The AES128 CTR Mode of Operation and Its Use With IPsec
draft-moskowitz-aes128-ctr-00
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | Jesse Walker , Robert Moskowitz | ||
Last updated | 2001-09-17 | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-moskowitz-aes128-ctr-00.txt
Abstract
This document describes the use of the AES Cipher Algorithm with 128 bit key in Counter (CTR) Mode, with an implicit counter, as a confidentiality mechanism within the context of the IPsec Encapsulating Security Payload [ESP]. CTR is a parallelizable block-cipher mode of operation. It uses the underlying block cipher as a stream cipher. Accordingly, great care must be exercised to utilize it appropriately within IPsec.
Authors
Jesse Walker
(jwalker@shiva.com)
Robert Moskowitz
(rgm@icsa.net)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)