Skip to main content

TLS/DTLS Omit AEAD Explicit Nonce from Record Extension
draft-jay-tls-omit-aead-explicit-nonce-extension-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Jayaraghavendran K, Raja Ashok V K
Last updated 2016-04-04 (Latest revision 2015-09-29)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

With emergence of Internet of Things(IoT), DTLS is being widely considered as a protocol of choice for communication security in IoT applications. Further, AES_CCM has emerged as the cipher of choice in constrained environments. Constrained Application Protocol (CoAP), which is the application layer protocol for resource constrained environments, mandates DTLS as underlying security protocol and proposes AES_CCM based ciphers to be used with different key exchange methods. AEAD ciphers requires an explicit nonce of 8 bytes must be carried in each transmitted record.This document defines a TLS (and DTLS) extension, which will allow clients and servers to omit the explicit nonce sent in TLS/DTLS records. This document can be considered as an extended version of "Transport Layer Security (TLS) Extensions : Extension Definitions". The extension defined in this document apply equally to both DTLS and TLS protocols.

Authors

Jayaraghavendran K
Raja Ashok V K

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)