Skip to main content

AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
draft-irtf-cfrg-gcmsiv-08

The information below is for an old version of the document.
Document Type Expired Internet-Draft (cfrg RG)
Authors Shay Gueron , Adam Langley , Yehuda Lindell
Last updated 2018-08-14 (Latest revision 2018-02-10)
Replaces draft-gueron-gcmsiv
Stream Internet Research Task Force (IRTF)
Formats
Expired & archived
plain text xml htmlized pdfized bibtex
IETF conflict review conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv, conflict-review-irtf-cfrg-gcmsiv
Stream IRTF state Waiting for Document Shepherd
Consensus boilerplate Yes
Document shepherd (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-irtf-cfrg-gcmsiv-08.txt

Abstract

This memo specifies two authenticated encryption algorithms that are nonce misuse-resistant - that is that they do not fail catastrophically if a nonce is repeated.

Authors

Shay Gueron
Adam Langley
Yehuda Lindell

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)