAC for
  279. IKE Phase 1 negotiations. For AES-GMAC to be used in this manner, a
  280. separate specification would be needed, and an Encryption Algorithm
  281. Identifier would need to be assigned. Implementations SHOULD use an
  282. IKE Phase 1 cipher that is at least as strong as AES-GMAC. The use
  283. of AES-CBC [RFC3602] with the same AES key size as used by
  284. ENCR_NULL_AUTH_AES_GMAC or AUTH_AES_GMAC is RECOMMENDED.
  285. 5.2. Phase 2 Identifier
  286. For IKE Phase 2 negotiations, IANA has assigned identifiers as
  287. described in Section 9.
  288. McGrew & Viega Standards Track [Page 8]
  289. RFC 4543 GMAC in IPsec ESP and AH May 2006
  290. 5.3. Key Length Attribute
  291. AES-GMAC can be used with any of the three AES key lengths. The way
  292. that the key length is indicated is different for AH and ESP.
  293. For AH, each key length has its own separate integrity transform
  294. identifier and algorithm name (Section 9). The IKE Key Length
  295. attribute MUST NOT be used with these identifiers. This transform
  296. MUST NOT be used with ESP.
  297. For ESP, there is a single encryption transform identifier (which
  298. represents the combined transform) (Section 9). The IKE Key Length
  299. attribute MUST be used with each use of this identifier to indicate
  300. the key length. The Key Length attribute MUST have a value of 128,
  301. 192, or 256.
  302. 5.4. Keying Material and Salt Values
  303. IKE makes use of a pseudo-random function (PRF) to derive keying
  304. material. The PRF is used iteratively to derive keying material of
  305. arbitrary size, called KEYMAT. Keying material is extracted from the
  306. output string without regard to boundaries.
  307. The size of the KEYMAT for the ENCR_NULL_AUTH_AES_GMAC and
  308. AUTH_AES_GMAC MUST be four octets longer than is needed for the
  309. associated AES key. The keying material is used as follows:
  310. ENCR_NULL_AUTH_AES_GMAC with a 128-bit key and AUTH_AES_128_GMAC
  311. The KEYMAT requested for each AES-GMAC key is 20 octets. The
  312. first 16 octets are the 128-bit AES key, and the remaining four
  313. octets are used as the salt value in the nonce.
  314. ENCR_NULL_AUTH_AES_GMAC with a 192-bit key and AUTH_AES_192_GMAC
  315. The KEYMAT requested for each AES-GMAC key is 28 octets. The
  316. first 24 octets are the 192-bit AES key, and the remaining four
  317. octets are used as the salt value in the nonce.
  318. ENCR_NULL_AUTH_AES_GMAC with a 256-bit key and AUTH_AES_256_GMAC
  319. The KEYMAT requested for each AES-GMAC key is 36 octets. The
  320. first 32 octets are the 256-bit AES key, and the remaining four
  321. octets are used as the salt value in the nonce.
  322. 6. Test Vectors
  323. Appendix B of [GCM] provides test vectors that will assist
  324. implementers with AES-GMAC.
  325. McGrew & Viega Standards Track [Page 9]
  326. RFC 4543 GMAC in IPsec ESP and AH May 2006
  327. 7. Security Considerations
  328. Since the authentication coverage is different between AES-GCM-ESP
  329. and this specification (see Figure 4), it is worth pointing out that
  330. both specifications are secure. In ENCR_NULL_AUTH_AES_GMAC, the IV
  331. is not included in either the plaintext or the additional
  332. authenticated data. This does not adversely affect security, because
  333. the IV field only provides an input to the GMAC IV, which is not
  334. required to be authenticated (see [GCM]). In AUTH_AES_GMAC, the IV
  335. is included in the additional authenticated data. This fact has no
  336. adverse effect on security; it follows from the property that GMAC is
  337. secure even against attacks in which the adversary can manipulate
  338. both the IV and the message. Even an adversary with these powerful
  339. capabilities cannot forge an authentication tag for any message
  340. (other than one that was submitted to the chosen-message oracle).
  341. Since such an adversary could easily choose messages that contain the
  342. IVs with which they correspond, there are no security problems with
  343. the inclusion of the IV in the AAD.
  344. GMAC is provably secure against adversaries that can adaptively
  345. choose plaintexts, ICVs and the AAD field, under standard
  346. cryptographic assumptions (roughly, that the output of the underlying
  347. cipher under a randomly chosen key is indistinguishable from a
  348. randomly selected output). Essentially, this means that, if used
  349. within its intended parameters, a break of GMAC implies a break of
  350. the underlying block cipher. The proof of security is available in
  351. [GCMP].
  352. The most important security consideration is that the IV never
  353. repeats for a given key. In part, this is handled by disallowing the
  354. use of AES-GMAC when using statically configured keys, as discussed
  355. in Section 2.
  356. When IKE is used to establish fresh keys between two peer entities,
  357. separate keys are established for the two traffic flows. If a
  358. different mechanism is used to establish fresh keys, one that
  359. establishes only a single key to protect packets, then there is a
  360. high probability that the peers will select the same IV values for
  361. some packets. Thus, to avoid counter block collisions, ESP or AH
  362. implementations that permit use of the same key for protecting
  363. packets with the same peer MUST ensure that the two peers assign
  364. different salt values to the security association (SA).
  365. The other consideration is that, as with any block cipher mode of
  366. operation, the security of all data protected under a given security
  367. association decreases slightly with each message.
  368. McGrew & Viega Standards Track [Page 10]
  369. RFC 4543 GMAC in IPsec ESP and AH May 2006
  370. To protect against this problem, implementations MUST generate a
  371. fresh key before processing 2^64 blocks of data with a given key.
  372. Note that it is impossible to reach this limit when using 32-bit
  373. Sequence Numbers.
  374. Note that, for each message, GMAC calls the block cipher only once.
  375. 8. Design Rationale
  376. This specification was designed to be as similar to AES-GCM-ESP
  377. [RFC4106] as possible. We re-use the design and implementation
  378. experience from that specification. We include all three AES key
  379. sizes since AES-GCM-ESP supports all of those sizes, and the larger
  380. key sizes provide future users with more high-security options.
  381. 9. IANA Considerations
  382. IANA has assigned the following IKEv2 parameters. For the use of AES
  383. GMAC in AH, the following integrity (type 3) transform identifiers
  384. have been assigned:
  385. "9" for AUTH_AES_128_GMAC
  386. "10" for AUTH_AES_192_GMAC
  387. "11" for AUTH_AES_256_GMAC
  388. For the use of AES-GMAC in ESP, the following encryption (type 1)
  389. transform identifier has been assigned:
  390. "21" for ENCR_NULL_AUTH_AES_GMAC
  391. 10. Acknowledgements
  392. Our discussions with Fabio Maino and David Black significantly
  393. improved this specification, and Tero Kivinen provided us with useful
  394. comments. Steve Kent provided guidance on ESP interactions. This
  395. work is closely modeled after AES-GCM, which itself is closely
  396. modeled after Russ Housley's AES-CCM transform [RFC4309].
  397. Additionally, the GCM mode of operation was originally conceived as
  398. an improvement to the CWC mode [CWC] in which Doug Whiting and Yoshi
  399. Kohno participated. We express our thanks to Fabio, David, Tero,
  400. Steve, Russ, Doug, and Yoshi.
  401. McGrew & Viega Standards Track [Page 11]
  402. RFC 4543 GMAC in IPsec ESP and AH May 2006
  403. 11. References
  404. 11.1. Normative References
  405. [GCM] McGrew, D. and J. Viega, "The Galois/Counter Mode of
  406. Operation (GCM)", Submission to NIST. http://
  407. csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/
  408. gcm-spec.pdf, January 2004.
  409. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
  410. Requirement Levels", BCP 14, RFC 2119, March 1997.
  411. [RFC3602] Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher
  412. Algorithm and Its Use with IPsec", RFC 3602, September
  413. 2003.
  414. 11.2. Informative References
  415. [CWC] Kohno, T., Viega, J., and D. Whiting, "CWC: A high-
  416. performance conventional authenticated encryption mode",
  417. Fast Software Encryption.
  418. http://eprint.iacr.org/2003/106.pdf, February 2004.
  419. [GCMP] McGrew, D. and J. Viega, "The Security and Performance of
  420. the Galois/Counter Mode (GCM)", Proceedings of INDOCRYPT
  421. '04, http://eprint.iacr.org/2004/193, December 2004.
  422. [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
  423. (IKE)", RFC 2409, November 1998.
  424. [RFC4106] Viega, J. and D. McGrew, "The Use of Galois/Counter Mode
  425. (GCM) in IPsec Encapsulating Security Payload (ESP)", RFC
  426. 4106, June 2005.
  427. [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, December
  428. 2005.
  429. [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC
  430. 4303, December 2005.
  431. [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC
  432. 4306, December 2005.
  433. [RFC4309] Housley, R., "Using Advanced Encryption Standard (AES) CCM
  434. Mode with IPsec Encapsulating Security Payload (ESP)", RFC
  435. 4309, December 2005.
  436. McGrew & Viega Standards Track [Page 12]
  437. RFC 4543 GMAC in IPsec ESP and AH May 2006
  438. Authors' Addresses
  439. David A. McGrew
  440. Cisco Systems, Inc.
  441. 510 McCarthy Blvd.
  442. Milpitas, CA 95035
  443. US
  444. Phone: (408) 525 8651
  445. EMail: mcgrew@cisco.com
  446. URI: http://www.mindspring.com/~dmcgrew/dam.htm
  447. John Viega
  448. McAfee, Inc.
  449. 1145 Herndon Parkway, Suite 500
  450. Herndon, VA 20170
  451. EMail: viega@list.org
  452. McGrew & Viega Standards Track [Page 13]
  453. RFC 4543 GMAC in IPsec ESP and AH May 2006
  454. Full Copyright Statement
  455. Copyright (C) The Internet Society (2006).
  456. This document is subject to the rights, licenses and restrictions
  457. contained in BCP 78, and except as set forth therein, the authors
  458. retain all their rights.
  459. This document and the information contained herein are provided on an
  460. "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
  461. OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
  462. ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
  463. INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
  464. INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
  465. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  466. Intellectual Property
  467. The IETF takes no position regarding the validity or scope of any
  468. Intellectual Property Rights or other rights that might be claimed to
  469. pertain to the implementation or use of the technology described in
  470. this document or the extent to which any license under such rights
  471. might or might not be available; nor does it represent that it has
  472. made any independent effort to identify any such rights. Information
  473. on the procedures with respect to rights in RFC documents can be
  474. found in BCP 78 and BCP 79.
  475. Copies of IPR disclosures made to the IETF Secretariat and any
  476. assurances of licenses to be made available, or the result of an
  477. attempt made to obtain a general license or permission for the use of
  478. such proprietary rights by implementers or users of this
  479. specification can be obtained from the IETF on-line IPR repository at
  480. http://www.ietf.org/ipr.
  481. The IETF invites any interested party to bring to its attention any
  482. copyrights, patents or patent applications, or other proprietary
  483. rights that may cover technology that may be required to implement
  484. this standard. Please address the information to the IETF at
  485. ietf-ipr@ietf.org.
  486. Acknowledgement
  487. Funding for the RFC Editor function is provided by the IETF
  488. Administrative Support Activity (IASA).
  489. McGrew & Viega Standards Track [Page 14]