Properties of AEAD algorithms
draft-irtf-cfrg-aead-properties-01
Document | Type |
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
|
|
---|---|---|---|
Author | Andrey Bozhko | ||
Last updated | 2023-09-11 (Latest revision 2023-03-10) | ||
Replaces | draft-bozhko-cfrg-aead-properties | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | IRTF state | Active RG Document | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Authenticated Encryption with Associated Data (AEAD) algorithms provide confidentiality and integrity of data. The extensive use of AEAD algorithms in various high-level applications has caused the need for AEAD algorithms with additional properties and motivated research in the area. This document gives definitions for the most common of those properties intending to improve consistency in the field.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)