<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-00">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3 and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-00"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2023" month="December" day="07"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 59?>

<t>This documents proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction-and-rationale">
      <name>Introduction and rationale</name>
      <t>AEGIS <xref target="AEGIS"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS caters to the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the necessity for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic proves particularly advantageous for servers managing a substantial volume of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, mitigating the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is very efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers seamlessly integrate into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite denotes the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the designated hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>To accommodate AEGIS-based encryption algorithms, this document introduces additional cipher suites to those specified in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale behind recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites referenced herein, these algorithms <bcp14>MUST</bcp14> be utilized with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specifications detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="AEGIS"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 16 or 32, depending on the chosen AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(5, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the QUIC packet headers undergo encryption in accordance with the specifications outlined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated following the same procedure as in DTLS 1.3, utilizing:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 16 or 32, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(5, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation encompasses the cipher suites outlined in this document</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM ones of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aead"/>,</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed prior to encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Requested IANA identifiers</name>
        <thead>
          <tr>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="AEGIS" target="https://datatracker.ietf.org/doc/draft-irtf-cfrg-aegis-aead/">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
      </references>
    </references>
    <?line 185?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="tls-13-nonces-for-record-encryption">
        <name>TLS 1.3 Nonces for Record Encryption</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
handshake_iv:         cc421814028367299508e120a7cb3ad2

sequence_number:      0102030405

nonce:                cc421814028367299508e121a5c83ed7
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128lsha512">
          <name>With TLS_AEGIS_128L_SHA512</name>
          <artwork><![CDATA[
handshake_iv:         724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

sequence_number:      0102030405

nonce:                724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08431f32bb61d
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-2">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            16

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            16

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            32

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            32

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
