Skip to main content

Implicit IV for Counter-based Ciphers in IPsec

Document Type Replaced Internet-Draft (ipsecme WG)
Expired & archived
Authors Daniel Migault , Tobias Guggemos , Yoav Nir
Last updated 2017-11-11 (Latest revision 2017-06-21)
Replaced by RFC 8750
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Additional resources Mailing list discussion
Stream WG state In WG Last Call
Revised I-D Needed - Issue raised by WGLC
Document shepherd David Waltermire
IESG IESG state Replaced by draft-ietf-ipsecme-implicit-iv
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to David Waltermire <>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


IPsec ESP sends an initialization vector (IV) or nonce in each packet, adding 8 or 16 octets. Some algorithms such as AES-GCM, AES- CCM, AES-CTR and ChaCha20-Poly1305 require a unique nonce but do not require an unpredictable nonce. When using such algorithms the packet counter value can be used to generate a nonce, saving 8 octets per packet. This document describes how to do this.


Daniel Migault
Tobias Guggemos
Yoav Nir

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)