<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
     There has to be one entity for each item to be referenced. 
     An alternate method (rfc include) is described in the references. -->
<!ENTITY RFC5905 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5905.xml">
<!ENTITY RFC7539 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7539.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC6151 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6151.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC2104 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2104.xml">
<!ENTITY RFC7630 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7630.xml">
<!ENTITY RFC4493 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4493.xml">
<!ENTITY RFC4543 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4543.xml">
<!ENTITY RFC4106 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4106.xml">
<!ENTITY I-D.narten-iana-considerations-rfc2434bis SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.narten-iana-considerations-rfc2434bis.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
     (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-aanchal4-ntp-mac-01" ipr="trust200902">
  <!-- category values: std, bcp, info, exp, and historic
     ipr values: full3667, noModification3667, noDerivatives3667
     you can add the attributes updates="NNNN" and obsoletes="NNNN" 
     they will automatically be output with "(if approved)" -->

  <!-- ***** FRONT MATTER ***** -->

  <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the 
         full title is longer than 39 characters -->

    <title abbrev="MACs for NTP">
    Message Authentication Codes for the Network Time Protocol
    </title>

    <!-- add 'role="editor"' below for the editors if appropriate -->

    <!-- Another author who claims to be an editor -->


    <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
      <organization>Boston University </organization>

      <address>
        <postal>
          <street>111 Cummington St</street>

          <!-- Reorder these if your country does things differently -->

          <city>Boston, MA</city>

          <region/>

          <code>02215</code>

          <country>US</country>
        </postal>

        <phone/>

        <email>aanchal4@bu.edu</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

    <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
      <organization>Boston University</organization>

      <address>
        <postal>
          <street>111 Cummington St</street>

          <!-- Reorder these if your country does things differently -->

          <city>Boston, MA</city>

          <region/>

          <code>02215</code>

          <country>US</country>
        </postal>

        <phone/>

        <email>goldbe@cs.bu.edu</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

<!-- other authors -->

    <date year="2016"/>

    <!-- If the month and year are both specified and are the current ones,
         xml2rfc will fill in the current day for you. If only the current
         year is specified, xml2rfc will fill in the current day and month
         for you. If the year is not the current one, it is necessary to
         specify at least a month (xml2rfc assumes day="1" if not specified
         for the purpose of calculating the expiry date).  With drafts it is
         normally sufficient to specify just the year. -->

    <!-- Meta-data Declarations -->

    <area>General</area>

    <workgroup>Internet Engineering Task Force</workgroup>

    <!-- WG name at the upperleft corner of the doc,
         IETF is fine for individual submissions.  
	 If this element is not present, the default is "Network Working
         Group", which is used by the RFC Editor as a nod to the history of
         the IETF. -->

    <keyword>NTP</keyword>

    <!-- Keywords will be incorporated into HTML output
         files in a meta tag but they have no effect on text or nroff
         output. If you submit your draft to the RFC Editor, the
         keywords will be used for the search engine. -->

    <abstract>
      <t>The Network Time Protocol (NTP) <xref target="RFC5905">RFC 5905</xref>
      uses a message authentication code (MAC) to cryptographically 
      authenticate its UDP packets.  Currently, NTP packets are authenticated 
      by appending a 128-bit key to the NTP data, and hashing the result with
      MD5 to obtain a 128-bit tag. However, as discussed in <xref target="BCK"></xref> and
      <xref target="RFC6151"></xref>, this not a secure MAC.  As such,
      this draft considers different secure MAC algorithms for use with NTP,
      evaluates their performance, and recommends the use 
      CMAC-AES <xref target="RFC4493"></xref>.
      We also suggest deprecating the use of MD5 as defined in [RFC5905] 
      for authenticating NTP packets.
      </t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>NTP uses a message authentication code (MAC) to authenticate its packets. 
      Currently, NTP packets are authenticated by appending a 128-bit key to
      the NTP data, and hashing the result with MD5 to obtain a 128-bit tag.
      
      However, as discussed in <xref target="BCK"></xref> and
      <xref target="RFC6151"></xref>, this not a secure MAC.  As such,
      this draft considers different secure MAC algorithms for use with NTP,
       evaluates their performance, and and recommends the use 
      CMAC-AES <xref target="RFC4493"></xref>. 
      We also suggest deprecating the use of MD5, as defined in [RFC5905], 
      for authenticating NTP packets.</t>
      
      
      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in <xref
        target="RFC2119">RFC 2119</xref>.</t>
      </section>
    </section>


    <section title="MAC Algorithms">
      
      <t>
      We consider five diverse MAC algorithms, which encompass hash-based HMAC-MD5 
      and HMAC-SHA224 <xref target="RFC2104"></xref>, 
      block cipher-based CMAC-AES <xref target="RFC4493"></xref>,
      and universal hashing-based Galois MAC (GMAC) <xref target="RFC4543"></xref>
      and Poly1305(ChaCha20) as in section 2.6 of <xref target="RFC7539"></xref>.
      For completeness we also benchmark  the legacy MD5(key||message) from 
      <xref target="RFC5905"></xref>.</t>
      
       <!-- <texttable>
                <ttcol>Algorithm </ttcol>
                <ttcol align="right">Input Key Length (Bytes) </ttcol>
                <ttcol align="right">Output Tag Length (Bytes)  </ttcol>
                <ttcol align="right">Security Level (bits)  </ttcol>
                <c>legacy MD5</c>       <c>16</c> <c>16</c> <c>NA</c>
                <c>HMAC-MD5</c>       <c>16</c> <c>16</c><c>NA</c>
                <c>HMAC-SHA224</c>    <c>16</c> <c>28</c> <c>112</c>
                <c>CMAC(AES)</c>      <c>16</c> <c>16 </c><c>128 </c>
                <c>GMAC(AES)</c>      <c>16</c> <c>16</c><c>128</c>
                <c>Poly1305(ChaCha20)</c>  <c>32 </c><c>16 </c><c>128</c>
            </texttable> -->
        <texttable>
            <ttcol>Algorithm </ttcol>
            <ttcol align="right">Input Key Length (Bytes) </ttcol>
            <ttcol align="right">Output Tag Length (Bytes)  </ttcol>
            <c>legacy MD5</c>       <c>16</c> <c>16</c>
            <c>HMAC-MD5</c>       <c>16</c> <c>16</c>
            <c>HMAC-SHA224</c>    <c>16</c> <c>16</c>
            <c>CMAC(AES)</c>      <c>16</c> <c>16 </c>
            <c>GMAC(AES)</c>      <c>16</c> <c>16</c>
            <c>Poly1305(ChaCha20)</c>  <c>32 </c><c>16 </c>
        </texttable>


      <t>
       The choice of algorithms evaluated here is motivated, in part, by standardization
      and availablity of open source implementation. 
      All algorithm we consider, other than plain MD5, are standardized.
      Four out of five algorithms are at available in the OpenSSL library,
      while Poly1305(ChaCha20) algorithm is implemented
      in LibreSSL (a fork of OpenSSL) and also in BoringSSL (Google's 
      implementation of OpenSSL).</t>
      
      <t> The output tag length for HMAC-SHA224 is 28 bytes, but we truncate it
       to 16 bytes as in section 4 of <xref target="RFC7630"></xref> to fit 
       into the NTP packet. As noted in section 6 of <xref target="RFC2104"></xref> 
       it is safe to truncate the output of MACs as long as the truncated length 
       is greater than 80-bits and not less than half the length of the hash output.
      </t>
      
      
    </section>

    <section title="Requirements">
    
    <section title="Performance Requirements">
    
    
      <t>  In order to accurately compute the time,
      NTP ideally requires MAC algorithms to have a constant 
      computational latency.  However, this is generally not possible, 
      since latency depends on the CPU load, temperature, and other 
      uncontrollable factors.  Instead, a MAC algorithm that requires fewer 
      clock cycles for computation is prefered over one that requires more
      clock cycles, as this directly translates to a reduction
      in jitter (i.e., the variance of the latency for computing the MAC).
       </t>
     
        
      <t> Throughput is another important consideration.  NTP servers may have 
      to deal with thousands of client requests per second. A study 
      <xref target="NIST"></xref> on the usage analysis of NIST's NTP stratum 1 
      servers shows these servers caters to 28,000 requests/second on an 
      average, per server.
      </t>
      
      
      
      <t> 
      Most of the Internet is served by stratum 2 and stratum 3 servers, some 
      of which are part of voluntary NTP pool. These machines may be running old
      hardware. So we benchmark performance on a range of software and
      hardware platforms.
     </t>
     
    </section>
    
    
    <section title="Security Requirements">
    <t>There are several more constraints specific to NTP that need to be taken
        into account.</t>
        <t>
        <list style="numbers">
        <t>NTP servers are stateless.</t>
        <t>Per <xref target="RFC5905"></xref>, NTP uses a pre-shared symmetric key. This makes key management 
        difficult because there there is no in-band mechanism for 
        distributing keys. As such, to simplify key management, some
        deployments use the same pre-shared key at many servers 
        (typically at the same stratum).  
        In other words, the same key is used for several associations. </t>
        <t><xref target="RFC5905"></xref> also has no in-band mechanism to refresh keys. </t>
        </list> </t>
        </section>
    </section>
    
    
    <section title="Performance Results">
    
      <t>The NTP header is 48 bytes long. We therefore consider the latency 
      and throughput for several secure message
      authentication code (MAC) algorithms when computed over 48-byte messages.
      </t>
    
    <t>We customize the in-built speed utility of OpenSSL-1.0.2g (03 May 2016) 
    version to compute the latency and throughput for each MAC as shown in the 
    tables below. OpenSSL, however, does not implement stream-cipher 
    ChaCha20-based Poly1305 MAC algorithm. To speed test this MAC, we use 
    LibreSSL 2.3.1, a fork of OpenSSL implementation. OpenSSL and LibreSSL 
    are the most widely used cryptographic libraries and are used by the 
    current NTP implementations.
    </t>
  <t>Since the introduction of New Instruction (NI) set for hardware support 
  in Intel chips, certain MACs like CMAC and GMAC have performance advantage
  on such machines. Based on this, we perform two different benchmarks: one 
  with AES-NI enabled and the other with it disabled.  Benchmarks were taken
  on an x86_64, Intel(R) Xeon(R) CPU E5-2676 v3 @ 2.40GHz with one core CPU.
      </t>
      
      
  <t>
      This table shows throughput in terms of number of 48-byte NTP payload 
      processed per second.</t>
        <texttable>
                <ttcol>Algorithm </ttcol>
                <ttcol align="right">with AES-NI</ttcol>
                <ttcol align="right">without AES-NI </ttcol>
                <c>legacy MD5</c>       <c>3118K</c> <c>3165K</c>
                <c>HMAC-MD5</c>       <c>2742K</c> <c>2749K</c>
                <c>HMAC-SHA224</c>       <c>1265K</c> <c>1267K</c>
                <c>CMAC(AES)</c>       <c>7567K</c> <c>4388K</c>
                <c>GMAC(AES)</c>       <c>16612K</c> <c>4627K</c>
                <c>Poly1305(ChaCha20)</c>       <c>2598K</c> <c>2398K</c>
            </texttable>

        <t> This table shows latency in terms of number of CPU cycles per byte (cpb)
        when processing a 48-byte NTP payload.
        </t>
      
<texttable>
    <ttcol>Algorithm </ttcol>
    <ttcol align="right">with AES-NI</ttcol>
    <ttcol align="right">without AES-NI </ttcol>
    <c>legacy MD5</c>       <c>16.0</c> <c>15.7</c>
    <c>HMAC-MD5</c>       <c>18.2</c> <c>18.1</c>
    <c>HMAC-SHA224</c>       <c>39.4</c> <c>39.0</c>
    <c>CMAC(AES)</c>       <c>6.6</c> <c>11.3</c>
    <c>GMAC(AES)</c>       <c>3.0</c> <c>10.8</c>
    <c>Poly1305(ChaCha20)</c>       <c>14.4</c> <c>15.0</c>
</texttable>
 
<t>TODO: Test on other types of hardware.</t>
   
    </section>
  
    <!-- Possibly a 'Contributors' section ... -->

<!--
    <section anchor="IANA" title="IANA Considerations">
      <t>This memo requests IANA to allocate NTP Extension Field Types
      0x0006 (Suggested REFID, MAC required), 0x2006 (Suggested REFID, MAC
      OPTIONAL) for this purpose.</t>
    </section>
-->


    <section anchor="Security" title="Security Considerations">

<t>
          The MD5 (key||message) "message authentication code" specified
          in <xref target="RFC5905"></xref> is vulnerable to length extension
          attacks, and uses the insecure MD5 hash function, and therefore
          MUST be deprecated.
      </t>

      <t>Therefore, we consider hash-based MACs (HMAC-MD5, HMAC-SHA224), and
      cipher-based MACs (CMAC-AES, Poly1305 (ChaCha20)). The upper bound on
      the security level provided by any MAC against brute-force attacks
      is min (key-length, tag-length). The security of these MACs can be worse
      but not better than this bound. All MAC algorithms we consider have
      comparable key-lengths and output tag-lengths. So the advantage of an
      adversary that wishes to forge a MAC is lower-bounded by 1/2^{128}.
      </t>
      <t>
      Assume that an adversary can obtain a valid MAC for q distinct messages.
      Then the table below describes the advantage of an adversary that wishes
      to forge a MAC in terms of number of queries (q) it launches.
      </t>
      <texttable>
                    <ttcol>Algorithm </ttcol>
                    <ttcol align="right">Advantage</ttcol>
                    <c>HMAC-MD5 <xref target="MB"></xref> </c>       <c>q^2/2^{128}</c>
                    <c>HMAC-SHA224 <xref target="BCK"></xref> </c>       <c>q^2/2^{224}</c>
                    <c>CMAC(AES)<xref target="IK"></xref></c>       <c>q^2/2^{128}</c>
                    <c>GMAC(AES) <xref target="IOM"></xref></c>       <c>q^2/2^{128} (Seems wrong)</c>
                    <c>Poly1305(ChaCha20) <xref target="DJB"></xref></c>       <c>{e^{{q^2}/{2^{129}}}}/2^{103}</c>
                </texttable>

            <t> Poly1305 can easily handle up to q=2^{64} but security degrades
            pretty rapidly after that.
            </t>

            <t>
            However, the bounds in the table above are somewhat optimistic, for
            the following reasons.
            </t>


            <t>
            <list style="numbers">
                              
                                <t> GMAC has an initialization vector (IV) that
                <xref target="RFC4106"></xref>
                allows to be 1 &lt;= len(IV) &lt;= 2^{64}-1.  However, per
                <xref target="RFC4106"></xref>, implementations are optimized
                to handle a 12-octet IV.  With a 12-octet IV, the total number of
                message invocations is bound to 2^{48}. Moreover,
                if the IV is reused even once
                (for the same secret authentication key and different input messages),
                then  <xref target="Joux"></xref>  shows that
                the secret authetication key can easily be recovered by
                the adversary. Notice that this attack is
                even stronger than message forgery because it recovers the
                authenication key. This is known as a nonce-reuse vulnerability. 
                </t>            
                
                <t> The other three algorithms evaluated here do not suffer from nonce
                reuse vulnerabilities where that adversary can recover the 
                authentication key if the nonce is reused just once.
                </t>
                
                <t>The table above suggest that for CMAC, the total number of
                invocation of the MAC is limited to 2^{64}. However,
                <xref target="NIST-CMAC"></xref> recommends, to be on the
                safe side, that the total number of invocations of the block
                cipher algorithm during the lifetime of the key is limited to
                2^{48}.
                </t>
                </list></t>
                
<section title="Why is GMAC not suitable for NTP?">
        

<t><xref target="Joux"></xref> showed that for GMAC-AES, if the IV is repeated 
just once, then the authentication key can be fully recovered.  None of the
other algorithms evaluated here have this vulnerability. Thus, for GMAC-AES
to be secure, we need to make sure that IV is never repeated.
</t>
<t>
<xref target="NIST-GMAC"></xref> recommends constructing the 12-byte IV used in GMAC by concatenating
a fixed 4-byte salt value and a with variable 8-byte nonce i.e. 
IV = ( salt|| nonce). Here salt is an implicit value established when an 
session is established, remains fixed for all exchanges in a session 
(i.e. for all invocations that use the same authenicationkey) between the 
sender and the receiver. Meanwhile, the nonce is freshly generated for each
authenticated message.</t>

<t> Because NTP servers do not keep per-client state, the nonce can not be 
a sequential value. Instead, this nonce must be is a randomly generated
 8-bytes value chosen freshly
for each authenticated message. According to birthday bound, the nonce value 
will be repeated, with high 
probability,
after 2^{32} messages sent in a given association . This leads to a repeated IV value and to
 <xref target="Joux"></xref>'s 
attack. Thus, to prevent repeated nonces, we would need to require the authentication
key to be refereshed for the association after 2^{32} messages. </t>
    
<t> While on one hand, 2^{32} is a lot of 
queries for an honest client, assuming that the client queries once per 
minute (which is NTP's minimum polling interval <xref target="RFC5905"></xref>). 
On the other hand, a man-in-the-middle (MiTM) can quickly and easily exhaust 
this number by replaying old authenticated queries to the NTP server.
</t>

<t>
Another problem is that NTP lacks an explict in-band key refresh 
mechanism that can be invoked automatically (without operator intervention).
</t>

<t> Even if there was a method by which key-refresh could be performed, 
there is an additional problem. An NTP server does not keep per-client state.
Therefore, it cannot keep track of the number of messages it sent in a 
given association.  One idea is to have the client keep this state, and then send 
an authenicated request for a key refresh. However,  a man-in-the-middle (MiTM) 
could replay old authenticated queries to the NTP server, and then
intercept the servers response before they reach the legitimate clients. In this
case, the client would never know when to ask for a key refresh.</t>
    
<t> Alternatively, the server could maintain a global counter (since it can't 
afford to keep per client counter). And after 2^{32} messages, it
can refresh the keys with all its clients. However, a man-in-the-middle could 
exhaust this number quickly and the server will have to refresh keys with all 
the clients very frequently. Thus, we conclude that a scheme that requires 
refreshing the key after 2^{32} client queries is not a good idea at all.</t>
        
<t>Even in the absence of a man-in-the-middle, there is the problem of multiple
servers using the same authentication key. Thus, salt could be used to 
distinguish IVs across different client/server associations that use the 
same authenication key. However, this brings us back to the original key 
management problem. One way to deal with this is to choose the 4-byte salt at 
random. However, this rise to a birthday bound of 2^{16} = 65,000 unique 
IVs. If we consider 20,000 stratum 3 clients synchronizing to three stratum 
2 servers each, all of which are in the same organization and share the same
symmetric key, we get very close to the birthday bound. Thus, this leads to
other disadvantages when using GMAC with NTP.</t>
 </section>
 <section title= "Use HMAC or CMAC instead?">
 <t>
 <list style="numbers">
 <t>CMAC seems to be the next best choice. Leaving out GMAC, 
    it has the best performance with and without hardware support. It is not 
    vulnerable to nonce misuse issues.</t>
 <t>HMAC is way slower because it has built-in hardware support. </t>
 <t>On the other hand, it is much easier to get the right implementation for 
 HMAC compared to CMAC or GMAC/GCM mode. </t>
 </list>
 </t>
 </section>
 </section>
 <section title="Recommendations">
 
     <t>From the tables we clearly see that GMAC(AES) has the best latency and
     throughput performance in both hardware and software implementations. It 
     is freely available, and there is a flexibilty of changing the underlying 
     block-cipher. However there are several security problems surrounding 
     the use of this mode, as highlighted above, so it is not recommended.</t>
     
     <t> CMAC, on the other hand, is the next best choice in terms of 
     performance and security. So we recommend the use of CMAC.</t>     
 </section>
    
    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors wish to acknowledge useful discussions with Leen Alshenibr,
      Daniel Franke, Ethan Heilman, Kenny Paterson, Leonid Reyzin, Harlan Stenn,
      Mayank Varia.</t>
    </section>

  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>
    <!-- References split into informative and normative -->

    <!-- There are 2 ways to insert reference entries from the citation libraries:
     1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
     2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
        (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

     Both are cited textually in the same manner: by using xref elements.
     If you use the PI option, xml2rfc will, by default, try to find included files in the same
     directory as the including file. You can also define the XML_LIBRARY environment variable
     with a value containing a set of directories to search.  These can be either in the local
     filing system or remote ones accessed by http (http://domain/dir/... ).-->

    <references title="Normative References">
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?-->

      &RFC2119;

      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5905.xml"?-->

      &RFC5905;

     
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6151.xml"?-->

      &RFC6151;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7539.xml"?-->
      
      &RFC7539;
      &RFC2104;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7630.xml"?-->
      &RFC7630;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4493.xml"?-->
      
      &RFC4493;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4543.xml"?-->
      
      &RFC4543;
      
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4106.xml">-->
      &RFC4106;
      
    </references>

    <!-- Here we use entities that we defined at the beginning. -->

    <references title="Informative References">
      <!--&RFC3552;-->

      <reference anchor="BCK">
            <front>
                <title>Keyed Hash Functions and Message Authentication</title> 
                <author initials="M." surname="Bellare"><organization /></author>
                <author initials="R." surname="Canetti"><organization /></author>
                <author initials="H." surname="Krawczyk"><organization /></author>
                <date year="1996" />
            </front>
            <seriesInfo name="in" value="Proceedings of Crypto'96" />
        </reference>
      
      <reference anchor="MB">
          <front>
              <title>New Proofs for NMAC and HMAC:Security without Collision-Resistance</title>
              <author initials="M." surname="Bellare"><organization /></author>
              <date year="1996" />
          </front>
          <seriesInfo name="in" value="Proceedings of Crypto'96" />
      </reference>
      
      <reference anchor="IK">
          <front>
              <title>Keyed Hash Functions and Message Authentication</title>
              <author initials="T." surname="Iwata"><organization /></author>
              <author initials="K." surname="Kurosawa"><organization /></author>
              <date year="2003" />
          </front>
          <seriesInfo name="in" value="Progress in Cryptology-INDOCRYPT 2003" />
      </reference>
      
      <reference anchor="IOM">
          <front>
              <title>Breaking and Repairing GCM Security Proofs</title>
              <author initials="T." surname="Iwata"><organization /></author>
              <author initials="K." surname="Ohashi"><organization /></author>
              <author initials="K." surname="Minematsu"><organization /></author>
              <date year="2012" />
          </front>
          <seriesInfo name="in" value="Proceedings of CRYPTO 2012" />
      </reference>
      
      <reference anchor="DJB">
          <front>
              <title>The Poly1305-AES message-authentication code</title>
              <author initials="D.J." surname="Bernstein"><organization /></author>
              <date year="2005" />
          </front>
          <seriesInfo name="in" value="Fast Software Encryption" />
      </reference>
    
      <reference anchor="NIST-GMAC">
          <front>
              <title>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</title>
              <author initials="M." surname="Dworkin"><organization /></author>
              <date year="2007" />
          </front>
          <seriesInfo name="in" value="NIST Special Publication 800-38D" />
      </reference>
      
      <reference anchor="NIST-CMAC">
          <front>
              <title>Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication</title>
              <author initials="M." surname="Dworkin"><organization /></author>
              <date year="2005" />
          </front>
          <seriesInfo name="in" value="NIST Special Publication 800-38B" />
      </reference>

      
      <reference anchor="NIST">
          <front>
              <title>Usage Analysis of the NIST Internet Time Service</title>
              <author initials="J.A." surname="Sherman"><organization /></author>
              <author initials="J." surname="Levine"><organization /></author>
              <date year="2016" />
          </front>
          <seriesInfo name= "in" value="Journal of Research of the National Institute of Standards and Technology" />
      </reference>
      
      <reference anchor="GK">
          <front>
              <title>The fragility of AES-GCM authentication algorithm</title>
              <author initials="S." surname="Gueron"><organization /></author>
              <author initials="V." surname="Krasnov"><organization /></author>
              <date year="2014" />
          </front>
          <seriesInfo name= "in" value="Proceedings of 11th International Conference on Information Technology: New Generations 2014" />
      </reference>
      
      <reference anchor="Joux" target="http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/800-38_Series-Drafts/GCM/Joux_comments.pdf">
          <front>
              <title>Authentication Failures in NIST version of GCM</title>
              <author initials="A." surname="Joux"><organization /></author>
              <date/>
          </front>
      </reference>

    </references>

    <!--
    <section anchor="app-additional" title="Additional Stuff">
      <t>This becomes an Appendix.</t>
    </section>
-->

    <!-- Change Log

v00 2016-07-NN  AM Initial Submission   
                                                                                        -->
  </back>
</rfc>
