<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-02">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3 and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-02"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2024" month="June" day="02"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 54?>

<t>This document proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction-and-rationale">
      <name>Introduction and rationale</name>
      <t>AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS caters to the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the necessity for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic proves particularly advantageous for servers managing a substantial volume of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, mitigating the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is very efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers seamlessly integrate into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite denotes the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the designated hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>To accommodate AEGIS-based encryption algorithms, this document introduces additional cipher suites to those specified in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale behind recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites referenced herein, these algorithms <bcp14>MUST</bcp14> be utilized with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specifications detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="I-D.irtf-cfrg-aegis-aead"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the chosen AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the QUIC packet headers undergo encryption in accordance with the specifications outlined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated following the same procedure as in DTLS 1.3, utilizing:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation encompasses the cipher suites outlined in this document</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM ones of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aead"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed prior to encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Requested IANA identifiers</name>
        <thead>
          <tr>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="20" month="January" year="2024"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-10"/>
        </reference>
      </references>
    </references>
    <?line 180?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
