%% You should probably cite rfc8750 instead of this I-D. @techreport{ietf-ipsecme-implicit-iv-04, number = {draft-ietf-ipsecme-implicit-iv-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ipsecme-implicit-iv/04/}, author = {Daniel Migault and Tobias Guggemos and Yoav Nir}, title = {{Implicit IV for Counter-based Ciphers in Encapsulating Security Payload (ESP)}}, pagetotal = 7, year = , month = , day = , abstract = {Encapsulating Security Payload (ESP) sends an initialization vector (IV) or nonce in each packet. The size of IV depends on the applied transform, being usually 8 or 16 octets for the transforms defined by the time this document is written. Some algorithms such as AES-GCM, AES-CCM, AES-CTR and ChaCha20-Poly1305 require a unique nonce but do not require an unpredictable nonce. When using such algorithms the packet counter value can be used to generate a nonce. This avoids sending the nonce itself, and saves in the case of AES-GCM, AES-CCM, AES-CTR and ChaCha20-Poly1305 8 octets per packet. This document describes how to do this.}, }