123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787 |
- Network Working Group D. McGrew
- Request for Comments: 4543 Cisco Systems, Inc.
- Category: Standards Track J. Viega
- McAfee, Inc.
- May 2006
- The Use of Galois Message Authentication Code (GMAC) in
- IPsec ESP and AH
- Status of This Memo
- This document specifies an Internet standards track protocol for the
- Internet community, and requests discussion and suggestions for
- improvements. Please refer to the current edition of the "Internet
- Official Protocol Standards" (STD 1) for the standardization state
- and status of this protocol. Distribution of this memo is unlimited.
- Copyright Notice
- Copyright (C) The Internet Society (2006).
- Abstract
- This memo describes the use of the Advanced Encryption Standard (AES)
- Galois Message Authentication Code (GMAC) as a mechanism to provide
- data origin authentication, but not confidentiality, within the IPsec
- Encapsulating Security Payload (ESP) and Authentication Header (AH).
- GMAC is based on the Galois/Counter Mode (GCM) of operation, and can
- be efficiently implemented in hardware for speeds of 10 gigabits per
- second and above, and is also well-suited to software
- implementations.
- McGrew & Viega Standards Track [Page 1]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- Table of Contents
- 1. Introduction ....................................................2
- 1.1. Conventions Used in This Document ..........................3
- 2. AES-GMAC ........................................................3
- 3. The Use of AES-GMAC in ESP ......................................3
- 3.1. Initialization Vector ......................................4
- 3.2. Nonce Format ...............................................4
- 3.3. AAD Construction ...........................................5
- 3.4. Integrity Check Value (ICV) ................................6
- 3.5. Differences with AES-GCM-ESP ...............................6
- 3.6. Packet Expansion ...........................................7
- 4. The Use of AES-GMAC in AH .......................................7
- 5. IKE Conventions .................................................8
- 5.1. Phase 1 Identifier .........................................8
- 5.2. Phase 2 Identifier .........................................8
- 5.3. Key Length Attribute .......................................9
- 5.4. Keying Material and Salt Values ............................9
- 6. Test Vectors ....................................................9
- 7. Security Considerations ........................................10
- 8. Design Rationale ...............................................11
- 9. IANA Considerations ............................................11
- 10. Acknowledgements ..............................................11
- 11. References ....................................................12
- 11.1. Normative References .....................................12
- 11.2. Informative References ...................................12
- 1. Introduction
- This document describes the use of AES-GMAC mode (AES-GMAC) as a
- mechanism for data origin authentication in ESP [RFC4303] and AH
- [RFC4302]. We refer to these methods as ENCR_NULL_AUTH_AES_GMAC and
- AUTH_AES_GMAC, respectively. ENCR_NULL_AUTH_AES_GMAC is a companion
- to the AES Galois/Counter Mode ESP [RFC4106], which provides
- authentication as well as confidentiality. ENCR_NULL_AUTH_AES_GMAC
- is intended for cases in which confidentiality is not desired. Like
- GCM, GMAC is efficient and secure, and is amenable to high-speed
- implementations in hardware. ENCR_NULL_AUTH_AES_GMAC and
- AUTH_AES_GMAC are designed so that the incremental cost of
- implementation, given an implementation is AES-GCM-ESP, is small.
- This document does not cover implementation details of GCM or GMAC.
- Those details can be found in [GCM], along with test vectors.
- McGrew & Viega Standards Track [Page 2]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 1.1. Conventions Used in This Document
- The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
- "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
- document are to be interpreted as described in [RFC2119].
- 2. AES-GMAC
- GMAC is a block cipher mode of operation providing data origin
- authentication. It is defined in terms of the GCM authenticated
- encryption operation as follows. The GCM authenticated encryption
- operation has four inputs: a secret key, an initialization vector
- (IV), a plaintext, and an input for additional authenticated data
- (AAD). It has two outputs, a ciphertext whose length is identical to
- the plaintext and an authentication tag. GMAC is the special case of
- GCM in which the plaintext has a length of zero. The (zero-length)
- ciphertext output is ignored, of course, so that the only output of
- the function is the Authentication Tag. In the following, we
- describe how the GMAC IV and AAD are formed from the ESP and AH
- fields, and how the ESP and AH packets are formed from the
- Authentication Tag.
- Below we refer to the AES-GMAC IV input as a nonce, in order to
- distinguish it from the IV fields in the packets. The same nonce and
- key combination MUST NOT be used more than once, since reusing a
- nonce/key combination destroys the security guarantees of AES-GMAC.
- Because of this restriction, it can be difficult to use this mode
- securely when using statically configured keys. For the sake of good
- security, implementations MUST use an automated key management
- system, such as the Internet Key Exchange (IKE) (either version two
- [RFC4306] or version one [RFC2409]), to ensure that this requirement
- is met.
- 3. The Use of AES-GMAC in ESP
- The AES-GMAC algorithm for ESP is defined as an ESP "combined mode"
- algorithm (see Section 3.2.3 of [RFC4303]), rather than an ESP
- integrity algorithm. It is called ENCR_NULL_AUTH_AES_GMAC to
- highlight the fact that it performs no encryption and provides no
- confidentiality.
- Rationale: ESP makes no provision for integrity transforms to
- place an initialization vector within the Payload field; only
- encryption transforms are expected to use IVs. Defining GMAC as
- an encryption transform avoids this issue, and allows GMAC to
- benefit from the same pipelining as does GCM.
- McGrew & Viega Standards Track [Page 3]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- Like all ESP combined modes, it is registered in IKEv2 as an
- encryption transform, or "Type 1" transform. It MUST NOT be used in
- conjunction with any other ESP encryption transform (within a
- particular ESP encapsulation). If confidentiality is desired, then
- GCM ESP [RFC4106] SHOULD be used instead.
- 3.1. Initialization Vector
- With ENCR_NULL_AUTH_AES_GMAC, an explicit Initialization Vector (IV)
- is included in the ESP Payload, at the outset of that field. The IV
- MUST be eight octets long. For a given key, the IV MUST NOT repeat.
- The most natural way to meet this requirement is to set the IV using
- a counter, but implementations are free to set the IV field in any
- way that guarantees uniqueness, such as a linear feedback shift
- register (LFSR). Note that the sender can use any IV generation
- method that meets the uniqueness requirement without coordinating
- with the receiver.
- 3.2. Nonce Format
- The nonce passed to the AES-GMAC authentication algorithm has the
- following layout:
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Salt |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Initialization Vector |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Figure 1: Nonce Format
- The components of the nonce are as follows:
- Salt
- The salt field is a four-octet value that is assigned at the
- beginning of the security association, and then remains constant
- for the life of the security association. The salt SHOULD be
- unpredictable (i.e., chosen at random) before it is selected, but
- need not be secret. We describe how to set the salt for a
- Security Association established via the Internet Key Exchange in
- Section 5.4.
- Initialization Vector
- The IV field is described in Section 3.1.
- McGrew & Viega Standards Track [Page 4]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 3.3. AAD Construction
- Data integrity and data origin authentication are provided for the
- SPI, (Extended) Sequence Number, Authenticated Payload, Padding, Pad
- Length, and Next Header fields. This is done by including those
- fields in the AES-GMAC Additional Authenticated Data (AAD) field.
- Two formats of the AAD are defined: one for 32-bit sequence numbers,
- and one for 64-bit extended sequence numbers. The format with 32-bit
- sequence numbers is shown in Figure 2, and the format with 64-bit
- extended sequence numbers is shown in Figure 3.
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | SPI |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | 32-bit Sequence Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- ~ Authenticated Payload (variable) ~
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Padding (0-255 bytes) |
- + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | | Pad Length | Next Header |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Figure 2: AAD Format with 32-bit Sequence Number
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | SPI |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | 64-bit Extended Sequence Number |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- ~ Authenticated Payload (variable) ~
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Padding (0-255 bytes) |
- + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | | Pad Length | Next Header |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Figure 3: AAD Format with 64-bit Extended Sequence Number
- McGrew & Viega Standards Track [Page 5]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- The use of 32-bit sequence numbers vs. 64-bit extended sequence
- numbers is determined by the security association (SA) management
- protocol that is used to create the SA. For IKEv2 [RFC4306] this is
- negotiated via Transform Type 5, and the default for ESP is to use
- 64-bit extended sequence numbers in the absence of negotiation (e.g.,
- see Section 2.2.1 of [RFC4303]).
- 3.4. Integrity Check Value (ICV)
- The ICV consists solely of the AES-GMAC Authentication Tag. The
- Authentication Tag MUST NOT be truncated, so the length of the ICV is
- 16 octets.
- 3.5. Differences with AES-GCM-ESP
- In this section, we highlight the differences between this
- specification and AES-GCM-ESP [RFC4106]. The essential difference is
- that in this document, the AAD consists of the SPI, Sequence Number,
- and ESP Payload, and the AES-GCM plaintext is zero-length, while in
- AES-GCM-ESP, the AAD consists only of the SPI and Sequence Number,
- and the AES-GCM plaintext consists of the ESP Payload. These
- differences are illustrated in Figure 4. This figure shows the case
- in which the Extended Sequence Number option is not used. When that
- option is exercised, the Sequence Number field in the figure would be
- replaced with the Extended Sequence Number.
- Importantly, ENCR_NULL_AUTH_AES_GMAC is *not* equivalent to AES-GCM-
- ESP with encryption "turned off". However, the ICV computations
- performed in both cases are similar because of the structure of the
- GHASH function [GCM].
- McGrew & Viega Standards Track [Page 6]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- +-> +-----------------------+ <-+
- AES-GCM-ESP | | SPI | |
- AAD -------+ +-----------------------+ |
- | | Sequence Number | |
- +-> +-----------------------+ |
- | Authentication | |
- | IV | |
- +->+-> +-----------------------+ +
- AES-GCM-ESP | | | |
- Plaintext -+ ~ ESP Payload ~ |
- | | | |
- | +-----------+-----+-----+ |
- | | Padding | PL | NH | |
- +----> +-----------+-----+-----+ <-+
- |
- ENCR_NULL_AUTH_AES_GMAC AAD --+
- Figure 4: Differences between ENCR_NULL_AUTH_AES_GMAC and AES-GCM-ESP
- 3.6. Packet Expansion
- The IV adds an additional eight octets to the packet and the ICV adds
- an additional 16 octets. These are the only sources of packet
- expansion, other than the 10-13 bytes taken up by the ESP SPI,
- Sequence Number, Padding, Pad Length, and Next Header fields (if the
- minimal amount of padding is used).
- 4. The Use of AES-GMAC in AH
- In AUTH_AES_GMAC, the AH Authentication Data field consists of the IV
- and the Authentication Tag, as shown in Figure 5. Unlike the usual
- AH case, the Authentication Data field contains both an input to the
- authentication algorithm (the IV) and the output of the
- authentication algorithm (the tag). No padding is required in the
- Authentication Data field, because its length is a multiple of 64
- bits.
- McGrew & Viega Standards Track [Page 7]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Initialization Vector (IV) |
- | (8 octets) |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Integrity Check Value (ICV) (16 octets) |
- | |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Figure 5: The AUTH_AES_GMAC Authentication Data Format
- The IV is as described in Section 3.1. The Integrity Check Value
- (ICV) is as described in Section 3.4.
- The GMAC Nonce input is formed as described in Section 3.2. The GMAC
- AAD input consists of the authenticated data as defined in Section
- 3.1 of [RFC4302]. These values are provided as to that algorithm,
- along with the secret key, and the resulting authentication tag given
- as output is used to form the ICV.
- 5. IKE Conventions
- This section describes the conventions used to generate keying
- material and salt values for use with ENCR_NULL_AUTH_AES_GMAC and
- AUTH_AES_GMAC using the Internet Key Exchange (IKE) versions one
- [RFC2409] and two [RFC4306].
- 5.1. Phase 1 Identifier
- This document does not specify the conventions for using AES-GMAC for
- IKE Phase 1 negotiations. For AES-GMAC to be used in this manner, a
- separate specification would be needed, and an Encryption Algorithm
- Identifier would need to be assigned. Implementations SHOULD use an
- IKE Phase 1 cipher that is at least as strong as AES-GMAC. The use
- of AES-CBC [RFC3602] with the same AES key size as used by
- ENCR_NULL_AUTH_AES_GMAC or AUTH_AES_GMAC is RECOMMENDED.
- 5.2. Phase 2 Identifier
- For IKE Phase 2 negotiations, IANA has assigned identifiers as
- described in Section 9.
- McGrew & Viega Standards Track [Page 8]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 5.3. Key Length Attribute
- AES-GMAC can be used with any of the three AES key lengths. The way
- that the key length is indicated is different for AH and ESP.
- For AH, each key length has its own separate integrity transform
- identifier and algorithm name (Section 9). The IKE Key Length
- attribute MUST NOT be used with these identifiers. This transform
- MUST NOT be used with ESP.
- For ESP, there is a single encryption transform identifier (which
- represents the combined transform) (Section 9). The IKE Key Length
- attribute MUST be used with each use of this identifier to indicate
- the key length. The Key Length attribute MUST have a value of 128,
- 192, or 256.
- 5.4. Keying Material and Salt Values
- IKE makes use of a pseudo-random function (PRF) to derive keying
- material. The PRF is used iteratively to derive keying material of
- arbitrary size, called KEYMAT. Keying material is extracted from the
- output string without regard to boundaries.
- The size of the KEYMAT for the ENCR_NULL_AUTH_AES_GMAC and
- AUTH_AES_GMAC MUST be four octets longer than is needed for the
- associated AES key. The keying material is used as follows:
- ENCR_NULL_AUTH_AES_GMAC with a 128-bit key and AUTH_AES_128_GMAC
- The KEYMAT requested for each AES-GMAC key is 20 octets. The
- first 16 octets are the 128-bit AES key, and the remaining four
- octets are used as the salt value in the nonce.
- ENCR_NULL_AUTH_AES_GMAC with a 192-bit key and AUTH_AES_192_GMAC
- The KEYMAT requested for each AES-GMAC key is 28 octets. The
- first 24 octets are the 192-bit AES key, and the remaining four
- octets are used as the salt value in the nonce.
- ENCR_NULL_AUTH_AES_GMAC with a 256-bit key and AUTH_AES_256_GMAC
- The KEYMAT requested for each AES-GMAC key is 36 octets. The
- first 32 octets are the 256-bit AES key, and the remaining four
- octets are used as the salt value in the nonce.
- 6. Test Vectors
- Appendix B of [GCM] provides test vectors that will assist
- implementers with AES-GMAC.
- McGrew & Viega Standards Track [Page 9]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 7. Security Considerations
- Since the authentication coverage is different between AES-GCM-ESP
- and this specification (see Figure 4), it is worth pointing out that
- both specifications are secure. In ENCR_NULL_AUTH_AES_GMAC, the IV
- is not included in either the plaintext or the additional
- authenticated data. This does not adversely affect security, because
- the IV field only provides an input to the GMAC IV, which is not
- required to be authenticated (see [GCM]). In AUTH_AES_GMAC, the IV
- is included in the additional authenticated data. This fact has no
- adverse effect on security; it follows from the property that GMAC is
- secure even against attacks in which the adversary can manipulate
- both the IV and the message. Even an adversary with these powerful
- capabilities cannot forge an authentication tag for any message
- (other than one that was submitted to the chosen-message oracle).
- Since such an adversary could easily choose messages that contain the
- IVs with which they correspond, there are no security problems with
- the inclusion of the IV in the AAD.
- GMAC is provably secure against adversaries that can adaptively
- choose plaintexts, ICVs and the AAD field, under standard
- cryptographic assumptions (roughly, that the output of the underlying
- cipher under a randomly chosen key is indistinguishable from a
- randomly selected output). Essentially, this means that, if used
- within its intended parameters, a break of GMAC implies a break of
- the underlying block cipher. The proof of security is available in
- [GCMP].
- The most important security consideration is that the IV never
- repeats for a given key. In part, this is handled by disallowing the
- use of AES-GMAC when using statically configured keys, as discussed
- in Section 2.
- When IKE is used to establish fresh keys between two peer entities,
- separate keys are established for the two traffic flows. If a
- different mechanism is used to establish fresh keys, one that
- establishes only a single key to protect packets, then there is a
- high probability that the peers will select the same IV values for
- some packets. Thus, to avoid counter block collisions, ESP or AH
- implementations that permit use of the same key for protecting
- packets with the same peer MUST ensure that the two peers assign
- different salt values to the security association (SA).
- The other consideration is that, as with any block cipher mode of
- operation, the security of all data protected under a given security
- association decreases slightly with each message.
- McGrew & Viega Standards Track [Page 10]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- To protect against this problem, implementations MUST generate a
- fresh key before processing 2^64 blocks of data with a given key.
- Note that it is impossible to reach this limit when using 32-bit
- Sequence Numbers.
- Note that, for each message, GMAC calls the block cipher only once.
- 8. Design Rationale
- This specification was designed to be as similar to AES-GCM-ESP
- [RFC4106] as possible. We re-use the design and implementation
- experience from that specification. We include all three AES key
- sizes since AES-GCM-ESP supports all of those sizes, and the larger
- key sizes provide future users with more high-security options.
- 9. IANA Considerations
- IANA has assigned the following IKEv2 parameters. For the use of AES
- GMAC in AH, the following integrity (type 3) transform identifiers
- have been assigned:
- "9" for AUTH_AES_128_GMAC
- "10" for AUTH_AES_192_GMAC
- "11" for AUTH_AES_256_GMAC
- For the use of AES-GMAC in ESP, the following encryption (type 1)
- transform identifier has been assigned:
- "21" for ENCR_NULL_AUTH_AES_GMAC
- 10. Acknowledgements
- Our discussions with Fabio Maino and David Black significantly
- improved this specification, and Tero Kivinen provided us with useful
- comments. Steve Kent provided guidance on ESP interactions. This
- work is closely modeled after AES-GCM, which itself is closely
- modeled after Russ Housley's AES-CCM transform [RFC4309].
- Additionally, the GCM mode of operation was originally conceived as
- an improvement to the CWC mode [CWC] in which Doug Whiting and Yoshi
- Kohno participated. We express our thanks to Fabio, David, Tero,
- Steve, Russ, Doug, and Yoshi.
- McGrew & Viega Standards Track [Page 11]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- 11. References
- 11.1. Normative References
- [GCM] McGrew, D. and J. Viega, "The Galois/Counter Mode of
- Operation (GCM)", Submission to NIST. http://
- csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/
- gcm-spec.pdf, January 2004.
- [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
- Requirement Levels", BCP 14, RFC 2119, March 1997.
- [RFC3602] Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher
- Algorithm and Its Use with IPsec", RFC 3602, September
- 2003.
- 11.2. Informative References
- [CWC] Kohno, T., Viega, J., and D. Whiting, "CWC: A high-
- performance conventional authenticated encryption mode",
- Fast Software Encryption.
- http://eprint.iacr.org/2003/106.pdf, February 2004.
- [GCMP] McGrew, D. and J. Viega, "The Security and Performance of
- the Galois/Counter Mode (GCM)", Proceedings of INDOCRYPT
- '04, http://eprint.iacr.org/2004/193, December 2004.
- [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
- (IKE)", RFC 2409, November 1998.
- [RFC4106] Viega, J. and D. McGrew, "The Use of Galois/Counter Mode
- (GCM) in IPsec Encapsulating Security Payload (ESP)", RFC
- 4106, June 2005.
- [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, December
- 2005.
- [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC
- 4303, December 2005.
- [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC
- 4306, December 2005.
- [RFC4309] Housley, R., "Using Advanced Encryption Standard (AES) CCM
- Mode with IPsec Encapsulating Security Payload (ESP)", RFC
- 4309, December 2005.
- McGrew & Viega Standards Track [Page 12]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- Authors' Addresses
- David A. McGrew
- Cisco Systems, Inc.
- 510 McCarthy Blvd.
- Milpitas, CA 95035
- US
- Phone: (408) 525 8651
- EMail: mcgrew@cisco.com
- URI: http://www.mindspring.com/~dmcgrew/dam.htm
- John Viega
- McAfee, Inc.
- 1145 Herndon Parkway, Suite 500
- Herndon, VA 20170
- EMail: viega@list.org
- McGrew & Viega Standards Track [Page 13]
- RFC 4543 GMAC in IPsec ESP and AH May 2006
- Full Copyright Statement
- Copyright (C) The Internet Society (2006).
- This document is subject to the rights, licenses and restrictions
- contained in BCP 78, and except as set forth therein, the authors
- retain all their rights.
- This document and the information contained herein are provided on an
- "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
- OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
- ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
- INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
- INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
- WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
- Intellectual Property
- The IETF takes no position regarding the validity or scope of any
- Intellectual Property Rights or other rights that might be claimed to
- pertain to the implementation or use of the technology described in
- this document or the extent to which any license under such rights
- might or might not be available; nor does it represent that it has
- made any independent effort to identify any such rights. Information
- on the procedures with respect to rights in RFC documents can be
- found in BCP 78 and BCP 79.
- Copies of IPR disclosures made to the IETF Secretariat and any
- assurances of licenses to be made available, or the result of an
- attempt made to obtain a general license or permission for the use of
- such proprietary rights by implementers or users of this
- specification can be obtained from the IETF on-line IPR repository at
- http://www.ietf.org/ipr.
- The IETF invites any interested party to bring to its attention any
- copyrights, patents or patent applications, or other proprietary
- rights that may cover technology that may be required to implement
- this standard. Please address the information to the IETF at
- ietf-ipr@ietf.org.
- Acknowledgement
- Funding for the RFC Editor function is provided by the IETF
- Administrative Support Activity (IASA).
- McGrew & Viega Standards Track [Page 14]
|