<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-04">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3 and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-04"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2025" month="May" day="25"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 54?>

<t>This document proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction-and-rationale">
      <name>Introduction and rationale</name>
      <t>AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS caters to the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the necessity for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic proves particularly advantageous for servers managing a substantial volume of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, mitigating the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is very efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers seamlessly integrate into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite denotes the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the designated hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>To accommodate AEGIS-based encryption algorithms, this document introduces additional cipher suites to those specified in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale behind recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites referenced herein, these algorithms <bcp14>MUST</bcp14> be utilized with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specifications detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="I-D.irtf-cfrg-aegis-aead"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the chosen AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the QUIC packet headers undergo encryption in accordance with the specifications outlined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated following the same procedure as in DTLS 1.3, utilizing:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation encompasses the cipher suites outlined in this document.</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM ones of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed prior to encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Requested IANA identifiers</name>
        <thead>
          <tr>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-16"/>
        </reference>
      </references>
    </references>
    <?line 180?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
