<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-05">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3 and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-05"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2025" month="November" day="12"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 54?>

<t>This document proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction-and-rationale">
      <name>Introduction and Rationale</name>
      <t>AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS targets the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the need for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic is particularly advantageous for servers managing a large number of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, reducing the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is highly efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers integrate seamlessly into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite specifies the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>This document introduces additional cipher suites to accommodate AEGIS-based encryption algorithms:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X4_SHA256</tt></td>
            <td align="left">AEGIS-128X4</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X4_SHA512</tt></td>
            <td align="left">AEGIS-256X4</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale for recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites specified herein, these algorithms <bcp14>MUST</bcp14> be used with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specification detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="I-D.irtf-cfrg-aegis-aead"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the QUIC packet headers undergo encryption in accordance with the specification outlined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated following the same procedure as in DTLS 1.3, utilizing:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation includes the cipher suites outlined in this document.</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM cipher suites of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed before encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Assigned IANA identifiers</name>
        <thead>
          <tr>
            <th align="center">Value</th>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">0x13,0x06</td>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0x13,0x07</td>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
      <t>Implementations <bcp14>MAY</bcp14> use the following identifiers reserved for local testing:</t>
      <table>
        <name>Additional identifiers</name>
        <thead>
          <tr>
            <th align="center">Test Value</th>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">0xff01</td>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff02</td>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff03</td>
            <td align="left">
              <tt>TLS_AEGIS_128X4_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff04</td>
            <td align="left">
              <tt>TLS_AEGIS_256X4_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to assign the final identifiers.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-18"/>
        </reference>
      </references>
    </references>
    <?line 192?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+Va23bbRpZ9x1fUKC9JlkhXFe5cubTGkmN1LNtjOZPOZGXZ
hbqQGIMAGwBlK4nzKzPfMvNjs6sKvEmE46Sfeg0fbBJAnTqXffY5p6DJZBL0
ZV/pGTk5u/jm8npSiE4r8rBcLXRLrtdlrztimpa8fHJN2DQ8JefDNyJqRf7t
u8uHJ4EoilbfQIRqheknStdlN+mrbiL0HN9ofBJI0et5097OSFmbJihX7Yz0
7brrOaU55UGgGlmLJfQYkxF062JZdl3Z1P3tCg9eXrx8FARdDz1eiaqpcelW
d0G3FG3/6u/rBpr7K6tyRn7sG3lKuqbtW206fLtd2i8/BcHbpn0zb5v1Cvq/
bEXdrfAQeSJurf1artuyvz0Jgjf6Fk+qWRBMiHTe6axz8MspiP+hLP5V/r+/
r0sZBDe6XutZQIjX+OR77FXWc/KN3e8E1+dlv1gXuPOfWpWd7NmDo+Zjf7Hu
F02L7ckE6wgx66ryDnsEpd+Qc7vC3WnauajLn0UPT+Gu6PrqllzWcuru6qUo
qxkxSv+FUjOtdX9f4rVYrnVFnqylOCbyslblTanWoiIPEYy2LNZ90+5L75yA
SWUFJH9ZLadLHQR10y4h4QYOCSwItr8IueLhzK0fsPi4VPAAuUawxHIAY+cA
9/Lq5TNy1vdCvulIU9+H5anD5Kl7+Lqc16Jygls5Iw/b21XfVM38lujnbVn3
5KyVC6hwSp6LFcLNKQ8f5Cz0qoh2rvsZWfT9qps9eKBXdsm0FLKdwh8PNg9P
V8q4BQoQnzkZ7men21J31lBvGiHnzy5nhNEpozR9kKfZJM/YJM8naZyEE/aK
cffcJtB+TVkDxH+dkudTciX6vuuaerjjQ/XXZlGT561e/+9/3X0ASs7IRVtK
e4280J0WMBf4nQCzRde3QvZB8HJRdgTJt15qOGTVNqumQ8rX+u0Ac9J5EvDE
AEn9QhPHFcSIZQlsNcYpjfWlTXNFdC2tqwEWIipkPUC+9CwCD+p563BkvzdO
2JEYbrjFKoTMbapu6hVfAhkVwPQJUNi3jVpLvw2ef+HECnvXq/fLL19fTs6n
ZdubiTTtfKASoYV6/57AbPEHLVCI57zGbWvKopwvJkCNA3ItNRGrVWWXY1E3
HTzkQdQ5M5EUmixEq96KVhNZiQ4adHjwevLNw6tTAgLoQQ7rsltYjij7TlcG
K8EV84WTYJqqat7am2Ajgmi71APNBQGbIsLwBpRb6iWIlrQaHNRqG1ZAyKuj
q3JZ1sKG08qr9WCLcAI7uYCISjtvrlotm+Vq3ftg9aKoNHiz1d266p1+NYEy
wMewn0Lu1wqWO0RJGAp8IQdglLTOXoGWS7muRAuHC3Uj6l7MdbP2wEC23Ngc
hwwxt+IFqazvSL1eFtgEEZJNXWvp3RvwKbl41+tawYJ1B0HEmraz1GjRr6Gs
CxPW7z9jrYCr7C4HXjDWZTYLWg132NvWAwiWIkBq01s54gYEZ31BmtWgSghV
6oWFANIDRoiqInu42GhUel1gvDamlKXdCI59+Py7Dim2slXHbmnh0K20LI11
W400XW9sHmA9VJ9tLgFZYElEp4Nsl1S6s+ECjrTaJRCMf7PNNVLYGECMc0Kz
w6cV2hoBOLvCCrQ6kOp3Hpx72TC9yx3lkJAfyx57iWUB16z7qqwHZEJruNMF
0EYGl0pLHrJp4afj9IF0/5cXjx5mUZS8f7/XpvjLOYtSe3lLLMNlSim4YJ9l
PrFF7cZSAZzunj/XpqxL99varF2y2GagIydX312/PDn1/5Onz9z3FxfY4cXF
uf1+/fjsyZPtl2B44vrxs++enO++7VY+fHZ1dfH03C/GVXJwKTi5OvvhxFtx
8uz5y8tnT8+enNhU7A9CYQkG3imGeCKXLamhmIPBJEgDP7DmXx8+/5//ZtHg
Cs5YDlcMXmRphB9vQYl+t6YGuPxP+Pw2ANmhnFgpFu5SrMpeVMgsYKVbNG9r
gthrePPzH61nfpqRLwq5YtFXwwVr8MHFjc8OLjqf3b9yb7F34pFLR7bZevPg
+h1PH+p79sPB743f9y5+8bWFLpmw7OuvAguhp0iAwx7aOhF12vKcxy8YbQPR
Kw26RPu2HPC1ub6BpUV+tVZWCnK9t0st14re8u5hniHrex/dXTqc2j7W7ZlP
2fv3iMqFkIuDhWSgnCH9zg6K4cWuGL5FvpIzNBSydLfORS/Ip2cXZ+ef7fLZ
pawtH62nH785sIEmfe5F2E0WolvcWbTu9O7+46uzh8M48i0S7hxkNbju0br2
9nz6+NvzR59NvdcOHWH97dRuwJGrBci0xgDSl17CcuvxA7Istw2lSyG0VXZ3
cKXV597gc0Abo1wolCp9Y3JHQySokKgwy8Z2jmR//DrafqDK/3oAKvLUMvbw
+ZXYKJCzrT9/JY+tg/cvgNhMqWxgRYWphjzRN2jzf4XYyciH3L31+xe21yH2
NVz2yhmG7jZ78grpy+PktdfWmmuvDur7e2RnD+6RAuWaHHzui/0b38rdE/s3
/o+KjY6Kjf4RsVhihcaMvyY7J2wFObG4uSfW3vsYsd4JTvCe2D0n/Emx0VGx
0R8U+8vMT3Zfnjz3A4Y6gPtBXpy89+ncbtr5LZ0skVpq07UNezsSMRs+sE/e
iLZEb4nEXq6q5tb3klBsAsVc5S7vdCMo7lZqZ1veDsmxoU8MpY4s73UrQ7dG
CrSENu5OsiWFzS57s4Tvnedoix/ZPhu1sr9HVRvuVa5olr7Eggn3tnQ1E+Xc
8ZFjSLHb+d5uUPr7DYu60tENBcfLvdednXqlfp8t9wjSlfqhZxutN9GU2Ypj
G+6lQDNLEChImmvllqtmqDebYiFuq0bsF429rXdeGtksnnIXr092TP3Cy33q
Z4hdHQuCy3pv2tyjWzhpUKZzw4DcTCDdMH0Ns9zQoXv/KN1jKtjXzLab+27g
U48lC4JR5PswLEX3xmJ0rmvduiKL8A2g91B87c9FXjvMvf4P3TbPhXq9zQI7
p5pdVD40A1skuROtHZoAH1Lpet4vcPl1V79Cyrz20dqXOmqkXeWt6vW7/kc6
nbLkp9ezIdParicMHHFrce8B6eOwW2IF1A0c/wpqDAu93e7qoByCVrqBzPIu
nLphHozRejXQxJDfGKOhoqMcFMhtUtnMJpE3euNzP/G6VnkTbrjnt99+C9wT
Xw4nUp9G2Snxrjklg/8/vWf0Kdma8dlnTgig6fqGx/A+VH++hbnDoz+32s5+
nZ672X3jJt9xCPkGDeDCCbDphP/mzT6AbUcuLYDdmcS2mToE7P28xSDE9lMp
+vNw3Z1SbKfK7ThnHVvup966L6vyZzz8QRguVh+C4X3V/zgI//nw533yR/H3
bKU3hdW2gx3aQf8bo8czy2Q3pW1aK+DMmrA9rjq7uLa4ginD+A2b92hazC29
98TKm1jGrtFYCn9Me3qn3HkHDccf3rvXpG2A5V0h341vtuqt2tL6rPxZq+F4
adsObM4ChvnofnHdh/rBkDw9MNgelmGkHYprZ8/99bj1p6REc+HO1rzzNgrv
NB3PG3dItDn2u3vLOE1u0PbAP93w+gGYQ6PuDycuDzYGIES/Ruw+d26pERCL
Iz/7o+hiK8wvGn0RvLh2Y45riOx8RJA7088tCu3Q6LZ2Z3N3TZN4tLBdmI2Q
6MmPP326ORP3ry+miMWDD7/A+Mzpvnmdcg95Z64xW6/cILTpdYYztJ0BG5aD
AfwLNGFfRdkXD+z/Q8nu9ujOsg5kWrho19gNxx57rcwOCh9qYJKhcsPzZ0/P
7mnuLqIJhQpzO3q7w8KDo1o/cKFxcUd22xOrg0HuhVvc3roRj5B/F9Vau4b6
3Cnumf2gpXYUOnn2Lb692OQCtrYd/GyYwGZk9/3+WDc78szMrafvWHhK39GE
jA9wVkvyg9fEfZ7uJojN+pSMzz7j63ejwlk3nLY7H++50U4Il3dAenX2gzs9
GPe9P3sZjnqrRoIAkXG9Lz2/kpf4Pjh+3O0f5fcPOf7DnifwnTGUuY0+MOSO
+36QwO9KuDsh/q6E8JgO0R/RITqmQ/QROuwhYHd0cjf8DhKde8mh3YmXPU1x
gNnMdIeLhtdHBQqSzeWLd8ICCAn8ySfbI5/H9v3FQryxr5dw2Y1QR/HvSzIe
RbbbIjzbQ4gsCl6kXAleyJTqIouN0DQWmUkKmfM8IEc/iQk1N3mShzrOUy7S
gotQiYRmOtYQFgQLDVS/svPu/nZFmsZ5pFWRiUKFqFGRKlIToz+MsyTXbGS7
PDHGpIqaghUaChtTCCGzmBYmSnOVBYGrBa9QgVr7EnTzCUOhqGAyoamWNCxo
rhOp8iwPk4xKzUe2Y1QoE1IqBDM8SahmBeeaUcNSanIuYN3G9wdbsjhhkYh0
IhIZ53g80XmaUCU5pZSLMeu4MDxVCVpOkYYySUQepanSUZHkNAlzEwSysu9f
7pqX6IRCscwolcqsoJmQMdUxZZkRaa7lyHahyaTiWlMehlnCGCuoSgWnPNWx
ZEW23W5npAMNj9KoUFJlOpOZMoZlwiBkCFsUATriyLryBspG3OgoKxTNEilj
pYSJwkJHMaWKytQAK/5t2t39NNTSgkWMRiLLpVGGx6FmhmoaUl7QI+vcfgAV
ZxmLKM/CJOV5HgOVjFORygJ44ENveT9ldpT/oYxJeaQiBmFSKJlEYayikMKs
JI0TGDkW5FjzRCkaR5FgeQpgckkzrDRI1AL6jmUMQyqqlGN1CBzyjKUqTbJC
4Htk7RsLMpU0he9kJIpIyjDioUoBSBlKSIyKsURjKpIRy6MoDlWBDDNSZGmY
FZHOtQjHIJVmYVEkKs9NnOYGUOYmznOZ5JLJ1Kb1SH4ahXShskh4zIsQDlF5
kWUqLpTO4jAcYx8aSiFiJpgqhN1AapZpLWiYxArxoGNaMktWYLo85izKOGOU
6oxxkxZpnvFsZFmUZ3AcIJ5KlSA/TRolEUIojeCcRskYG8SxRqYhyWLQa5oV
hikhooQncK7MsnBkuyKLeKFlnGZpkhudC52YwiQKycmzPB5bRrlGbMHmcCQI
BImjaJQKsAIGgSTSo1SHgNlQ54WhGYOqEjRZSJVGQuZpOsY9KWiHgbCKKOKJ
iZSQIaowy6hdHIdjsBRUxfiwqIhCACoywKYs4pzRLIwyOrYsAjJ4XuSItZJg
/0yHIjQFfIoI5KPLVA5SjfNYa50aA7YyCFusI3hTMJDnGNOBSUM4PyxYlIcp
AxmnUDmPOEdiIJfGkoeyXOk8Qu3MOZdcxgw5gRykBUhPR2MEqangLI6NVtYV
XPA8zsCX0oD9w8iMwTkC/RSxjKhOUGxiGMSR8rLIUpMVmssxXg2TRDNdoJZy
kHAmRJKzEHSmTRxxkNjIdhIEGmUxjyXSU7JEACNI8SSLE43yc4zGnXWZAdZR
VwqUCB1mOcqpQdFnKToMBlof2w7Nh4qTGJ0Bqj8zUYH+AnDLM5EaicZkYPEj
77nunVeRK9G9+bgu6Q7ZDx+Ub0Y5yk5EY4pmgmZAnQDWJWqYprZC3z3OcFIY
RXnlLAQRAwssRVnKQVsFk0wxlDL7V2bDmcfBrpu3M4E7SLmvEHyoNJMZY6PF
bL8J/6cyzeZ0jl7j4+v0nzTsOO5+367j/kD/xDjnIY9QyxIOfuQ2lQvwAJot
PuqPzUncqD+0bRU0z9MP+WM7Lf0/8EiK0h9LA7U3p4Rn8k3dvK208kfQGMn8
SxCtvjwxouq0ncG+1+Rts66U/8Mi98c49g9Rj/1Fov8Tr/V87gdusmjeDmeq
3cKJ2LzaGg5IZFNb4+2ZlGOjDRNNg/8D2mp0/7EsAAA=

-->

</rfc>
