<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" consensus="true" docName="draft-irtf-cfrg-argon2-13" indexInclude="true" ipr="trust200902" number="9106" prepTime="2021-09-07T23:19:46" scripts="Common,Latin" sortRefs="true" submissionType="IRTF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-irtf-cfrg-argon2-13" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9106" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Argon2">Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications</title>
    <seriesInfo name="RFC" value="9106" stream="IRTF"/>
    <author initials="A." surname="Biryukov" fullname="Alex Biryukov">
      <organization showOnFrontPage="true">University of Luxembourg</organization>
      <address>
        <email>alex.biryukov@uni.lu</email>
      </address>
    </author>
    <author initials="D." surname="Dinu" fullname="Daniel Dinu">
      <organization showOnFrontPage="true">University of Luxembourg</organization>
      <address>
        <email>daniel.dinu@intel.com</email>
      </address>
    </author>
    <author initials="D." surname="Khovratovich" fullname="Dmitry Khovratovich">
      <organization showOnFrontPage="true">ABDK Consulting</organization>
      <address>
        <email>khovratovich@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Josefsson" fullname="Simon Josefsson">
      <organization showOnFrontPage="true">SJD AB</organization>
      <address>
        <email>simon@josefsson.org</email>
        <uri>http://josefsson.org/</uri>
      </address>
    </author>
    <date month="09" year="2021"/>
    <workgroup>Crypto Forum</workgroup>
    <keyword>Argon2d</keyword>
    <keyword>Argon2i</keyword>
    <keyword>Argon2id</keyword>
    <keyword>KDF</keyword>
    <keyword>Cryptocurrency</keyword>
    <keyword>Time-Space Trade-Off Attacks</keyword>
    <keyword>Security</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document describes the Argon2 memory-hard function for
      password hashing and proof-of-work applications.  We provide an
      implementer-oriented description with
      test vectors.  The purpose is to simplify adoption of Argon2 for
      Internet protocols.  This document is a product of the Crypto Forum Research Group (CFRG) 
       in the IRTF.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Research Task Force
            (IRTF).  The IRTF publishes the results of Internet-related
            research and development activities.  These results might not be
            suitable for deployment.  This RFC represents the consensus of the Crypto Forum
            Research Group of the Internet Research Task Force (IRTF).
            Documents approved for publication by the IRSG are not
            candidates for any level of Internet Standard; see Section 2 of RFC
            7841.   
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9106" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-notation-and-conventions">Notation and Conventions</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2-algorithm">Argon2 Algorithm</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2-inputs-and-outputs">Argon2 Inputs and Outputs</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2-operation">Argon2 Operation</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-variable-length-hash-functi">Variable-Length Hash Function H'</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-indexing">Indexing</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.4.2">
                  <li pn="section-toc.1-1.3.2.4.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.4.2.1.1"><xref derivedContent="3.4.1" format="counter" sectionFormat="of" target="section-3.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-computing-the-32-bit-values">Computing the 32-Bit Values J_1 and J_2</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.4.2.2">
                    <t indent="0" pn="section-toc.1-1.3.2.4.2.2.1"><xref derivedContent="3.4.2" format="counter" sectionFormat="of" target="section-3.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-mapping-j_1-and-j_2-to-refe">Mapping J_1 and J_2 to Reference Block Index [l][z]</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.3.2.5">
                <t indent="0" pn="section-toc.1-1.3.2.5.1"><xref derivedContent="3.5" format="counter" sectionFormat="of" target="section-3.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-compression-function-g">Compression Function G</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.6">
                <t indent="0" pn="section-toc.1-1.3.2.6.1"><xref derivedContent="3.6" format="counter" sectionFormat="of" target="section-3.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-permutation-p">Permutation P</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-parameter-choice">Parameter Choice</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-test-vectors">Test Vectors</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2d-test-vectors">Argon2d Test Vectors</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2i-test-vectors">Argon2i Test Vectors</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-argon2id-test-vectors">Argon2id Test Vectors</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-as-a-hash-function">Security as a Hash Function and KDF</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-against-time-space">Security against Time-Space Trade-off Attacks</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.3">
                <t indent="0" pn="section-toc.1-1.7.2.3.1"><xref derivedContent="7.3" format="counter" sectionFormat="of" target="section-7.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-for-time-bounded-d">Security for Time-Bounded Defenders</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.4">
                <t indent="0" pn="section-toc.1-1.7.2.4.1"><xref derivedContent="7.4" format="counter" sectionFormat="of" target="section-7.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-recommendations">Recommendations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document describes the <xref target="ARGON2ESP" format="default" sectionFormat="of" derivedContent="ARGON2ESP">Argon2</xref> memory-hard function for
      password hashing and proof-of-work applications.  We provide an
      implementer-oriented description with
      test vectors.  The purpose is to simplify adoption of Argon2 for
      Internet protocols. This document corresponds to version 1.3 of the Argon2 hash
      function.</t>
      <t indent="0" pn="section-1-2">Argon2 is a <xref target="HARD" format="default" sectionFormat="of" derivedContent="HARD">memory-hard function</xref>.  It is a streamlined design.
      It aims at the highest memory-filling rate and effective use of
      multiple computing units, while still providing defense against
      trade-off attacks.  Argon2 is optimized for the x86 architecture
      and exploits the cache and memory organization of the recent
      Intel and AMD processors.  Argon2 has one primary variant, Argon2id, and two supplementary variants, Argon2d and
      Argon2i.  Argon2d uses data-dependent memory
      access, which makes it suitable for cryptocurrencies and
      proof-of-work applications with no threats from side-channel
      timing attacks.  Argon2i uses data-independent memory access,
      which is preferred for password hashing and password-based key
      derivation. Argon2id works as Argon2i for the first half of the first pass over the
memory and as Argon2d for the rest, thus providing both side-channel attack protection and 
		brute-force cost savings due to time-memory trade-offs. Argon2i makes more passes over the
      memory to protect from <xref target="AB15" format="default" sectionFormat="of" derivedContent="AB15">trade-off attacks</xref>.</t>
      <t indent="0" pn="section-1-3">Argon2id <bcp14>MUST</bcp14> be supported by any implementation of this document, whereas Argon2d and Argon2i <bcp14>MAY</bcp14> be supported.
      </t>
      <t indent="0" pn="section-1-4"> Argon2 is also a mode of operation over a fixed-input-length compression function G and
	  a variable-input-length hash function H. Even though Argon2 can be potentially used with an arbitrary function H,
	  as long as it provides outputs up to 64 bytes, the <xref target="RFC7693" format="default" sectionFormat="of" derivedContent="BLAKE2">BLAKE2b function</xref> is used in this document.</t>
      <t indent="0" pn="section-1-5">For further background and discussion, see the <xref target="ARGON2" format="default" sectionFormat="of" derivedContent="ARGON2">Argon2 paper</xref>.</t>
      <t indent="0" pn="section-1-6"> This document represents the consensus of the Crypto Forum Research
    Group (CFRG).</t>
      <section anchor="reqs" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-notation-and-conventions">Notation and Conventions</name>
      <dl indent="15" newline="false" spacing="normal" pn="section-2-1">
        <dt pn="section-2-1.1">x^y</dt>
        <dd pn="section-2-1.2">integer x multiplied by itself integer y times</dd>
        <dt pn="section-2-1.3">a*b</dt>
        <dd pn="section-2-1.4">multiplication of integer a and integer b</dd>
        <dt pn="section-2-1.5">c-d</dt>
        <dd pn="section-2-1.6">subtraction of integer d from integer c</dd>
        <dt pn="section-2-1.7">E_f</dt>
        <dd pn="section-2-1.8">variable E with subscript index f</dd>
        <dt pn="section-2-1.9">g / h</dt>
        <dd pn="section-2-1.10">integer g divided by integer h. The result is a rational number.</dd>
        <dt pn="section-2-1.11">I(j)</dt>
        <dd pn="section-2-1.12">function I evaluated at j</dd>
        <dt pn="section-2-1.13">K || L</dt>
        <dd pn="section-2-1.14">string K concatenated with string L</dd>
        <dt pn="section-2-1.15">a XOR b</dt>
        <dd pn="section-2-1.16">bitwise exclusive-or between bitstrings a and b</dd>
        <dt pn="section-2-1.17">a mod b</dt>
        <dd pn="section-2-1.18">remainder of integer a modulo integer b, always in range [0, b-1]</dd>
        <dt pn="section-2-1.19">a &gt;&gt;&gt; n</dt>
        <dd pn="section-2-1.20">rotation of 64-bit string a to the right by n bits</dd>
        <dt pn="section-2-1.21">trunc(a)</dt>
        <dd pn="section-2-1.22">the 64-bit value, truncated to the 32 least significant 
      bits</dd>
        <dt pn="section-2-1.23">floor(a)</dt>
        <dd pn="section-2-1.24">the largest integer not bigger than a</dd>
        <dt pn="section-2-1.25">ceil(a)</dt>
        <dd pn="section-2-1.26">the smallest integer not smaller than a</dd>
        <dt pn="section-2-1.27">extract(a, i)</dt>
        <dd pn="section-2-1.28">the i-th set of 32 bits from bitstring a, starting from 0-th</dd>
        <dt pn="section-2-1.29">|A|</dt>
        <dd pn="section-2-1.30">the number of elements in set A</dd>
        <dt pn="section-2-1.31">LE32(a)</dt>
        <dd pn="section-2-1.32">32-bit integer a converted to a byte string in little endian (for example, 123456 (decimal) is  40 E2 01 00)</dd>
        <dt pn="section-2-1.33">LE64(a)</dt>
        <dd pn="section-2-1.34">64-bit integer a converted to a byte string in little endian (for example, 123456 (decimal) is  40 E2 01 00 00 00 00 00)</dd>
        <dt pn="section-2-1.35">int32(s)</dt>
        <dd pn="section-2-1.36">32-bit string s is converted to a non-negative integer in little endian</dd>
        <dt pn="section-2-1.37">int64(s)</dt>
        <dd pn="section-2-1.38">64-bit string s is converted to a non-negative integer in little endian</dd>
        <dt pn="section-2-1.39">length(P)</dt>
        <dd pn="section-2-1.40">the byte length of string P expressed as 32-bit integer</dd>
        <dt pn="section-2-1.41">ZERO(P)</dt>
        <dd pn="section-2-1.42">the P-byte zero string</dd>
      </dl>
    </section>
    <section anchor="argon2-algorithm" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-argon2-algorithm">Argon2 Algorithm</name>
      <section anchor="argon2-inouts" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-argon2-inputs-and-outputs">Argon2 Inputs and Outputs</name>
        <t indent="0" pn="section-3.1-1">Argon2 has the following input parameters:

        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.1-2">
          <li pn="section-3.1-2.1">Message string P, which is a password for password hashing 
	  applications. It <bcp14>MUST</bcp14> have a length not greater than 2^(32)-1 bytes.</li>
          <li pn="section-3.1-2.2">Nonce S, which is a salt for password hashing applications. It <bcp14>MUST</bcp14> have a length not greater than 2^(32)-1 bytes.  16 bytes is <bcp14>RECOMMENDED</bcp14> for
	  password hashing.  The salt <bcp14>SHOULD</bcp14> be unique for each password.</li>
          <li pn="section-3.1-2.3">Degree of parallelism p determines how many independent
	  (but synchronizing) computational chains (lanes) can be
	  run. It <bcp14>MUST</bcp14> be an integer value from 1 to 2^(24)-1.</li>
          <li pn="section-3.1-2.4">Tag length T <bcp14>MUST</bcp14> be an integer number of bytes from 4 to
	  2^(32)-1.</li>
          <li pn="section-3.1-2.5">Memory size m <bcp14>MUST</bcp14> be an integer number of kibibytes from
	  8*p to 2^(32)-1.  The actual number of blocks is m', which is
	  m rounded down to the nearest multiple of 4*p.</li>
          <li pn="section-3.1-2.6">Number of passes t (used to tune the running time
	  independently of the memory size) <bcp14>MUST</bcp14> be an integer number
	  from 1 to 2^(32)-1.</li>
          <li pn="section-3.1-2.7">Version number v <bcp14>MUST</bcp14> be one byte 0x13.</li>
          <li pn="section-3.1-2.8">Secret value K is <bcp14>OPTIONAL</bcp14>. If used, it <bcp14>MUST</bcp14> have a length  not greater than
	  2^(32)-1 bytes.</li>
          <li pn="section-3.1-2.9">Associated data X is <bcp14>OPTIONAL</bcp14>. If used, it <bcp14>MUST</bcp14> have a length not greater than 2^(32)-1
	  bytes.</li>
          <li pn="section-3.1-2.10">Type y <bcp14>MUST</bcp14> be 0 for Argon2d, 1 for Argon2i, or 2 for Argon2id.</li>
        </ul>
        <t indent="0" pn="section-3.1-3">The Argon2 output, or "tag", is a string T bytes long.</t>
      </section>
      <section anchor="argon2-operation" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-argon2-operation">Argon2 Operation</name>
        <t indent="0" pn="section-3.2-1">Argon2 uses an internal compression function G with two
	1024-byte inputs, a 1024-byte output, and an internal hash
	function H^x(), with x being its output length in bytes.  Here, H^x() applied to string A is the BLAKE2b (<xref target="RFC7693" section="3.3" sectionFormat="comma" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7693#section-3.3" derivedContent="BLAKE2"/>) function, which takes (d,ll,kk=0,nn=x) as parameters, 
  where d is A padded to a multiple of 128 bytes
	and ll is the length of d in bytes. The compression function G is based on its internal
	permutation.  A variable-length hash function H' built upon H
	is also used.  G is described in  <xref target="G-function" format="default" sectionFormat="of" derivedContent="Section 3.5"/>, and H' is described in 
	 <xref target="H-function" format="default" sectionFormat="of" derivedContent="Section 3.3"/>.</t>
        <t indent="0" pn="section-3.2-2">The Argon2 operation is as follows.

        </t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-3.2-3"><li pn="section-3.2-3.1" derivedCounter="1.">
            <t indent="0" pn="section-3.2-3.1.1">Establish H_0 as the 64-byte value as shown 
	  below.  If  K, X, or S has zero length, it is just absent, but its length field remains.

            </t>
            <figure align="left" suppress-title="false" pn="figure-1">
              <name slugifiedName="name-h_0-generation">H_0 Generation</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.1.2.1">
H_0 = H^(64)(LE32(p) || LE32(T) || LE32(m) || LE32(t) || 
        LE32(v) || LE32(y) || LE32(length(P)) || P ||
	LE32(length(S)) || S ||  LE32(length(K)) || K ||
	LE32(length(X)) || X)
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.2" derivedCounter="2.">
            <t indent="0" pn="section-3.2-3.2.1">Allocate the memory as m' 1024-byte blocks, where m' is
	  derived as:

            </t>
            <figure align="left" suppress-title="false" pn="figure-2">
              <name slugifiedName="name-memory-allocation">Memory Allocation</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.2.2.1">
m' = 4 * p * floor (m / 4p)
</artwork>
            </figure>
            <t indent="0" pn="section-3.2-3.2.3">

	  For p lanes, the memory is
	  organized in a matrix B[i][j] of blocks with p rows (lanes)
	  and q = m' / p columns.</t>
          </li>
          <li pn="section-3.2-3.3" derivedCounter="3.">
            <t indent="0" pn="section-3.2-3.3.1">Compute B[i][0] for all i ranging from (and including) 0
	  to (not including) p.

            </t>
            <figure align="left" suppress-title="false" pn="figure-3">
              <name slugifiedName="name-lane-starting-blocks">Lane Starting Blocks</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.3.2.1">
B[i][0] = H'^(1024)(H_0 || LE32(0) || LE32(i))
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.4" derivedCounter="4.">
            <t indent="0" pn="section-3.2-3.4.1">Compute B[i][1] for all i ranging from (and including) 0
	  to (not including) p.

            </t>
            <figure align="left" suppress-title="false" pn="figure-4">
              <name slugifiedName="name-second-lane-blocks">Second Lane Blocks</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.4.2.1">
B[i][1] = H'^(1024)(H_0 || LE32(1) || LE32(i))
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.5" derivedCounter="5.">
            <t anchor="step5" indent="0" pn="section-3.2-3.5.1">Compute B[i][j] for all i ranging from (and including) 0
	  to (not including) p and for all j ranging from (and
	  including) 2 to (not including) q.  The computation <bcp14>MUST</bcp14> proceed slicewise  (<xref target="indexing" format="default" sectionFormat="of" derivedContent="Section 3.4"/>): first, blocks from slice 0 are computed 
    for all lanes (in an arbitrary order of lanes), then blocks from slice 1 are computed, etc. The block indices l
	  and z are determined for each i, j differently for Argon2d, Argon2i, and Argon2id.

            </t>
            <figure align="left" suppress-title="false" pn="figure-5">
              <name slugifiedName="name-further-block-generation">Further Block Generation</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.5.2.1">
B[i][j] = G(B[i][j-1], B[l][z])
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.6" derivedCounter="6.">
            <t indent="0" pn="section-3.2-3.6.1">If the number of passes t is larger than 1, we repeat
	  <xref target="step5" format="none" sectionFormat="of" derivedContent="">step 5</xref>. We compute B[i][0] and B[i][j] for all i raging from (and including) 0 to (not including) p and for all j ranging from 
   (and including) 1 to (not including) q. However, blocks are computed differently as the old value is XORed with the new one:
            </t>
            <figure align="left" suppress-title="false" pn="figure-6">
              <name slugifiedName="name-further-passes">Further Passes</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.6.2.1">
B[i][0] = G(B[i][q-1], B[l][z]) XOR B[i][0];
B[i][j] = G(B[i][j-1], B[l][z]) XOR B[i][j].
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.7" derivedCounter="7.">
            <t indent="0" pn="section-3.2-3.7.1">After t steps have been iterated, the final block C is computed as 
	  the XOR of the last column:

            </t>
            <figure align="left" suppress-title="false" pn="figure-7">
              <name slugifiedName="name-final-block">Final Block</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.2-3.7.2.1">
C = B[0][q-1] XOR B[1][q-1] XOR ... XOR B[p-1][q-1]
</artwork>
            </figure>
          </li>
          <li pn="section-3.2-3.8" derivedCounter="8.">The output tag is computed as H'^T(C).</li>
        </ol>
      </section>
      <section anchor="H-function" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-variable-length-hash-functi">Variable-Length Hash Function H'</name>
        <t indent="0" pn="section-3.3-1">Let V_i be a 64-byte block and W_i be its first 32 bytes.  Then we define function H' as follows:
        </t>
        <figure align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-function-h-for-tag-and-init">Function H' for Tag and Initial Block Computations</name>
          <sourcecode type="pseudocode" markers="false" pn="section-3.3-2.1">
        if T &lt;= 64
            H'^T(A) = H^T(LE32(T)||A)
        else
            r = ceil(T/32)-2
            V_1 = H^(64)(LE32(T)||A)
            V_2 = H^(64)(V_1)
            ...
            V_r = H^(64)(V_{r-1})
            V_{r+1} = H^(T-32*r)(V_{r})
            H'^T(X) = W_1 || W_2 || ... || W_r || V_{r+1}
</sourcecode>
        </figure>
      </section>
      <section anchor="indexing" numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-indexing">Indexing</name>
        <t indent="0" pn="section-3.4-1">To enable parallel block computation, we further partition the 
     memory matrix into SL = 4 vertical slices.  The intersection of a 
     slice and a lane is called a segment, which has a length of q/SL.  Segments of the 
     same slice can be computed in parallel and do not reference blocks 
     from each other. All other blocks can be referenced.</t>
        <figure align="left" suppress-title="false" pn="figure-9">
          <name slugifiedName="name-single-pass-argon2-with-p-l">Single-Pass Argon2 with p Lanes and 4 Slices</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.4-2.1">
    slice 0    slice 1    slice 2    slice 3
    ___/\___   ___/\___   ___/\___   ___/\___ 
   /        \ /        \ /        \ /        \
  +----------+----------+----------+----------+
  |          |          |          |          | &gt; lane 0
  +----------+----------+----------+----------+
  |          |          |          |          | &gt; lane 1
  +----------+----------+----------+----------+
  |          |          |          |          | &gt; lane 2
  +----------+----------+----------+----------+
  |         ...        ...        ...         | ...
  +----------+----------+----------+----------+
  |          |          |          |          | &gt; lane p - 1
  +----------+----------+----------+----------+
        </artwork>
        </figure>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4.1">
          <name slugifiedName="name-computing-the-32-bit-values">Computing the 32-Bit Values J_1 and J_2</name>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3.4.1.1">
            <name slugifiedName="name-argon2d">Argon2d</name>
            <t indent="0" pn="section-3.4.1.1-1">J_1 is given by the first 32 bits of block B[i][j-1], 
            while J_2 is given by the next 32 bits of block B[i][j-1]:
                
            </t>
            <figure align="left" suppress-title="false" pn="figure-10">
              <name slugifiedName="name-deriving-j1j2-in-argon2d">Deriving J1,J2 in Argon2d</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.4.1.1-2.1">
J_1 = int32(extract(B[i][j-1], 0))
J_2 = int32(extract(B[i][j-1], 1))
</artwork>
            </figure>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3.4.1.2">
            <name slugifiedName="name-argon2i">Argon2i</name>
            <t indent="0" pn="section-3.4.1.2-1">For each segment, we do the following. First, we compute the value Z as:
                
            </t>
            <figure align="left" suppress-title="false" pn="figure-11">
              <name slugifiedName="name-input-to-compute-j1j2-in-ar">Input to Compute J1,J2 in Argon2i</name>
              <artwork name="" type="" align="left" alt="" pn="section-3.4.1.2-2.1">
Z= ( LE64(r) || LE64(l) || LE64(sl) || LE64(m') || 
     LE64(t) || LE64(y) )
</artwork>
            </figure>
            <t indent="0" pn="section-3.4.1.2-3">where</t>
            <dl indent="5" spacing="compact" newline="false" pn="section-3.4.1.2-4">
              <dt pn="section-3.4.1.2-4.1">r:</dt>
              <dd pn="section-3.4.1.2-4.2">the pass number</dd>
              <dt pn="section-3.4.1.2-4.3">l:</dt>
              <dd pn="section-3.4.1.2-4.4">the lane number</dd>
              <dt pn="section-3.4.1.2-4.5">sl:</dt>
              <dd pn="section-3.4.1.2-4.6">the slice number</dd>
              <dt pn="section-3.4.1.2-4.7">m':</dt>
              <dd pn="section-3.4.1.2-4.8">the total number of memory blocks</dd>
              <dt pn="section-3.4.1.2-4.9">t:</dt>
              <dd pn="section-3.4.1.2-4.10">the total number of passes</dd>
              <dt pn="section-3.4.1.2-4.11">y:</dt>
              <dd pn="section-3.4.1.2-4.12">the Argon2 type (0 for Argon2d, 
			1 for Argon2i, 2 for Argon2id)</dd>
            </dl>
            <t indent="0" pn="section-3.4.1.2-5">
Then we compute:</t>
            <artwork name="" type="" align="left" alt="" pn="section-3.4.1.2-6">
q/(128*SL) 1024-byte values  
G(ZERO(1024),G(ZERO(1024), 
Z || LE64(1) || ZERO(968) )), 
G(ZERO(1024),G(ZERO(1024), 
Z || LE64(2) || ZERO(968) )),... ,
G(ZERO(1024),G(ZERO(1024), 
Z || LE64(q/(128*SL)) || ZERO(968) )),
</artwork>
            <t indent="0" pn="section-3.4.1.2-7">
 which are partitioned into q/(SL) 8-byte values X, which are viewed as X1||X2 and converted to J_1=int32(X1) and J_2=int32(X2).</t>
            <t indent="0" pn="section-3.4.1.2-8">
    The values r, l, sl, m', t, y, and i are represented as 8 bytes in
    little endian.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3.4.1.3">
            <name slugifiedName="name-argon2id">Argon2id</name>
            <t indent="0" pn="section-3.4.1.3-1">If the pass number is 0 and the slice number is 0 or 1, then compute J_1 and J_2 as
			for Argon2i, else compute J_1 and J_2 as for Argon2d.</t>
          </section>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4.2">
          <name slugifiedName="name-mapping-j_1-and-j_2-to-refe">Mapping J_1 and J_2 to Reference Block Index [l][z]</name>
          <t indent="0" pn="section-3.4.2-1">The value of l = J_2 mod p gives the index of the lane from 
            which the block will be taken.  For the first pass (r=0) and 
            the first slice (sl=0), the block is taken from the current lane.</t>
          <t indent="0" pn="section-3.4.2-2">The set W contains the indices that are referenced 
            according to the following rules:
          </t>
          <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-3.4.2-3"><li pn="section-3.4.2-3.1" derivedCounter="1.">If l is the current lane, then W includes the indices of 
                all blocks in the last SL - 1 = 3 segments computed and finished, as well as
				the blocks computed in the current segment in the current pass
                excluding B[i][j-1].</li>
            <li pn="section-3.4.2-3.2" derivedCounter="2.">If l is not the current lane, then W includes the indices of 
                all blocks in the last SL - 1 = 3 segments computed and finished 
                in lane l. If B[i][j] is the first block of a segment, then the
                very last index from W is excluded.</li>
          </ol>
          <t indent="0" pn="section-3.4.2-4">Then take a block from W with a nonuniform 
            distribution over [0, |W|) using the following mapping:
            
          </t>
          <figure align="left" suppress-title="false" pn="figure-12">
            <name slugifiedName="name-computing-j1">Computing J1</name>
            <artwork name="" type="" align="left" alt="" pn="section-3.4.2-5.1">
J_1 -&gt; |W|(1 - J_1^2 / 2^(64))
</artwork>
          </figure>
          <t indent="0" pn="section-3.4.2-6">To avoid floating point computation, the following approximation 
            is used:
          </t>
          <figure align="left" suppress-title="false" pn="figure-13">
            <name slugifiedName="name-computing-j1-part-2">Computing J1, Part 2</name>
            <artwork name="" type="" align="left" alt="" pn="section-3.4.2-7.1">
x = J_1^2 / 2^(32)
y = (|W| * x) / 2^(32)
zz = |W| - 1 - y
</artwork>
          </figure>
          <t indent="0" pn="section-3.4.2-8">Then take the zz-th index from W; it will be the z value for the reference block index [l][z].</t>
        </section>
      </section>
      <section anchor="G-function" numbered="true" toc="include" removeInRFC="false" pn="section-3.5">
        <name slugifiedName="name-compression-function-g">Compression Function G</name>
        <t indent="0" pn="section-3.5-1">The compression function G is built upon the BLAKE2b-based  transformation P. 
  P operates on the 128-byte input, which can be
	viewed as eight 16-byte registers:
	
        </t>
        <figure align="left" suppress-title="false" pn="figure-14">
          <name slugifiedName="name-blake-round-function-p">Blake Round Function P</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.5-2.1">
P(A_0, A_1, ... ,A_7) = (B_0, B_1, ... ,B_7)
</artwork>
        </figure>
        <t indent="0" pn="section-3.5-3">The compression function G(X, Y) operates on two 1024-byte
	blocks X and Y. It first computes R = X XOR Y.  Then R is
	viewed as an 8x8 matrix of 16-byte registers R_0, R_1, ... ,
	R_63. Then P is first applied to each row, and then to each column to
	get Z:

        </t>
        <figure align="left" suppress-title="false" pn="figure-15">
          <name slugifiedName="name-core-of-compression-functio">Core of Compression Function G</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.5-4.1">
( Q_0,  Q_1,  Q_2, ... ,  Q_7) &lt;- P( R_0,  R_1,  R_2, ... ,  R_7)
( Q_8,  Q_9, Q_10, ... , Q_15) &lt;- P( R_8,  R_9, R_10, ... , R_15)
                              ...
(Q_56, Q_57, Q_58, ... , Q_63) &lt;- P(R_56, R_57, R_58, ... , R_63)
( Z_0,  Z_8, Z_16, ... , Z_56) &lt;- P( Q_0,  Q_8, Q_16, ... , Q_56)
( Z_1,  Z_9, Z_17, ... , Z_57) &lt;- P( Q_1,  Q_9, Q_17, ... , Q_57)
                              ...
( Z_7, Z_15, Z 23, ... , Z_63) &lt;- P( Q_7, Q_15, Q_23, ... , Q_63)
</artwork>
        </figure>
        <t indent="0" pn="section-3.5-5">Finally, G outputs Z XOR R:

        </t>
        <artwork name="" type="" align="left" alt="" pn="section-3.5-6">
G: (X, Y) -&gt; R -&gt; Q -&gt; Z -&gt; Z XOR R
</artwork>
        <figure align="left" suppress-title="false" pn="figure-16">
          <name slugifiedName="name-argon2-compression-function">Argon2 Compression Function G</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.5-7.1">
                         +---+       +---+
                         | X |       | Y |
                         +---+       +---+
                           |           |
                           ----&gt;XOR&lt;----
                         --------|
                         |      \ /
                         |     +---+
                         |     | R |
                         |     +---+
                         |       |
                         |      \ /
                         |   P rowwise
                         |       |
                         |      \ /
                         |     +---+
                         |     | Q |
                         |     +---+
                         |       |
                         |      \ /
                         |  P columnwise
                         |       |
                         |      \ /
                         |     +---+
                         |     | Z |
                         |     +---+
                         |       |
                         |      \ /
                         ------&gt;XOR
                                 |
                                \ /
      </artwork>
        </figure>
      </section>
      <section anchor="P-permutation" numbered="true" toc="include" removeInRFC="false" pn="section-3.6">
        <name slugifiedName="name-permutation-p">Permutation P</name>
        <t indent="0" pn="section-3.6-1">Permutation P is based on the round function of BLAKE2b.  The eight 
        16-byte inputs S_0, S_1, ... , S_7 are viewed as a 4x4 matrix of 
        64-bit words, where S_i = (v_{2*i+1} || v_{2*i}):

        </t>
        <figure align="left" suppress-title="false" pn="figure-17">
          <name slugifiedName="name-matrix-element-labeling">Matrix Element Labeling</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.6-2.1">
         v_0  v_1  v_2  v_3
         v_4  v_5  v_6  v_7
         v_8  v_9 v_10 v_11
        v_12 v_13 v_14 v_15
      </artwork>
        </figure>
        <t indent="0" pn="section-3.6-3">

    It works as follows:

        </t>
        <figure align="left" suppress-title="false" pn="figure-18">
          <name slugifiedName="name-feeding-matrix-elements-to-">Feeding Matrix Elements to GB</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.6-4.1">
        GB(v_0, v_4,  v_8, v_12)
        GB(v_1, v_5,  v_9, v_13)
        GB(v_2, v_6, v_10, v_14)
        GB(v_3, v_7, v_11, v_15)

        GB(v_0, v_5, v_10, v_15)
        GB(v_1, v_6, v_11, v_12)
        GB(v_2, v_7,  v_8, v_13)
        GB(v_3, v_4,  v_9, v_14)
      </artwork>
        </figure>
        <t indent="0" pn="section-3.6-5">

    GB(a, b, c, d) is defined as follows:

        </t>
        <figure align="left" suppress-title="false" pn="figure-19">
          <name slugifiedName="name-details-of-gb">Details of GB</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.6-6.1">
        a = (a + b + 2 * trunc(a) * trunc(b)) mod 2^(64)
        d = (d XOR a) &gt;&gt;&gt; 32
        c = (c + d + 2 * trunc(c) * trunc(d)) mod 2^(64)
        b = (b XOR c) &gt;&gt;&gt; 24

        a = (a + b + 2 * trunc(a) * trunc(b)) mod 2^(64)
        d = (d XOR a) &gt;&gt;&gt; 16
        c = (c + d + 2 * trunc(c) * trunc(d)) mod 2^(64)
        b = (b XOR c) &gt;&gt;&gt; 63
      </artwork>
        </figure>
        <t indent="0" pn="section-3.6-7">

        The modular additions in GB are combined with 64-bit multiplications.  
        Multiplications are the only difference from the original BLAKE2b design.  
        This choice is done to increase the circuit depth and thus the running 
        time of ASIC implementations, while having roughly the same running 
        time on CPUs thanks to parallelism and pipelining.
		
        </t>
      </section>
    </section>
    <section anchor="parameter-choice" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-parameter-choice">Parameter Choice</name>
      <t indent="0" pn="section-4-1">Argon2d is optimized for settings where the adversary does
      not get regular access to system memory or CPU, i.e., they cannot
      run side-channel attacks based on the timing information, nor can they
      recover the password much faster using garbage
      collection. These settings are more typical for backend servers
      and cryptocurrency minings. For practice, we suggest the
      following settings:

      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4-2">
        <li pn="section-4-2.1">Cryptocurrency mining, which takes 0.1 seconds on a 2 GHz
	CPU using 1 core -- Argon2d with 2 lanes and 250 MB of RAM.</li>
      </ul>
      <t indent="0" pn="section-4-3">Argon2id is optimized for more realistic settings, where the
      adversary can possibly access the same machine, use its CPU, or
      mount cold-boot attacks. We suggest the following
      settings:

      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4-4">
        <li pn="section-4-4.1">Backend server authentication, which takes 0.5 seconds on a
	2 GHz CPU using 4 cores -- Argon2id with 8 lanes and 4 GiB of
	RAM.</li>
        <li pn="section-4-4.2">Key derivation for hard-drive encryption, which takes 3
	seconds on a 2 GHz CPU using 2 cores -- Argon2id with 4 lanes
	and 6 GiB of RAM.</li>
        <li pn="section-4-4.3">Frontend server authentication, which takes 0.5 seconds on a
	2 GHz CPU using 2 cores -- Argon2id with 4 lanes and 1 GiB of
	RAM.</li>
      </ul>
      <t indent="0" pn="section-4-5">We recommend the following procedure to select the type and
      the parameters for practical use of Argon2.

      </t>
      <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4-6"><li pn="section-4-6.1" derivedCounter="1."> If a uniformly safe option that is not tailored to your application or hardware is acceptable, 
  select Argon2id with t=1 iteration, p=4 lanes, m=2^(21) (2 GiB of RAM), 128-bit salt, and 256-bit tag size.
   This is the FIRST <bcp14>RECOMMENDED</bcp14> option.</li>
        <li pn="section-4-6.2" derivedCounter="2."> If much less memory is available, a uniformly safe option is Argon2id with t=3 iterations, p=4 lanes, m=2^(16) 
   (64 MiB of RAM), 128-bit salt, and 256-bit tag size.
   This is the SECOND <bcp14>RECOMMENDED</bcp14> option.</li>
        <li pn="section-4-6.3" derivedCounter="3.">Otherwise, start with selecting the type y. If you do not know the difference
	between the types or you consider side-channel attacks to be a viable
	threat, choose Argon2id.</li>
        <li pn="section-4-6.4" derivedCounter="4.">Select p=4 lanes.</li>
        <li pn="section-4-6.5" derivedCounter="5.">Figure out the maximum amount of memory that each call
	can afford and translate it to the parameter m.</li>
        <li pn="section-4-6.6" derivedCounter="6.">Figure out the maximum amount of time (in seconds) that
	each call can afford.</li>
        <li pn="section-4-6.7" derivedCounter="7.">Select the salt length. A length of 128 bits is sufficient for all
	applications but can be reduced to 64 bits in the case of
	space constraints.</li>
        <li pn="section-4-6.8" derivedCounter="8.">Select the tag length. A length of 128 bits is sufficient for most
	applications, including key derivation. If longer keys are
	needed, select longer tags.</li>
        <li pn="section-4-6.9" derivedCounter="9.">If side-channel attacks are a viable threat or if you're uncertain, enable the
	memory-wiping option in the library call.</li>
        <li pn="section-4-6.10" derivedCounter="10.">Run the scheme of type y, memory m, and p lanes
	using a different number of passes t. Figure out the maximum t
	such that the running time does not exceed the affordable time. If it even exceeds for t = 1, reduce m accordingly.</li>
        <li pn="section-4-6.11" derivedCounter="11."> Use Argon2 with determined values m,
	p, and t.</li>
      </ol>
    </section>
    <section anchor="test-vectors" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-test-vectors">Test Vectors</name>
      <t indent="0" pn="section-5-1">This section contains test vectors for Argon2.</t>
      <section anchor="argon2d-test-vectors" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-argon2d-test-vectors">Argon2d Test Vectors</name>
        <t indent="0" pn="section-5.1-1">We provide test vectors with complete outputs (tags). For the convenience of developers, we also provide some interim variables -- concretely, the first and last memory blocks of each pass.</t>
        <sourcecode type="test-vectors" markers="false" pn="section-5.1-2">
=======================================
Argon2d version number 19
=======================================
Memory: 32 KiB
Passes: 3
Parallelism: 4 lanes
Tag length: 32 bytes
Password[32]: 01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
Salt[16]: 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
Secret[8]: 03 03 03 03 03 03 03 03
Associated data[12]: 04 04 04 04 04 04 04 04 04 04 04 04
Pre-hashing digest: b8 81 97 91 a0 35 96 60
                    bb 77 09 c8 5f a4 8f 04
                    d5 d8 2c 05 c5 f2 15 cc
                    db 88 54 91 71 7c f7 57
                    08 2c 28 b9 51 be 38 14
                    10 b5 fc 2e b7 27 40 33
                    b9 fd c7 ae 67 2b ca ac
                    5d 17 90 97 a4 af 31 09

 After pass 0:
Block 0000 [  0]: db2fea6b2c6f5c8a
Block 0000 [  1]: 719413be00f82634
Block 0000 [  2]: a1e3f6dd42aa25cc
Block 0000 [  3]: 3ea8efd4d55ac0d1
...
Block 0031 [124]: 28d17914aea9734c
Block 0031 [125]: 6a4622176522e398
Block 0031 [126]: 951aa08aeecb2c05
Block 0031 [127]: 6a6c49d2cb75d5b6

 After pass 1:
Block 0000 [  0]: d3801200410f8c0d
Block 0000 [  1]: 0bf9e8a6e442ba6d
Block 0000 [  2]: e2ca92fe9c541fcc
Block 0000 [  3]: 6269fe6db177a388
...
Block 0031 [124]: 9eacfcfbdb3ce0fc
Block 0031 [125]: 07dedaeb0aee71ac
Block 0031 [126]: 074435fad91548f4
Block 0031 [127]: 2dbfff23f31b5883

 After pass 2:
Block 0000 [  0]: 5f047b575c5ff4d2
Block 0000 [  1]: f06985dbf11c91a8
Block 0000 [  2]: 89efb2759f9a8964
Block 0000 [  3]: 7486a73f62f9b142
...
Block 0031 [124]: 57cfb9d20479da49
Block 0031 [125]: 4099654bc6607f69
Block 0031 [126]: f142a1126075a5c8
Block 0031 [127]: c341b3ca45c10da5
Tag: 51 2b 39 1b 6f 11 62 97
     53 71 d3 09 19 73 42 94
     f8 68 e3 be 39 84 f3 c1
     a1 3a 4d b9 fa be 4a cb
</sourcecode>
      </section>
      <section anchor="argon2i-test-vectors" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-argon2i-test-vectors">Argon2i Test Vectors</name>
        <sourcecode type="test-vectors" markers="false" pn="section-5.2-1">
=======================================
Argon2i version number 19
=======================================
Memory: 32 KiB
Passes: 3
Parallelism: 4 lanes
Tag length: 32 bytes
Password[32]: 01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
              01 01 01 01 01 01 01 01
Salt[16]: 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
Secret[8]: 03 03 03 03 03 03 03 03
Associated data[12]: 04 04 04 04 04 04 04 04 04 04 04 04
Pre-hashing digest: c4 60 65 81 52 76 a0 b3
                    e7 31 73 1c 90 2f 1f d8
                    0c f7 76 90 7f bb 7b 6a
                    5c a7 2e 7b 56 01 1f ee
                    ca 44 6c 86 dd 75 b9 46
                    9a 5e 68 79 de c4 b7 2d
                    08 63 fb 93 9b 98 2e 5f
                    39 7c c7 d1 64 fd da a9

 After pass 0:
Block 0000 [  0]: f8f9e84545db08f6
Block 0000 [  1]: 9b073a5c87aa2d97
Block 0000 [  2]: d1e868d75ca8d8e4
Block 0000 [  3]: 349634174e1aebcc
...
Block 0031 [124]: 975f596583745e30
Block 0031 [125]: e349bdd7edeb3092
Block 0031 [126]: b751a689b7a83659
Block 0031 [127]: c570f2ab2a86cf00

 After pass 1:
Block 0000 [  0]: b2e4ddfcf76dc85a
Block 0000 [  1]: 4ffd0626c89a2327
Block 0000 [  2]: 4af1440fff212980
Block 0000 [  3]: 1e77299c7408505b
...
Block 0031 [124]: e4274fd675d1e1d6
Block 0031 [125]: 903fffb7c4a14c98
Block 0031 [126]: 7e5db55def471966
Block 0031 [127]: 421b3c6e9555b79d

 After pass 2:
Block 0000 [  0]: af2a8bd8482c2f11
Block 0000 [  1]: 785442294fa55e6d
Block 0000 [  2]: 9256a768529a7f96
Block 0000 [  3]: 25a1c1f5bb953766
...
Block 0031 [124]: 68cf72fccc7112b9
Block 0031 [125]: 91e8c6f8bb0ad70d
Block 0031 [126]: 4f59c8bd65cbb765
Block 0031 [127]: 71e436f035f30ed0
Tag: c8 14 d9 d1 dc 7f 37 aa
     13 f0 d7 7f 24 94 bd a1
     c8 de 6b 01 6d d3 88 d2
     99 52 a4 c4 67 2b 6c e8
</sourcecode>
      </section>
      <section anchor="argon2id-test-vectors" numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-argon2id-test-vectors">Argon2id Test Vectors</name>
        <sourcecode type="test-vectors" markers="false" pn="section-5.3-1">
=======================================
Argon2id version number 19
=======================================
Memory: 32 KiB, Passes: 3,
Parallelism: 4 lanes, Tag length: 32 bytes
Password[32]: 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
Salt[16]: 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
Secret[8]: 03 03 03 03 03 03 03 03
Associated data[12]: 04 04 04 04 04 04 04 04 04 04 04 04
Pre-hashing digest: 28 89 de 48 7e b4 2a e5 00 c0 00 7e d9 25 2f
 10 69 ea de c4 0d 57 65 b4 85 de 6d c2 43 7a 67 b8 54 6a 2f 0a
 cc 1a 08 82 db 8f cf 74 71 4b 47 2e 94 df 42 1a 5d a1 11 2f fa
 11 43 43 70 a1 e9 97

 After pass 0:
Block 0000 [  0]: 6b2e09f10671bd43
Block 0000 [  1]: f69f5c27918a21be
Block 0000 [  2]: dea7810ea41290e1
Block 0000 [  3]: 6787f7171870f893
...
Block 0031 [124]: 377fa81666dc7f2b
Block 0031 [125]: 50e586398a9c39c8
Block 0031 [126]: 6f732732a550924a
Block 0031 [127]: 81f88b28683ea8e5

 After pass 1:
Block 0000 [  0]: 3653ec9d01583df9
Block 0000 [  1]: 69ef53a72d1e1fd3
Block 0000 [  2]: 35635631744ab54f
Block 0000 [  3]: 599512e96a37ab6e
...
Block 0031 [124]: 4d4b435cea35caa6
Block 0031 [125]: c582210d99ad1359
Block 0031 [126]: d087971b36fd6d77
Block 0031 [127]: a55222a93754c692

 After pass 2:
Block 0000 [  0]: 942363968ce597a4
Block 0000 [  1]: a22448c0bdad5760
Block 0000 [  2]: a5f80662b6fa8748
Block 0000 [  3]: a0f9b9ce392f719f
...
Block 0031 [124]: d723359b485f509b
Block 0031 [125]: cb78824f42375111
Block 0031 [126]: 35bc8cc6e83b1875
Block 0031 [127]: 0b012846a40f346a
Tag: 0d 64 0d f5 8d 78 76 6c 08 c0 37 a3 4a 8b 53 c9 d0
 1e f0 45 2d 75 b6 5e b5 25 20 e9 6b 01 e6 59
</sourcecode>
      </section>
    </section>
    <section anchor="iana" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-6-1">This document has no IANA actions.</t>
    </section>
    <section anchor="security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <section anchor="security-hash" numbered="true" toc="include" removeInRFC="false" pn="section-7.1">
        <name slugifiedName="name-security-as-a-hash-function">Security as a Hash Function and KDF</name>
        <t indent="0" pn="section-7.1-1">The collision and preimage resistance levels of Argon2 are equivalent to those of the underlying BLAKE2b hash function.
             To produce a collision, 2^(256) inputs are needed. To find a preimage, 2^(512) inputs must be tried.</t>
        <t indent="0" pn="section-7.1-2">The KDF security is determined by the key length
             and the size of the internal state of hash function H'.
             To distinguish the output of the keyed Argon2 from random, a minimum of (2^(128),2^length(K)) calls to BLAKE2b are needed. </t>
      </section>
      <section anchor="security-tradeoff" numbered="true" toc="include" removeInRFC="false" pn="section-7.2">
        <name slugifiedName="name-security-against-time-space">Security against Time-Space Trade-off Attacks</name>
        <t indent="0" pn="section-7.2-1">Time-space trade-offs allow computing a memory-hard function storing fewer memory blocks at the cost of more calls to
             the internal compression function. The advantage of trade-off attacks is measured in the reduction factor to the time-area 
             product, where memory and extra compression function cores contribute to the area and time is increased to accommodate the recomputation
             of missed blocks. A high reduction factor may potentially speed up the preimage search. 
        </t>
        <t indent="0" pn="section-7.2-2">The best-known attack on the 1-pass and 2-pass Argon2i is the low-storage
      attack described in <xref target="CBS16" format="default" sectionFormat="of" derivedContent="CBS16"/>, which reduces the 
      time-area product (using the peak memory value) by the factor of 5.  

      The best attack on Argon2i with 3 passes or more is described in <xref target="AB16" format="default" sectionFormat="of" derivedContent="AB16"/>, with the reduction factor being a function of 
	  memory size and the number of passes (e.g., for 1 gibibyte of memory, a reduction factor of 3 for 3 passes, 2.5 for 4 passes, 2 for 6 passes). The reduction
	  factor grows by about 0.5 with every doubling of the memory size.
	  To completely prevent time-space trade-offs from <xref target="AB16" format="default" sectionFormat="of" derivedContent="AB16"/>, the
      number of passes <bcp14>MUST</bcp14> exceed the binary logarithm of memory minus 26.
	  Asymptotically, the best attack on 1-pass Argon2i is given in <xref target="BZ17" format="default" sectionFormat="of" derivedContent="BZ17"/>, with maximal advantage
	of the adversary upper bounded by O(m^(0.233)), where m is the number of blocks. This attack is also asymptotically optimal as <xref target="BZ17" format="default" sectionFormat="of" derivedContent="BZ17"/> also proves the upper bound on any attack is O(m^(0.25)).
        </t>
        <t indent="0" pn="section-7.2-3">The best trade-off attack on t-pass Argon2d is the ranking trade-off attack, 
      which reduces the time-area product by the factor of 1.33.
        </t>
        <t indent="0" pn="section-7.2-4">The best attack on Argon2id can be obtained by complementing the best attack
	  on the 1-pass Argon2i with the best attack on a multi-pass Argon2d. 

Thus, the best trade-off attack on 1-pass Argon2id is the combined low-storage attack (for the first half of the memory) and
	  the ranking attack (for the second half), which generate the factor of about 2.1. The best trade-off attack on 
      t-pass Argon2id is the ranking trade-off attack, 
      which reduces the time-area product by the factor of 1.33.
        </t>
      </section>
      <section anchor="security-general" numbered="true" toc="include" removeInRFC="false" pn="section-7.3">
        <name slugifiedName="name-security-for-time-bounded-d">Security for Time-Bounded Defenders</name>
        <t indent="0" pn="section-7.3-1">A bottleneck in a system employing the password hashing function 
			 is often the function latency rather than memory costs. A rational 
			 defender would then maximize the brute-force costs for the attacker equipped 
			 with a list of hashes, salts, and timing information for fixed computing time 
			 on the defender's machine.  The attack cost estimates from <xref target="AB16" format="default" sectionFormat="of" derivedContent="AB16"/>
			 imply that for Argon2i, 3 passes is almost optimal for most reasonable memory sizes; for Argon2d and Argon2id, 1 pass maximizes the attack costs for the constant defender time.
        </t>
      </section>
      <section anchor="security-recommend" numbered="true" toc="include" removeInRFC="false" pn="section-7.4">
        <name slugifiedName="name-recommendations">Recommendations</name>
        <t indent="0" pn="section-7.4-1">
The Argon2id variant with t=1 and 2 GiB memory is the FIRST <bcp14>RECOMMENDED</bcp14> option and is suggested
as a default setting for all environments. This setting is secure against side-channel attacks 
and maximizes adversarial costs on dedicated brute-force hardware. The Argon2id variant with t=3 and 64 MiB memory is the SECOND <bcp14>RECOMMENDED</bcp14> option and is suggested
as a default setting for memory-constrained environments.
</t>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="RFC7693" to="BLAKE2"/>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC7693" target="https://www.rfc-editor.org/info/rfc7693" quoteTitle="true" derivedAnchor="BLAKE2">
          <front>
            <title>The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)</title>
            <author initials="M-J." surname="Saarinen" fullname="M-J. Saarinen" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J-P." surname="Aumasson" fullname="J-P. Aumasson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="November"/>
            <abstract>
              <t indent="0">This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code conveniently available to the Internet community.  BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for smaller architectures.  BLAKE2 can be directly keyed, making it functionally equivalent to a Message Authentication Code (MAC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7693"/>
          <seriesInfo name="DOI" value="10.17487/RFC7693"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="AB15" target="https://eprint.iacr.org/2015/227.pdf" quoteTitle="true" derivedAnchor="AB15">
          <front>
            <title>Tradeoff Cryptanalysis of Memory-Hard Functions</title>
            <author initials="A." surname="Biryukov" fullname="Alex Biryukov"/>
            <author initials="D." surname="Khovratovich" fullname="Dmitry Khovratovich"/>
            <date month="December" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-662-48800-3_26"/>
          <refcontent>ASIACRYPT 2015</refcontent>
        </reference>
        <reference anchor="AB16" target="https://eprint.iacr.org/2016/115.pdf" quoteTitle="true" derivedAnchor="AB16">
          <front>
            <title>Efficiently Computing Data-Independent Memory-Hard Functions</title>
            <author initials="J." surname="Alwen" fullname="Joel Alwen"/>
            <author initials="J." surname="Blocki" fullname="Jeremiah Blocki"/>
            <date month="March" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-662-53008-5_9"/>
          <refcontent>CRYPTO 2016</refcontent>
        </reference>
        <reference anchor="ARGON2" target="https://www.cryptolux.org/images/0/0d/Argon2.pdf" quoteTitle="true" derivedAnchor="ARGON2">
          <front>
            <title>Argon2: the memory-hard function for password hashing and other applications</title>
            <author initials="A." surname="Biryukov" fullname="Alex Biryukov"/>
            <author initials="D." surname="Dinu" fullname="Daniel Dinu"/>
            <author initials="D." surname="Khovratovich" fullname="Dmitry Khovratovich"/>
            <date month="March" year="2017"/>
          </front>
        </reference>
        <reference anchor="ARGON2ESP" target="https://www.cryptolux.org/images/d/d0/Argon2ESP.pdf" quoteTitle="true" derivedAnchor="ARGON2ESP">
          <front>
            <title>Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications</title>
            <author initials="A." surname="Biryukov" fullname="Alex Biryukov"/>
            <author initials="D." surname="Dinu" fullname="Daniel Dinu"/>
            <author initials="D." surname="Khovratovich" fullname="Dmitry Khovratovich"/>
            <date month="March" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/EuroSP.2016.31"/>
          <refcontent>Euro SnP 2016</refcontent>
        </reference>
        <reference anchor="BZ17" target="https://eprint.iacr.org/2017/442.pdf" quoteTitle="true" derivedAnchor="BZ17">
          <front>
            <title>On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i</title>
            <author initials="J." surname="Blocki" fullname="Jeremiah Blocki"/>
            <author initials="S." surname="Zhou" fullname="Samson Zhou"/>
            <date month="May" year="2017"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-319-70500-2_15"/>
          <refcontent>TCC 2017</refcontent>
        </reference>
        <reference anchor="CBS16" target="https://eprint.iacr.org/2016/027.pdf" quoteTitle="true" derivedAnchor="CBS16">
          <front>
            <title>Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks</title>
            <author initials="D." surname="Boneh" fullname="Dan Boneh"/>
            <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs"/>
            <author initials="S." surname="Schechter" fullname="Stuart Schechter"/>
            <date month="May" year="2017"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-662-53887-6_8"/>
          <refcontent>ASIACRYPT 2016</refcontent>
        </reference>
        <reference anchor="HARD" target="https://eprint.iacr.org/2014/238.pdf" quoteTitle="true" derivedAnchor="HARD">
          <front>
            <title>High Parallel Complexity Graphs and Memory-Hard Functions</title>
            <author initials="J." surname="Alwen" fullname="Joel Alwen"/>
            <author initials="V." surname="Serbinenko" fullname="Vladimir Serbinenko"/>
            <date year="2015" month="June"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/2746539.2746622"/>
          <refcontent>STOC '15</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="ack" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">We greatly thank the following individuals who helped in preparing and reviewing
       this document: <contact fullname="Jean-Philippe Aumasson"/>,
	  <contact fullname="Samuel Neves"/>, <contact fullname="Joel Alwen"/>, <contact fullname="Jeremiah Blocki"/>, <contact fullname="Bill Cox"/>, <contact fullname="Arnold Reinhold"/>, <contact fullname="Solar Designer"/>, <contact fullname="Russ Housley"/>,
     <contact fullname="Stanislav Smyshlyaev"/>, <contact fullname="Kenny Paterson"/>, <contact fullname="Alexey Melnikov"/>, and <contact fullname="Gwynne Raskind"/>.</t>
      <t indent="0" pn="section-appendix.a-2">The work described in this document was done before <contact fullname="Daniel Dinu"/> joined Intel, while he was at the University of Luxembourg.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="A." surname="Biryukov" fullname="Alex Biryukov">
        <organization showOnFrontPage="true">University of Luxembourg</organization>
        <address>
          <email>alex.biryukov@uni.lu</email>
        </address>
      </author>
      <author initials="D." surname="Dinu" fullname="Daniel Dinu">
        <organization showOnFrontPage="true">University of Luxembourg</organization>
        <address>
          <email>daniel.dinu@intel.com</email>
        </address>
      </author>
      <author initials="D." surname="Khovratovich" fullname="Dmitry Khovratovich">
        <organization showOnFrontPage="true">ABDK Consulting</organization>
        <address>
          <email>khovratovich@gmail.com</email>
        </address>
      </author>
      <author initials="S." surname="Josefsson" fullname="Simon Josefsson">
        <organization showOnFrontPage="true">SJD AB</organization>
        <address>
          <email>simon@josefsson.org</email>
          <uri>http://josefsson.org/</uri>
        </address>
      </author>
    </section>
  </back>
</rfc>
