Skip to main content

Properties of AEAD algorithms
draft-irtf-cfrg-aead-properties-01

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
Author Andrey Bozhko
Last updated 2023-09-11 (Latest revision 2023-03-10)
Replaces draft-bozhko-cfrg-aead-properties
RFC stream Internet Research Task Force (IRTF)
Formats
Additional resources Mailing list discussion
Stream IRTF state Active RG Document
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Authenticated Encryption with Associated Data (AEAD) algorithms provide confidentiality and integrity of data. The extensive use of AEAD algorithms in various high-level applications has caused the need for AEAD algorithms with additional properties and motivated research in the area. This document gives definitions for the most common of those properties intending to improve consistency in the field.

Authors

Andrey Bozhko

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)