Hey all,
We just published a new version of the Implicit-IV draft, addressing the 
comments we received.
Any comments are more than welcome.
Regards
Tobias

-----Ursprüngliche Nachricht-----
Von: [email protected] [mailto:[email protected]] 
Gesendet: Dienstag, 15. November 2016 08:47
An: Yoav Nir <[email protected]>; Daniel Migault 
<[email protected]>; Tobias Guggemos <[email protected]>
Betreff: New Version Notification for draft-mglt-ipsecme-implicit-iv-02.txt


A new version of I-D, draft-mglt-ipsecme-implicit-iv-02.txt
has been successfully submitted by Tobias Guggemos and posted to the IETF 
repository.

Name:           draft-mglt-ipsecme-implicit-iv
Revision:       02
Title:          Implicit IV for Counter-based Ciphers in IPsec
Document date:  2016-11-15
Group:          Individual Submission
Pages:          7
URL:            
https://www.ietf.org/internet-drafts/draft-mglt-ipsecme-implicit-iv-02.txt
Status:         https://datatracker.ietf.org/doc/draft-mglt-ipsecme-implicit-iv/
Htmlized:       https://tools.ietf.org/html/draft-mglt-ipsecme-implicit-iv-02
Diff:           
https://www.ietf.org/rfcdiff?url2=draft-mglt-ipsecme-implicit-iv-02

Abstract:
   IPsec ESP sends an initialization vector (IV) or nonce in each
   packet, adding 8 or 16 octets.  Some algorithms such as AES-GCM, AES-
   CCM, AES-CTR and ChaCha20-Poly1305 require a unique nonce but do not
   require an unpredictable nonce.  When using such algorithms the
   packet counter value can be used to generate a nonce, saving 8 octets
   per packet.  This document describes how to do this.

                                                                                
  


Please note that it may take a couple of minutes from the time of submission 
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to