<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mattsson-cfrg-aes-gcm-sst-16" category="info" consensus="true" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="GCM-SST">Galois Counter Mode with Strong Secure Tags (GCM-SST)</title>
    <seriesInfo name="Internet-Draft" value="draft-mattsson-cfrg-aes-gcm-sst-16"/>
    <author initials="M." surname="Campagna" fullname="Matthew Campagna">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>campagna@amazon.com</email>
      </address>
    </author>
    <author initials="A." surname="Maximov" fullname="Alexander Maximov">
      <organization abbrev="Ericsson">Ericsson</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>alexander.maximov@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="14"/>
    <area>IRTF</area>
    <workgroup>Crypto Forum</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 510?>

<t>This document defines the Galois Counter Mode with Strong Secure Tags (GCM-SST) Authenticated Encryption with Associated Data (AEAD) algorithm. GCM-SST can be used with any keystream generator, not just 128-bit block ciphers. The main differences from GCM are the use of an additional subkey H<sub>2</sub>, the derivation of fresh subkeys H and H<sub>2</sub> for each nonce, and the replacement of the GHASH function with the POLYVAL function from AES-GCM-SIV. This enables truncated tags with near-ideal forgery probabilities, even against multiple forgery attacks, which are significant security improvements over GCM. GCM-SST is designed for security protocols with replay protection and addresses the strong industry demand for fast encryption with minimal overhead and high security. This document registers several instances of GCM-SST using Advanced Encryption Standard (AES) and Rijndael-256.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://emanjon.github.io/draft-mattsson-cfrg-aes-gcm-sst/draft-mattsson-cfrg-aes-gcm-sst.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mattsson-cfrg-aes-gcm-sst/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum Research Group mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/search/?email_list=cfrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/emanjon/draft-mattsson-cfrg-aes-gcm-sst"/>.</t>
    </note>
  </front>
  <middle>
    <?line 514?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Advanced Encryption Standard (AES) in Galois Counter Mode (AES-GCM) <xref target="GCM"/> is a widely used AEAD algorithm <xref target="RFC5116"/> due to its attractive performance in both software and hardware as well as its provable security. During the NIST standardization, Ferguson pointed out two weaknesses in the GCM authentication function <xref target="Ferguson"/>. The first weakness significantly increases the probability of successful forgery for long messages. The second weakness reveals the subkey H if an attacker succeeds in creating forgeries. Once H is known, the attacker can consistently forge subsequent messages, drastically increasing the probability of multiple successful forgeries. The two weaknesses are problematic for all tag lengths but are especially critical when short tags are used.</t>
      <t>In a comment to NIST, Nyberg et al. <xref target="Nyberg"/> explained how small changes based on proven theoretical constructions mitigate these weaknesses. Unfortunately, NIST did not follow the advice from Nyberg et al. and instead specified additional requirements for use with short tags in Appendix C of <xref target="GCM"/>. NIST did not give any motivations for the parameter choices or the assumed security levels. Mattsson et al. <xref target="Mattsson"/> later demonstrated that attackers can almost always obtain feedback on the success or failure of forgery attempts, contradicting the assumptions NIST made for short tags. Furthermore, NIST appears to have relied on non-optimal attacks when calculating the parameters. Rogaway <xref target="Rogaway"/> criticizes the use of GCM with short tags and recommends prohibiting tags shorter than 96 bits. Reflecting the critique, NIST is planning to remove support for GCM with tags shorter than 96 bits <xref target="Revise"/>. NIST has not addressed the weaknesses for longer tags, such as the absence of reforgeability resistance <xref target="Reforge"/>. When AES-GCM is used in QUIC <xref target="RFC9001"/>, the expected number of forgeries can be equivalent to that of an ideal MAC with a length of 64.4 bits. Reforgeability resistance is a key design criterion in modern AEAD algorithms <xref target="AEZ"/>.</t>
      <t>Short tags are widely used, 32-bit tags are standard in most radio link layers including 5G <xref target="Sec5G"/>, 64-bit tags are very common in transport and application layers of the Internet of Things, and 32-, 64-, and 80-bit tags are common in media-encryption applications. Audio packets are small, numerous, and ephemeral. As such, they are highly sensitive to cryptographic overhead, but as each packet typically encodes only 20 ms of audio, forgery of individual packets is not a big concern and barely noticeable. Due to its weaknesses, GCM is typically not used with short tags. The result is either decreased performance from larger than needed tags <xref target="MoQ"/>, or decreased performance from using much slower constructions such as AES-CTR combined with HMAC <xref target="RFC3711"/><xref target="RFC9605"/>. Short tags are also useful to protect packets whose payloads are secured at higher layers, protocols where the security is given by the sum of the tag lengths, and in constrained radio networks, where the low bandwidth limits the number of forgery attempts. For all applications of short tags it is essential that the MAC behaves like an ideal MAC, i.e., the forgery probability is ≈ 1 / 2<sup>tag_length</sup> even after many generated MACs, many forgery attempts, and after a successful forgery. While Counter with CBC-MAC (CCM) <xref target="RFC5116"/> with short tags has forgery probabilities close to ideal, its performance is lower than that of GCM. For a comprehensive discussion on the use cases and requirements of short tags, see <xref target="Comments38B"/>.</t>
      <t>This document defines the Galois Counter Mode with Strong Secure Tags (GCM-SST) Authenticated Encryption with Associated Data (AEAD) algorithm following the recommendations from Nyberg et al. <xref target="Nyberg"/>. GCM-SST is defined with a general interface, allowing it to be used with any keystream generator, not just 128-bit block ciphers. The main differences from GCM <xref target="GCM"/> are the introduction of an additional subkey H<sub>2</sub>, the derivation of fresh subkeys H and H<sub>2</sub> for each nonce, and the replacement of the GHASH function with the POLYVAL function from AES-GCM-SIV <xref target="RFC8452"/>, see <xref target="GCM-SST"/>. These changes enable truncated tags with near-ideal forgery probabilities, even against multiple forgery attacks, see <xref target="Security"/>. GCM-SST is designed for use in security protocols with replay protection such as TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, SRTP <xref target="RFC3711"/>, PDCP <xref target="PDCP"/>, etc. Security protocols with replay protection are by far the most important use case for GCM. In unicast scenarios, its authentication tag behaves like an ideal MAC, including reforgeability resistance. Users and implementers of cryptography expect algorithms to behave like ideal MACs. Compared to Poly1305 <xref target="RFC7539"/> and GCM <xref target="RFC5116"/>, GCM-SST can provide better integrity with less overhead. Its performance in hardware and software is similar to GCM <xref target="GCM"/>. In software, the two additional AES invocations are compensated by the use of POLYVAL, the ”little-endian version” of GHASH, which is faster on little-endian architectures. GCM-SST retains the additive encryption characteristic of GCM, which enables efficient implementations on modern processor architectures, see <xref target="Gueron"/> and Section 2.4 of <xref target="GCM-Update"/>.</t>
      <t>This document also registers several GCM-SST instances using Advanced Encryption Standard (AES) <xref target="AES"/> and Rijndael with 256-bit keys and blocks (Rijndael-256) <xref target="Rijndael"/> in counter mode as keystream generators and with tag lengths of 48, 96, and 112 bits, see <xref target="AES-GCM-SST"/>. The authentication tags in all registered GCM-SST instances behave like ideal MACs, which is not the case at all for GCM <xref target="GCM"/>. 3GPP has standardized the use of Rijndael-256 for authentication and key generation in 3GPP TS 35.234–35.237 <xref target="WID23"/>. NIST plans to standardize Rijndael-256 <xref target="Plans"/>, although there might be revisions to the key schedule. Rijndael-256 has very good performance on modern x86-64 platforms equipped with AES-NI and VAES instructions <xref target="Ducker"/>. Compared to AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/>, AES-GCM-SST offers significantly higher performance in pure hardware implementations while retaining the advantage of being a mode of operation for AES.</t>
      <t>GCM-SST was originally developed by ETSI SAGE, under the name Mac5G, following a request from 3GPP, with several years of discussion and refinement contributing to its design <xref target="SAGE23"/><xref target="SAGE24"/>.  Mac5G is constructed similarly to the integrity algorithms used for SNOW 3G <xref target="UIA2"/> and ZUC <xref target="EIA3"/>. 3GPP has decided to standardize GCM-SST for use with AES-256 <xref target="AES"/>, SNOW 5G <xref target="SNOW"/>, and ZUC-256 <xref target="ZUC"/> in 3GPP TS 35.240–35.248 <xref target="WID24"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The following notation is used in the document:</t>
      <ul spacing="normal">
        <li>
          <t>K is the key as defined in <xref target="RFC5116"/></t>
        </li>
        <li>
          <t>N is the nonce as defined in <xref target="RFC5116"/></t>
        </li>
        <li>
          <t>A is the associated data as defined in <xref target="RFC5116"/></t>
        </li>
        <li>
          <t>P is the plaintext as defined in <xref target="RFC5116"/></t>
        </li>
        <li>
          <t>Z is the keystream</t>
        </li>
        <li>
          <t>ct is the ciphertext</t>
        </li>
        <li>
          <t>tag is the authentication tag</t>
        </li>
        <li>
          <t>tag_length is the length of tag in bits</t>
        </li>
        <li>
          <t>= is the assignment operator</t>
        </li>
        <li>
          <t>≠ is the inequality operator</t>
        </li>
        <li>
          <t>x || y is concatenation of the octet strings x and y</t>
        </li>
        <li>
          <t>⊕ is the bitwise exclusive or operator XOR</t>
        </li>
        <li>
          <t>len(x) is the length of x in bits</t>
        </li>
        <li>
          <t>zeropad(x) right pads an octet string x with zeroes to a multiple of 128 bits</t>
        </li>
        <li>
          <t>truncate(x, t) is the truncation operation.  The first t bits of x are kept</t>
        </li>
        <li>
          <t>n is the number of 128-bit chunks in zeropad(P)</t>
        </li>
        <li>
          <t>m is the number of 128-bit chunks in zeropad(A)</t>
        </li>
        <li>
          <t>POLYVAL is defined in <xref target="RFC8452"/></t>
        </li>
        <li>
          <t>BE32(x) is the big-endian encoding of 32-bit integer x</t>
        </li>
        <li>
          <t>LE64(x) is the little-endian encoding of 64-bit integer x</t>
        </li>
        <li>
          <t>V[y] is the 128-bit chunk with index y in the array V; the first chunk has index 0</t>
        </li>
        <li>
          <t>V[x:y] are the range of chunks x to y in the array V</t>
        </li>
      </ul>
    </section>
    <section anchor="GCM-SST">
      <name>Galois Counter Mode with Strong Secure Tags (GCM-SST)</name>
      <t>This section defines the Galois Counter Mode with Strong Secure Tags (GCM-SST) AEAD algorithm following the recommendations from Nyberg et al. <xref target="Nyberg"/>. GCM-SST is defined with a general interface so that it can be used with any keystream generator, not just a 128-bit block cipher.</t>
      <t>GCM-SST adheres to an AEAD interface <xref target="RFC5116"/> and the encryption function takes four variable-length octet string parameters. A secret key K, a nonce N, the associated data A, and a plaintext P. The keystream generator is instantiated with K and N. The keystream <bcp14>MAY</bcp14> depend on P and A. The minimum and maximum lengths of all parameters depend on the keystream generator. The keystream generator produces a keystream Z consisting of 128-bit chunks where the first three chunks Z[0], Z[1], and Z[2] are used as the three subkeys H, H<sub>2</sub>, and M. The following keystream chunks Z[3], Z[4], ..., Z[n + 2] are used to encrypt the plaintext. Instead of GHASH <xref target="GCM"/>, GCM-SST makes use of the POLYVAL function from AES-GCM-SIV <xref target="RFC8452"/>, which results in more efficient software implementations on little-endian architectures. GHASH and POLYVAL can be defined in terms of one another <xref target="RFC8452"/>. The subkeys H and H<sub>2</sub> are field elements used in POLYVAL while the subkey M is used for the final masking of the tag. Both encryption and decryption are only defined on inputs that are a whole number of octets. Figures illustrating the GCM-SST encryption and decryption functions can be found in <xref target="SST1"/>, <xref target="SST2"/>, and <xref target="Inoue"/>.</t>
      <t>For every computational procedure that is specified in this document, a conforming implementation <bcp14>MAY</bcp14> replace the given set of steps with any mathematically equivalent set of steps. In other words, different procedures that produce the correct output for every input are permitted.</t>
      <section anchor="authenticated-encryption-function">
        <name>Authenticated Encryption Function</name>
        <t>The encryption function Encrypt(K, N, A, P) encrypts a plaintext and returns the ciphertext along with an authentication tag that verifies the authenticity of the plaintext and associated data, if provided.</t>
        <t>Prerequisites and security:</t>
        <ul spacing="normal">
          <li>
            <t>The key <bcp14>MUST</bcp14> be randomly chosen from a uniform distribution.</t>
          </li>
          <li>
            <t>For a given key, a nonce <bcp14>MUST NOT</bcp14> be reused under any circumstances.</t>
          </li>
          <li>
            <t>Each key <bcp14>MUST</bcp14> be restricted to a single tag_length.</t>
          </li>
          <li>
            <t>Definitions of supported input-output lengths.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t>Key K (variable-length octet string)</t>
          </li>
          <li>
            <t>Nonce N (variable-length octet string)</t>
          </li>
          <li>
            <t>Associated data A (variable-length octet string)</t>
          </li>
          <li>
            <t>Plaintext P (variable-length octet string)</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t>Ciphertext ct (variable-length octet string)</t>
          </li>
          <li>
            <t>tag (octet string with length tag_length)</t>
          </li>
        </ul>
        <t>Steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the lengths of K, N, A, P are not supported return error and abort</t>
          </li>
          <li>
            <t>Initiate keystream generator with K and N</t>
          </li>
          <li>
            <t>Let H = Z[0], H<sub>2</sub> = Z[1], M = Z[2]</t>
          </li>
          <li>
            <t>Let ct = P ⊕ truncate(Z[3:n + 2], len(P))</t>
          </li>
          <li>
            <t>Let S = zeropad(A) || zeropad(ct)</t>
          </li>
          <li>
            <t>Let L = LE64(len(ct)) || LE64(len(A))</t>
          </li>
          <li>
            <t>Let X = POLYVAL(H, S[0], S[1], ...)</t>
          </li>
          <li>
            <t>Let full_tag = POLYVAL(H<sub>2</sub>, X ⊕ L) ⊕ M</t>
          </li>
          <li>
            <t>Let tag = truncate(full_tag, tag_length)</t>
          </li>
          <li>
            <t>Return (ct, tag)</t>
          </li>
        </ol>
        <t>The encoding of L aligns with existing implementations of GCM.</t>
      </section>
      <section anchor="authenticated-decryption-function">
        <name>Authenticated Decryption Function</name>
        <t>The decryption function Decrypt(K, N, A, ct, tag) decrypts a ciphertext, verifies that the authentication tag is correct, and returns the plaintext on success or an error if the tag verification failed.</t>
        <t>Prerequisites and security:</t>
        <ul spacing="normal">
          <li>
            <t>The calculation of the plaintext P (step 10) <bcp14>MAY</bcp14> be done in parallel with the tag verification (step 3-9). If the tag verification fails, the plaintext P and the expected_tag <bcp14>MUST NOT</bcp14> be given as output.</t>
          </li>
          <li>
            <t>Each key <bcp14>MUST</bcp14> be restricted to a single tag_length.</t>
          </li>
          <li>
            <t>Definitions of supported input-output lengths.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t>Key K (variable-length octet string)</t>
          </li>
          <li>
            <t>Nonce N (variable-length octet string)</t>
          </li>
          <li>
            <t>Associated data A (variable-length octet string)</t>
          </li>
          <li>
            <t>Ciphertext ct (variable-length octet string)</t>
          </li>
          <li>
            <t>tag (octet string with length tag_length)</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t>Plaintext P (variable-length octet string) or an error indicating that the authentication tag is invalid for the given inputs.</t>
          </li>
        </ul>
        <t>Steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the lengths of K, N, A, or ct are not supported, or if len(tag) ≠ tag_length return error and abort</t>
          </li>
          <li>
            <t>Initiate keystream generator with K and N</t>
          </li>
          <li>
            <t>Let H = Z[0], H<sub>2</sub> = Z[1], M = Z[2]</t>
          </li>
          <li>
            <t>Let S = zeropad(A) || zeropad(ct)</t>
          </li>
          <li>
            <t>Let L = LE64(len(ct)) || LE64(len(A))</t>
          </li>
          <li>
            <t>Let X = POLYVAL(H, S[0], S[1], ...)</t>
          </li>
          <li>
            <t>Let full_tag = POLYVAL(H<sub>2</sub>, X ⊕ L) ⊕ M</t>
          </li>
          <li>
            <t>Let expected_tag = truncate(full_tag, tag_length)</t>
          </li>
          <li>
            <t>If tag ≠ expected_tag, return error and abort</t>
          </li>
          <li>
            <t>Let P = ct ⊕ truncate(Z[3:n + 2], len(ct))</t>
          </li>
          <li>
            <t>If N passes replay protection, return P</t>
          </li>
        </ol>
        <t>The comparison of tag and expected_tag in step 9 <bcp14>MUST</bcp14> be performed in constant time to prevent any information leakage about the position of the first mismatched byte. For a given key, a plaintext <bcp14>MUST NOT</bcp14> be returned unless it is certain that a plaintext has not been returned for the same nonce. Replay protection can be performed either before step 1 or during step 11. Protocols with nonce-hiding mechanisms <xref target="Bellare"/>, such as QUIC <xref target="RFC9001"/>, implement replay protection after decryption to mitigate timing side-channel attacks.</t>
      </section>
      <section anchor="encoding-ct-tag-tuples">
        <name>Encoding (ct, tag) Tuples</name>
        <t>Applications <bcp14>MAY</bcp14> keep the ciphertext and the authentication tag in distinct structures or encode both as a single octet string C. In the latter case, the tag <bcp14>MUST</bcp14> immediately follow the ciphertext ct:</t>
        <t>C = ct || tag</t>
      </section>
    </section>
    <section anchor="AES-GCM-SST">
      <name>AES and Rijndael-256 in GCM-SST</name>
      <t>This section defines Advanced Encryption Standard (AES) and Rijndael with 256-bit keys and blocks (Rijndael-256) <xref target="Rijndael"/> in Galois Counter Mode with Strong Secure Tags.</t>
      <section anchor="aes-gcm-sst">
        <name>AES-GCM-SST</name>
        <t>When GCM-SSM is instantiated with AES (AES-GCM-SST), the keystream generator is AES in counter mode</t>
        <t>Z[i] = ENC(K, N || BE32(i))</t>
        <t>where ENC is the AES Cipher function <xref target="AES"/>. Big-endian counters align with existing implementations of AES in counter mode.</t>
      </section>
      <section anchor="rijndael-gcm-sst">
        <name>Rijndael-GCM-SST</name>
        <t>When GCM-SST is instantiated with Rijndael-256 (Rijndael-GCM-SST), the keystream generator is Rijndael-256 in counter mode</t>
        <t>Z[2i]   = ENC(K, N || BE32(i))[0]</t>
        <t>Z[2i+1] = ENC(K, N || BE32(i))[1]</t>
        <t>where ENC is the Rijndael-256 Cipher function <xref target="Rijndael"/>.</t>
      </section>
      <section anchor="instances">
        <name>AEAD Instances and Constraints</name>
        <t>We define nine AEAD instances, in the format of <xref target="RFC5116"/>, that use AES-GCM-SST and Rijndael-GCM-SST with tag lengths of 48, 96, and 112 bits. The key length and tag length are related to different security properties, and an application encrypting audio packets with short tags might require high confidentiality.</t>
        <table anchor="iana-algs">
          <name>AEAD Algorithms</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="right">K_LEN (bytes)</th>
              <th align="right">P_MAX = A_MAX (bytes)</th>
              <th align="right">tag_length (bits)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">AEAD_AES_128_GCM_SST_6</td>
              <td align="right">16</td>
              <td align="right">2<sup>36</sup> - 48</td>
              <td align="right">48</td>
            </tr>
            <tr>
              <td align="left">AEAD_AES_128_GCM_SST_12</td>
              <td align="right">16</td>
              <td align="right">2<sup>35</sup></td>
              <td align="right">96</td>
            </tr>
            <tr>
              <td align="left">AEAD_AES_128_GCM_SST_14</td>
              <td align="right">16</td>
              <td align="right">2<sup>19</sup></td>
              <td align="right">112</td>
            </tr>
            <tr>
              <td align="left">AEAD_AES_256_GCM_SST_6</td>
              <td align="right">32</td>
              <td align="right">2<sup>36</sup> - 48</td>
              <td align="right">48</td>
            </tr>
            <tr>
              <td align="left">AEAD_AES_256_GCM_SST_12</td>
              <td align="right">32</td>
              <td align="right">2<sup>35</sup></td>
              <td align="right">96</td>
            </tr>
            <tr>
              <td align="left">AEAD_AES_256_GCM_SST_14</td>
              <td align="right">32</td>
              <td align="right">2<sup>19</sup></td>
              <td align="right">112</td>
            </tr>
            <tr>
              <td align="left">AEAD_RIJNDAEL_GCM_SST_6</td>
              <td align="right">32</td>
              <td align="right">2<sup>36</sup> - 48</td>
              <td align="right">48</td>
            </tr>
            <tr>
              <td align="left">AEAD_RIJNDAEL_GCM_SST_12</td>
              <td align="right">32</td>
              <td align="right">2<sup>35</sup></td>
              <td align="right">96</td>
            </tr>
            <tr>
              <td align="left">AEAD_RIJNDAEL_GCM_SST_14</td>
              <td align="right">32</td>
              <td align="right">2<sup>19</sup></td>
              <td align="right">112</td>
            </tr>
          </tbody>
        </table>
        <t>Common parameters for the six AEAD instances:</t>
        <ul spacing="normal">
          <li>
            <t>N_MIN = N_MAX (minimum and maximum size of the nonce) is 12 octets for AES, while for Rijndael-256, it is 28 bytes.</t>
          </li>
          <li>
            <t>C_MAX (maximum size of the ciphertext and tag) is P_MAX + tag_length (in bytes)</t>
          </li>
          <li>
            <t>Q_MAX (maximum number of invocations of the encryption function) is 2<sup>32</sup> for AES-GCM-SST, while for Rijndael-GCM-SST, it is 2<sup>88</sup>.</t>
          </li>
          <li>
            <t>V_MAX (maximum number of invocations of the decryption function) is 2<sup>48</sup> for AES-GCM-SST, while for Rijndael-GCM-SST, it is 2<sup>88</sup>.</t>
          </li>
        </ul>
        <t>The maximum size of the plaintext (P_MAX) and the maximum size of the associated data (A_MAX) have been lowered from GCM <xref target="RFC5116"/>. To enable forgery probability close to ideal, even with maximum size plaintexts and associated data, we set P_MAX = A_MAX = min(2<sup>131 - tag_length</sup>, 2<sup>36</sup> - 48). Protocols that employ GCM-SST <bcp14>MAY</bcp14> impose stricter limits on P_MAX and A_MAX. Just like <xref target="RFC5116"/>, AES-GCM-SST and Rijndael-GCM-SST only allow a fixed nonce length (N_MIN = N_MAX) of 96 bits and 224 bits, respectively. For the AEAD algorithms in <xref target="iana-algs"/> the worst-case forgery probability is bounded by ≈ 1 / 2<sup>tag_length</sup> <xref target="Nyberg"/>. This is true for all allowed plaintext and associated data lengths.</t>
        <t>The V_MAX constraint ensures that the Bernstein bound factor is δ ≈ 1 for AES-GCM-SST in protocols where ℓ ≈ 2<sup>12</sup>, such as QUIC <xref target="RFC9000"/>, and always δ ≈ 1 for Rijndael-GCM-SST. In addition to restricting the Bernstein bound factor, the Q_MAX constraint establishes a minimum threshold for the complexity of distinguishing attacks. Since encryption and decryption queries play an equivalent role in the Bernstein bound, it follows that Q_MAX ≤ V_MAX. Protocols that employ GCM-SST <bcp14>MAY</bcp14> impose stricter limits on Q_MAX and V_MAX.</t>
        <t>Protocols utilizing AES-GCM-SST <bcp14>MUST</bcp14> enforce stricter limits P_MAX, A_MAX, Q_MAX, and/or V_MAX to ensure that (P_MAX + A_MAX) ⋅ (Q_MAX + V_MAX) ⪅ 2<sup>66</sup>. This ensures that δ ≈ 1.</t>
        <t>Refer to Sections <xref target="Int" format="counter"/>, <xref target="Conf" format="counter"/>, and <xref target="Comp" format="counter"/> for further details.</t>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>GCM-SST introduces an additional subkey H<sub>2</sub>, alongside the subkey H. The inclusion of H<sub>2</sub> enables truncated tags with forgery probabilities close to ideal. Both H and H<sub>2</sub> are derived for each nonce, which significantly decreases the probability of multiple successful forgeries. These changes are based on proven theoretical constructions and follows the recommendations in <xref target="Nyberg"/>. Inoue et al. <xref target="Inoue"/> prove that GCM-SST is a provably secure authenticated encryption mode, with security guaranteed for evaluations under fresh nonces, even if some earlier nonces have been reused.</t>
      <t>GCM-SST is designed for use in security protocols with replay protection. Every key <bcp14>MUST</bcp14> be randomly chosen from a uniform distribution. GCM-SST <bcp14>MUST</bcp14> be used in a nonce-respecting setting: for a given key, a nonce <bcp14>MUST</bcp14> only be used once in the encryption function and only once in a successful decryption function call. The nonce <bcp14>MAY</bcp14> be public or predictable. It can be a counter, the output of a permutation, or a generator with a long period. GCM-SST <bcp14>MUST NOT</bcp14> be used with random nonces <xref target="Collision"/> and <bcp14>MUST</bcp14> be used with replay protection. Reuse of nonces in successful encryption and decryption function calls enable universal forgery <xref target="Lindell"/><xref target="Inoue"/>. For a given tag length, GCM-SST has strictly better security properties than GCM. GCM allows universal forgery with lower complexity than GCM-SST, even when nonces are not reused. Implementations <bcp14>SHOULD</bcp14> add randomness to the nonce by XORing a unique number like a sequence number with a per-key random secret salt of the same length as the nonce. This significantly improves security against precomputation attacks and multi-key attacks <xref target="Bellare"/> and is for example implemented in TLS 1.3 <xref target="RFC8446"/>, OSCORE <xref target="RFC8613"/>, and <xref target="Ascon"/>. By increasing the nonce length from 96 bits to 224 bits, Rijndael-GCM-SST can offer significantly greater security against precomputation and multi-key attacks compared to AES-256-GCM-SST.</t>
      <t>Refer to <xref target="onemany"/> for considerations on using GCM-SST in multicast or broadcast scenarios. Unless otherwise specified, formulas for expected number of forgeries apply to unicast scenarios.</t>
      <section anchor="Int">
        <name>Integrity</name>
        <t>The GCM-SST tag_length <bcp14>SHOULD NOT</bcp14> be smaller than 4 bytes and cannot be larger than 16 bytes. Let ℓ = (P_MAX + A_MAX) / 16 + 1. When tag_length &lt; 128 - log2(ℓ) bits, the worst-case forgery probability is bounded by ≈ 1 / 2<sup>tag_length</sup> <xref target="Nyberg"/>. The tags in the AEAD algorithms listed in <xref target="instances"/> therefore have an almost perfect security level. This is significantly better than GCM where the security level is only tag_length - log2(ℓ) bits <xref target="GCM"/>. For a graph of the forgery probability, refer to Fig. 3 in <xref target="Inoue"/>. As one can note, for 128-bit tags and long messages, the forgery probability is not close to ideal and similar to GCM <xref target="GCM"/>. If tag verification fails, the plaintext and expected_tag <bcp14>MUST NOT</bcp14> be given as output. In GCM-SST, the full_tag is independent of the specified tag length unless the application explicitly incorporates tag length into the keystream or the nonce.</t>
        <t>The expected number of forgeries, when tag_length &lt; 128 - log2(ℓ) bits, depends on the keystream generator. For an ideal keystream generator, the expected number of forgeries is ≈ v / 2<sup>tag_length</sup>, where v is the number of decryption queries, which is ideal. For AES-GCM-SST, the expected number of forgeries is ≈ δ<sub>128</sub> ⋅ v / 2<sup>tag_length</sup>, where the Bernstein bound factor δ<sub>b</sub> ⪅ 1 + (q + v)<sup>2</sup> ⋅ ℓ<sup>2</sup> / 2<sup>b+1</sup>, which is ideal when δ<sub>128</sub> ≈ 1. This far outperforms AES-GCM, where the expected number of forgeries is ≈ δ<sub>128</sub> ⋅ v<sup>2</sup> ⋅ ℓ / 2<sup>tag_length+1</sup>. For Rijndael-GCM-SST, the expected number of forgeries is ≈ δ<sub>256</sub> ⋅ v / 2<sup>tag_length</sup> ≈ v / 2<sup>tag_length</sup>, which is ideal. For further details on the integrity advantages and expected number of forgeries for GCM and GCM-SST, see <xref target="Iwata"/>, <xref target="Inoue"/>, <xref target="Bernstein"/>, and <xref target="Multiple"/>. BSI states that an ideal MAC with a 96-bit tag length is considered acceptable for most applications <xref target="BSI"/>, a requirement that GCM-SST with 96-bit tags satisfies when δ ≈ 1. Achieving a comparable level of security with GCM, CCM, or Poly1305 is nearly impossible.</t>
      </section>
      <section anchor="Conf">
        <name>Confidentiality</name>
        <t>The confidentiality offered by GCM-SST against passive attackers depends on the keystream generator. For block ciphers in counter mode it is determined by the birthday bound, with AES-based ciphers particularly constrained by their narrow 128-bit block size. For AES-GCM-SST, the confidentiality is equal to AES-GCM <xref target="GCM"/>. Regardless of key length, an attacker can mount a distinguishing attack with a complexity of approximately 2<sup>129</sup> / σ, where σ ⪅ P_MAX ⋅ Q_MAX / 16 is is the total plaintext length measured in 128-bit chunks. In contrast, the confidentiality offered by Rijndael-GCM-SST against passive attackers is significantly higher. The complexity of distinguishing attacks for Rijndael-GCM-SST is approximately 2<sup>258</sup> / σ. McGrew, Leurent, and Sibleyras <xref target="Impossible"/><xref target="Difference"/> demonstrate that for block ciphers in counter mode, an attacker with partial knowledge of the plaintext can execute plaintext-recovery attacks against counter mode with roughly the same complexity (up to logaritmic factors) as distinguishing attacks. This is not the case for stream ciphers, where many distinguishing attacks do not seem to facilitate plaintext recovery <xref target="Rose"/>. While Rijndael-256 in counter mode can provide 128-bit confidentiality for plaintexts much larger than 2<sup>36</sup> octets, GHASH and POLYVAL do not offer adequate integrity for long plaintexts. To ensure robust integrity for long plaintexts, an AEAD mode would need to replace POLYVAL with a MAC that has better security properties, such as a Carter-Wegman MAC in a larger field <xref target="Degabriele"/> or other alternatives such as <xref target="SMAC"/>.</t>
        <t>The confidentiality offered by AES-GCM-SST against active attackers is directly linked to the forgery probability. Depending on the protocol and application, forgeries can significantly compromise privacy, in addition to affecting integrity and authenticity. It <bcp14>MUST</bcp14> be assumed that attackers always receive feedback on the success or failure of their forgery attempts. Therefore, attacks on integrity, authenticity, and confidentiality <bcp14>MUST</bcp14> all be carefully evaluated when selecting an appropriate tag length.</t>
      </section>
      <section anchor="weak-keys">
        <name>Weak keys</name>
        <t>In general, there is a very small possibility in GCM-SST that either or both of the subkeys H and H<sub>2</sub> are zero, so called weak keys. If H is zero, the authentication tag depends only on the length of P and A and not on their content. If H<sub>2</sub> is zero, the authentication tag does not depend on P and A. Due to the masking with M, there are no obvious ways to detect this condition for an attacker, and the specification admits this possibility in favor of complicating the flow with additional checks and regeneration of values. In AES-GCM-SST, H and H<sub>2</sub> are generated with a permutation on different input, so H and H<sub>2</sub> cannot both be zero.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>The details of the replay protection mechanism is determined by the security protocol utilizing GCM-SST. If the nonce includes a sequence number, it can be used for replay protection. Alternatively, a separate sequence number can be used, provided there is a one-to-one mapping between sequence numbers and nonces. The choice of a replay protection mechanism depends on factors such as the expected degree of packet reordering, as well as protocol and implementation details. For examples of replay protection mechanisms, see <xref target="RFC4303"/> and <xref target="RFC6479"/>. Implementing replay protection by requiring ciphertexts to arrive in order and terminating the connection if a single decryption fails is <bcp14>NOT RECOMMENDED</bcp14> as this approach reduces robustness and availability while exposing the system to denial-of-service attacks <xref target="Robust"/>.</t>
      </section>
      <section anchor="Comp">
        <name>Comparison with ChaCha20-Poly1305 and AES-GCM</name>
        <t><xref target="comp1"/> compares the integrity of GCM-SST, ChaCha20-Poly1305 <xref target="RFC7539"/>, and AES-GCM <xref target="RFC5116"/> in unicast security protocols with replay protection, where v represents the number of decryption queries. In Poly1305 and GCM, the forgery probability depends on ℓ = (P_MAX + A_MAX) / 16 + 1. In AES-based algorithms, the Bernstein bound introduces a factor δ ⪅ 1 + (q + v)<sup>2</sup> ⋅ ℓ<sup>2</sup> / 2<sup>129</sup>. GCM-SST requires δ ≈ 1, a property not mandated by GCM. Notably, GCM does not provide any reforgeability resistance, which significantly increases the expected number of forgeries. Refer to <xref target="Procter"/>, <xref target="Iwata"/>, and <xref target="Multiple"/> for further details.</t>
        <table anchor="comp1">
          <name>Comparison of integrity among GCM-SST, ChaCha20-Poly1305, and AES-GCM in unicast security protocols with replay protection. v is the number of decryption queries, ℓ is the maximum length of plaintext and associated data, measured in 128-bit chunks, and δ is the Bernstein bound factor.</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="right">Forgery probability before first forgery</th>
              <th align="right">Forgery probability after first forgery</th>
              <th align="right">Expected number of forgeries</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">GCM_SST_14</td>
              <td align="right">1 / 2<sup>112</sup></td>
              <td align="right">1 / 2<sup>112</sup></td>
              <td align="right">v / 2<sup>112</sup></td>
            </tr>
            <tr>
              <td align="left">GCM_SST_12</td>
              <td align="right">1 / 2<sup>96</sup></td>
              <td align="right">1 / 2<sup>96</sup></td>
              <td align="right">v / 2<sup>96</sup></td>
            </tr>
            <tr>
              <td align="left">POLY1305</td>
              <td align="right">ℓ / 2<sup>103</sup></td>
              <td align="right">ℓ / 2<sup>103</sup></td>
              <td align="right">v ⋅ ℓ / 2<sup>103</sup></td>
            </tr>
            <tr>
              <td align="left">GCM</td>
              <td align="right">ℓ / 2<sup>128</sup></td>
              <td align="right">1</td>
              <td align="right">δ ⋅ v<sup>2</sup> ⋅ ℓ / 2<sup>129</sup></td>
            </tr>
          </tbody>
        </table>
        <t><xref target="comp2"/> compares the integrity of GCM-SST, ChaCha20-Poly1305 <xref target="RFC7539"/>, and AES-GCM <xref target="RFC5116"/> in unicast QUIC <xref target="RFC9000"/><xref target="RFC9001"/>, a security protocol with mandatory replay protection, and where the combined size of plaintext and associated data is less than ≈ 2<sup>16</sup> bytes (ℓ ≈ 2<sup>12</sup>). GCM_SST_14 and GCM_SST_12 provide better integrity than ChaCha20-Poly1305 <xref target="RFC7539"/> and AES-GCM <xref target="RFC5116"/>, while also reducing overhead by 2–4 bytes. For GCM-SST and ChaCha20-Poly1305, the expected number of forgeries is linear in v when replay protection is employed. ChaCha20-Poly1305 achieves a security level equivalent to that of an ideal MAC with a length of 91 bits. For AES-GCM, replay protection does not mitigate reforgeries, the expected number of forgeries grows quadratically with v, and GCM provides significantly worse integrity than GCM-SST and ChaCha20-Poly1305 unless v is kept very small. With v = 2<sup>52</sup> as allowed for AES-GCM in QUIC <xref target="RFC9001"/>, the expected number of forgeries for AES-GCM is equivalent to that of an ideal MAC with a length of 64.4 bits. The effective tag length of AES-GCM in QUIC is 117 - log2(δ ⋅ v).</t>
        <table anchor="comp2">
          <name>Comparison of integrity among GCM-SST, ChaCha20-Poly1305, and AES-GCM in unicast QUIC, where the maximum packet size is 65536 bytes.</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="right">Tag length (bytes)</th>
              <th align="right">Forgery probability before first forgery</th>
              <th align="right">Forgery probability after first forgery</th>
              <th align="right">Expected number of forgeries</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">GCM_SST_14</td>
              <td align="right">14</td>
              <td align="right">1 / 2<sup>112</sup></td>
              <td align="right">1 / 2<sup>112</sup></td>
              <td align="right">v / 2<sup>112</sup></td>
            </tr>
            <tr>
              <td align="left">GCM_SST_12</td>
              <td align="right">12</td>
              <td align="right">1 / 2<sup>96</sup></td>
              <td align="right">1 / 2<sup>96</sup></td>
              <td align="right">v / 2<sup>96</sup></td>
            </tr>
            <tr>
              <td align="left">POLY1305</td>
              <td align="right">16</td>
              <td align="right">1 / 2<sup>91</sup></td>
              <td align="right">1 / 2<sup>91</sup></td>
              <td align="right">v / 2<sup>91</sup></td>
            </tr>
            <tr>
              <td align="left">GCM</td>
              <td align="right">16</td>
              <td align="right">1 / 2<sup>116</sup></td>
              <td align="right">1</td>
              <td align="right">δ ⋅ v<sup>2</sup> / 2<sup>117</sup></td>
            </tr>
          </tbody>
        </table>
        <t><xref target="comp3"/> compares the confidentiality of Rijndael-GCM-SST, AES-256-GCM-SST, SNOW 5G-GCM-SST, and ChaCha20-Poly1305 <xref target="RFC7539"/>, all of which use 256-bit keys, against passive attackers. The confidentiality of block ciphers in counter mode is determined by the birthday bound, with AES-based ciphers particularly constrained by their narrow 128-bit block size. Even under the strict usage limits defined by QUIC <xref target="RFC9001"/> (P_MAX = 2<sup>16</sup> and Q_MAX = 2<sup>23</sup>), AES-256-GCM-SST provides only 94 bits of security against distinguishing attacks. Plaintext-recovery attacks on block ciphers in counter mode have a complexity similar to distinguishing attacks, see <xref target="Impossible"/> and <xref target="Difference"/>.</t>
        <table anchor="comp3">
          <name>Comparison of confidentiality against passive attackers among Rijndael-GCM-SST, SNOW 5G-GCM-SST, ChaCha20-Poly1305, and AES-256-GCM. σ is is the total plaintext length measured in 128-bit chunks.</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="center">Key size (bits)</th>
              <th align="center">Complexity of distinguishing attacks</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">CHACHA20_POLY1305</td>
              <td align="center">256</td>
              <td align="center">2<sup>256</sup></td>
            </tr>
            <tr>
              <td align="left">SNOW_5G_GCM_SST</td>
              <td align="center">256</td>
              <td align="center">2<sup>256</sup></td>
            </tr>
            <tr>
              <td align="left">RIJNDAEL_GCM_SST</td>
              <td align="center">256</td>
              <td align="center">≈ 2<sup>258</sup> / σ</td>
            </tr>
            <tr>
              <td align="left">AES_256_GCM_SST</td>
              <td align="center">256</td>
              <td align="center">≈ 2<sup>129</sup> / σ</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="onemany">
        <name>Multicast and Broadcast</name>
        <t>While GCM-SST offers stronger security properties than GCM for a given tag length in multicast or broadcast contexts, it does not behave exactly like an ideal MAC. With an ideal MAC, a successful forgery against one recipient allows the attacker to reuse the same forgery against all other recipients. In contrast, with GCM, a successful forgery against one recipient enables the attacker to generate an unlimited number of new forgeries for all recipients.</t>
        <t>With GCM-SST, a few successful forgeries against a few recipients allow the attacker to create one new forgery per recipient. While the total number of forgeries in GCM-SST matches that of an ideal MAC, the diversity of these forgeries is higher. To achieve one distinct forgery per recipient with an ideal MAC, the attacker would need to send on average 2<sup>tag_length</sup> forgery attempts to each recipient. GCM-SST performs equally well or better than an ideal MAC with length tag_length - log2(r), where r is the number of recipients. Thus, in one-to-many scenarios with replay protection, the expected number of distinct forgeries is ≈ v ⋅ r / 2<sup>tag_length</sup>, and the effective tag length of GCM-SST is tag_length - log2(r).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign the entries in the first column of <xref target="iana-algs"/> to the "AEAD Algorithms" registry under the "Authenticated Encryption with Associated Data (AEAD) Parameters" heading with this document as reference.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC8452">
          <front>
            <title>AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</title>
            <author fullname="S. Gueron" initials="S." surname="Gueron"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="Y. Lindell" initials="Y." surname="Lindell"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This memo specifies two authenticated encryption algorithms that are nonce misuse resistant -- that is, they do not fail catastrophically if a nonce is repeated.</t>
              <t>This document is the product of the Crypto Forum Research Group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8452"/>
          <seriesInfo name="DOI" value="10.17487/RFC8452"/>
        </reference>
        <reference anchor="AES" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf">
          <front>
            <title>Advanced Encryption Standard (AES)</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May"/>
          </front>
          <seriesInfo name="NIST" value="Federal Information Processing Standards Publication 197"/>
        </reference>
        <reference anchor="Rijndael" target="https://csrc.nist.gov/csrc/media/projects/cryptographic-standards-and-guidelines/documents/aes-development/rijndael-ammended.pdf">
          <front>
            <title>AES Proposal: Rijndael</title>
            <author initials="" surname="Joan Daemen">
              <organization/>
            </author>
            <author initials="" surname="Vincent Rijmen">
              <organization/>
            </author>
            <date year="2003" month="September"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC6479">
          <front>
            <title>IPsec Anti-Replay Algorithm without Bit Shifting</title>
            <author fullname="X. Zhang" initials="X." surname="Zhang"/>
            <author fullname="T. Tsou" initials="T." surname="Tsou"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document presents an alternate method to do the anti-replay checks and updates for IP Authentication Header (AH) and Encapsulating Security Protocol (ESP). The method defined in this document obviates the need for bit shifting and it reduces the number of times an anti-replay window is adjusted. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6479"/>
          <seriesInfo name="DOI" value="10.17487/RFC6479"/>
        </reference>
        <reference anchor="RFC7539">
          <front>
            <title>ChaCha20 and Poly1305 for IETF Protocols</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document defines the ChaCha20 stream cipher as well as the use of the Poly1305 authenticator, both as stand-alone algorithms and as a "combined mode", or Authenticated Encryption with Associated Data (AEAD) algorithm.</t>
              <t>This document does not introduce any new crypto, but is meant to serve as a stable reference and an implementation guide. It is a product of the Crypto Forum Research Group (CFRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7539"/>
          <seriesInfo name="DOI" value="10.17487/RFC7539"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9605">
          <front>
            <title>Secure Frame (SFrame): Lightweight Authenticated Encryption for Real-Time Media</title>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="S. G. Murillo" initials="S. G." surname="Murillo"/>
            <author fullname="R. Barnes" initials="R." role="editor" surname="Barnes"/>
            <author fullname="Y. Fablet" initials="Y." surname="Fablet"/>
            <date month="August" year="2024"/>
            <abstract>
              <t>This document describes the Secure Frame (SFrame) end-to-end encryption and authentication mechanism for media frames in a multiparty conference call, in which central media servers (Selective Forwarding Units or SFUs) can access the media metadata needed to make forwarding decisions without having access to the actual media.</t>
              <t>This mechanism differs from the Secure Real-Time Protocol (SRTP) in that it is independent of RTP (thus compatible with non-RTP media transport) and can be applied to whole media frames in order to be more bandwidth efficient.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9605"/>
          <seriesInfo name="DOI" value="10.17487/RFC9605"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-15"/>
        </reference>
        <reference anchor="UIA2" target="https://www.gsma.com/solutions-and-impact/technologies/security/wp-content/uploads/2019/05/uea2uia2d1v21.pdf">
          <front>
            <title>UEA2 and UIA2 Specification</title>
            <author initials="" surname="ETSI SAGE">
              <organization/>
            </author>
            <date year="2009" month="March"/>
          </front>
        </reference>
        <reference anchor="EIA3" target="https://www.gsma.com/solutions-and-impact/technologies/security/wp-content/uploads/2019/05/EEA3_EIA3_specification_v1_8.pdf">
          <front>
            <title>128-EEA3 and 128-EIA3 Specification</title>
            <author initials="" surname="ETSI SAGE">
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.html">
          <front>
            <title>Cryptographic Mechanisms Recommendations and Key Lengths</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="February"/>
          </front>
          <seriesInfo name="BSI" value="Technical Guideline TR-02102-1"/>
        </reference>
        <reference anchor="Multiple" target="https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/comments/cwc-gcm/multi-forge-01.pdf">
          <front>
            <title>Multiple Forgery Attacks Against Message Authentication Codes</title>
            <author initials="" surname="David McGrew">
              <organization/>
            </author>
            <author initials="" surname="Scott Fluhrer">
              <organization/>
            </author>
            <date year="2005" month="May"/>
          </front>
        </reference>
        <reference anchor="Difference" target="https://link.springer.com/chapter/10.1007/978-3-319-78375-8_24">
          <front>
            <title>The Missing Difference Problem, and Its Applications to Counter Mode Encryption</title>
            <author initials="" surname="Gaëtan Leurent">
              <organization/>
            </author>
            <author initials="" surname="Ferdinand Sibleyras">
              <organization/>
            </author>
            <date year="2018" month="March"/>
          </front>
        </reference>
        <reference anchor="Impossible" target="https://eprint.iacr.org/2012/623.pdf">
          <front>
            <title>Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes</title>
            <author initials="" surname="David McGrew">
              <organization/>
            </author>
            <date year="2012" month="November"/>
          </front>
        </reference>
        <reference anchor="Rose" target="https://eprint.iacr.org/2002/142.pdf">
          <front>
            <title>On the Applicability of Distinguishing Attacks Against Stream Ciphers</title>
            <author initials="" surname="Greg Rose">
              <organization/>
            </author>
            <author initials="" surname="Philip Hawkes">
              <organization/>
            </author>
            <date year="2002" month="September"/>
          </front>
        </reference>
        <reference anchor="Reforge" target="https://eprint.iacr.org/2017/332.pdf">
          <front>
            <title>Reforgeability of Authenticated Encryption Schemes</title>
            <author initials="" surname="Christian Forler">
              <organization/>
            </author>
            <author initials="" surname="Eik List">
              <organization/>
            </author>
            <author initials="" surname="Stefan Lucks">
              <organization/>
            </author>
            <author initials="" surname="akob Wenzel">
              <organization/>
            </author>
            <date year="2017" month="April"/>
          </front>
        </reference>
        <reference anchor="Inoue" target="https://eprint.iacr.org/2024/1928.pdf">
          <front>
            <title>Generic Security of GCM-SST</title>
            <author initials="" surname="Akiko Inoue">
              <organization/>
            </author>
            <author initials="" surname="Ashwin Jha">
              <organization/>
            </author>
            <author initials="" surname="Bart Mennink">
              <organization/>
            </author>
            <author initials="" surname="Kazuhiko Minematsu">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="Iwata" target="https://eprint.iacr.org/2012/438.pdf">
          <front>
            <title>Breaking and Repairing GCM Security Proofs</title>
            <author initials="" surname="Tetsu Iwata">
              <organization/>
            </author>
            <author initials="" surname="Keisuke Ohashi">
              <organization/>
            </author>
            <author initials="" surname="Kazuhiko Minematsu">
              <organization/>
            </author>
            <date year="2012" month="August"/>
          </front>
        </reference>
        <reference anchor="Bernstein" target="https://cr.yp.to/antiforgery/permutations-20050323.pdf">
          <front>
            <title>Stronger Security Bounds for Permutations</title>
            <author initials="" surname="Daniel J Bernstein">
              <organization/>
            </author>
            <date year="2005" month="March"/>
          </front>
        </reference>
        <reference anchor="Ducker" target="https://rd.springer.com/chapter/10.1007/978-3-030-97652-1_18">
          <front>
            <title>Software Optimization of Rijndael for Modern x86-64 Platforms</title>
            <author initials="" surname="Nir Drucker">
              <organization/>
            </author>
            <author initials="" surname="Shay Gueron">
              <organization/>
            </author>
            <date year="2022" month="May"/>
          </front>
        </reference>
        <reference anchor="Bellare" target="https://eprint.iacr.org/2016/564.pdf">
          <front>
            <title>The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3</title>
            <author initials="M." surname="Bellare">
              <organization/>
            </author>
            <author initials="B." surname="Tackmann">
              <organization/>
            </author>
            <date year="2017" month="November"/>
          </front>
        </reference>
        <reference anchor="Procter" target="https://eprint.iacr.org/2014/613.pdf">
          <front>
            <title>A Security Analysis of the Composition of ChaCha20 and Poly1305</title>
            <author initials="" surname="Gordon Procter">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="SAGE23" target="https://www.3gpp.org/ftp/TSG_SA/WG3_Security/TSGS3_110_Athens/docs/S3-230642.zip">
          <front>
            <title>Specification of the 256-bit air interface algorithms</title>
            <author initials="" surname="ETSI SAGE">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
        </reference>
        <reference anchor="SAGE24" target="https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_117_Maastricht/docs/S3-243394.zip">
          <front>
            <title>Version 2.0 of 256-bit Confidentiality and Integrity Algorithms for the Air Interface</title>
            <author initials="" surname="ETSI SAGE">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="WID23" target="https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_113_Chicago/Docs/S3-235072.zip">
          <front>
            <title>New WID on Milenage-256 algorithm</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="WID24" target="https://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_103_Maastricht_2024-03/Docs/SP-240476.zip">
          <front>
            <title>New WID on Addition of 256-bit security Algorithms</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="ZUC" target="https://eprint.iacr.org/2021/1439">
          <front>
            <title>An Addendum to the ZUC-256 Stream Cipher</title>
            <author initials="" surname="ZUC Design Team">
              <organization/>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="Plans" target="https://csrc.nist.gov/pubs/sp/800/197/iprd">
          <front>
            <title>NIST Proposes to Standardize a Wider Variant of AES</title>
            <author initials="" surname="NIST">
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="Comments38B" target="https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38b-initial-public-comments-2024.pdf">
          <front>
            <title>Public Comments on SP 800-38B</title>
            <author initials="" surname="NIST">
              <organization/>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="Sec5G" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP TS 33 501">
              <organization/>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="PDCP" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3196">
          <front>
            <title>NR; Packet Data Convergence Protocol (PDCP) specification</title>
            <author initials="" surname="3GPP TS 38 323">
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="Collision" target="https://eprint.iacr.org/2021/236">
          <front>
            <title>Collision Attacks on Galois/Counter Mode (GCM)</title>
            <author initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="Lindell" target="https://mailarchive.ietf.org/arch/browse/cfrg/?gbt=1&amp;index=cWpv0QgX2ltkWhtd3R9pEW7E1CA">
          <front>
            <title>Comment on AES-GCM-SST</title>
            <author initials="Y." surname="Lindell">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="Degabriele" target="https://doi.org/10.3929/ethz-b-000654260">
          <front>
            <title>SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields</title>
            <author initials="J." surname="Degabriele">
              <organization/>
            </author>
            <author initials="J." surname="Gilcher">
              <organization/>
            </author>
            <author initials="J." surname="Govinden">
              <organization/>
            </author>
            <author initials="K." surname="Paterson">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="SMAC" target="https://eprint.iacr.org/2024/819">
          <front>
            <title>A new stand-alone MAC construct called SMAC</title>
            <author initials="D." surname="Wang">
              <organization/>
            </author>
            <author initials="A." surname="Maximov">
              <organization/>
            </author>
            <author initials="P." surname="Ekdahl">
              <organization/>
            </author>
            <author initials="T." surname="Johansson">
              <organization/>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="AEZ" target="https://eprint.iacr.org/2014/793.pdf">
          <front>
            <title>Robust Authenticated-Encryption: AEZ and the Problem that it Solves</title>
            <author initials="" surname="Viet Tung Hoang">
              <organization/>
            </author>
            <author initials="" surname="Ted Krovetz">
              <organization/>
            </author>
            <author initials="" surname="Phillip Rogaway">
              <organization/>
            </author>
            <date year="2017" month="March"/>
          </front>
        </reference>
        <reference anchor="Robust" target="https://link.springer.com/article/10.1007/s00145-023-09489-9">
          <front>
            <title>Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3</title>
            <author initials="M." surname="Fischlin">
              <organization/>
            </author>
            <author initials="F." surname="Günther">
              <organization/>
            </author>
            <author initials="C." surname="Janson">
              <organization/>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="MoQ" target="https://datatracker.ietf.org/wg/moq/about/">
          <front>
            <title>Media Over QUIC</title>
            <author initials="" surname="IETF">
              <organization/>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="Revise" target="https://csrc.nist.gov/news/2023/proposal-to-revise-sp-800-38d">
          <front>
            <title>Announcement of Proposal to Revise SP 800-38D</title>
            <author initials="" surname="NIST">
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
        </reference>
        <reference anchor="SNOW" target="https://eprint.iacr.org/2021/236">
          <front>
            <title>SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs</title>
            <author initials="P." surname="Ekdahl">
              <organization/>
            </author>
            <author initials="T." surname="Johansson">
              <organization/>
            </author>
            <author initials="A." surname="Maximov">
              <organization/>
            </author>
            <author initials="J." surname="Yang">
              <organization/>
            </author>
            <date year="2021" month="March"/>
          </front>
        </reference>
        <reference anchor="SST1" target="https://csrc.nist.gov/csrc/media/Events/2023/third-workshop-on-block-cipher-modes-of-operation/documents/accepted-papers/Galois%20Counter%20Mode%20with%20Secure%20Short%20Tags.pdf">
          <front>
            <title>Galois Counter Mode with Strong Secure Tags (GCM-SST)</title>
            <author initials="M." surname="Campagna">
              <organization/>
            </author>
            <author initials="A." surname="Maximov">
              <organization/>
            </author>
            <author initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <date year="2023" month="October"/>
          </front>
        </reference>
        <reference anchor="SST2" target="https://csrc.nist.gov/csrc/media/Presentations/2023/galois-counter-mode-with-secure-short-tags/images-media/sess-5-mattsson-bcm-workshop-2023.pdf">
          <front>
            <title>Galois Counter Mode with Strong Secure Tags (GCM-SST)</title>
            <author initials="M." surname="Campagna">
              <organization/>
            </author>
            <author initials="A." surname="Maximov">
              <organization/>
            </author>
            <author initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <date year="2023" month="October"/>
          </front>
        </reference>
        <reference anchor="GCM" target="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf">
          <front>
            <title>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</title>
            <author initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007" month="November"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-38D"/>
        </reference>
        <reference anchor="Ascon" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-232.ipd.pdf">
          <front>
            <title>Ascon-Based Lightweight Cryptography Standards for Constrained Devices</title>
            <author initials="" surname="Meltem Sönmez Turan">
              <organization/>
            </author>
            <author initials="" surname="Kerry A McKay">
              <organization/>
            </author>
            <author initials="" surname="Donghoon Chang">
              <organization/>
            </author>
            <author initials="" surname="Jinkeon Kang">
              <organization/>
            </author>
            <author initials="" surname="John Kelsey">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-232 Initial Public Draft"/>
        </reference>
        <reference anchor="GCM-Update" target="https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/comments/cwc-gcm/gcm-update.pdf">
          <front>
            <title>GCM Update</title>
            <author initials="D." surname="McGrew">
              <organization/>
            </author>
            <author initials="J." surname="Viega">
              <organization/>
            </author>
            <date year="2005" month="May"/>
          </front>
        </reference>
        <reference anchor="Gueron" target="https://csrc.nist.gov/csrc/media/Presentations/2023/constructions-based-on-the-aes-round/images-media/sess-5-gueron-bcm-workshop-2023.pdf">
          <front>
            <title>Constructions based on the AES Round and Polynomial Multiplication that are Efficient on Modern Processor Architectures</title>
            <author initials="S." surname="Gueron">
              <organization/>
            </author>
            <date year="2023" month="October"/>
          </front>
        </reference>
        <reference anchor="Ferguson" target="https://csrc.nist.gov/CSRC/media/Projects/Block-Cipher-Techniques/documents/BCM/Comments/CWC-GCM/Ferguson2.pdf">
          <front>
            <title>Authentication weaknesses in GCM</title>
            <author initials="N." surname="Ferguson">
              <organization/>
            </author>
            <date year="2005" month="May"/>
          </front>
        </reference>
        <reference anchor="Nyberg" target="https://csrc.nist.gov/CSRC/media/Projects/Block-Cipher-Techniques/documents/BCM/Comments/general-comments/papers/Nyberg_Gilbert_and_Robshaw.pdf">
          <front>
            <title>Galois MAC with forgery probability close to ideal</title>
            <author initials="K." surname="Nyberg">
              <organization/>
            </author>
            <author initials="H." surname="Gilbert">
              <organization/>
            </author>
            <author initials="M." surname="Robshaw">
              <organization/>
            </author>
            <date year="2005" month="June"/>
          </front>
        </reference>
        <reference anchor="Mattsson" target="https://eprint.iacr.org/2015/477.pdf">
          <front>
            <title>Authentication Key Recovery on Galois/Counter Mode (GCM)</title>
            <author initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author initials="M." surname="Westerlund">
              <organization/>
            </author>
            <date year="2015" month="May"/>
          </front>
        </reference>
        <reference anchor="Rogaway" target="https://www.cryptrec.go.jp/exreport/cryptrec-ex-2012-2010r1.pdf">
          <front>
            <title>Evaluation of Some Blockcipher Modes of Operation</title>
            <author initials="P." surname="Rogaway">
              <organization/>
            </author>
            <date year="2011" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 795?>

<section anchor="aes-gcm-sst-test-vectors">
      <name>AES-GCM-SST Test Vectors</name>
      <section anchor="aes-gcm-sst-test-1-128-bit-key">
        <name>AES-GCM-SST Test #1 (128-bit key)</name>
        <artwork><![CDATA[
         K = { 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f }
         N = { 30 31 32 33 34 35 36 37 38 39 3a 3b }
         H = { 22 ce 92 da cb 50 77 4b ab 0d 18 29 3d 6e ae 7f }
       H_2 = { 03 13 63 96 74 be fa 86 4d fa fb 80 36 b7 a0 3c }
         M = { 9b 1d 49 ea 42 b0 0a ec b0 bc eb 8d d0 ef c2 b9 }
]]></artwork>
        <section numbered="false" anchor="case-1a">
          <name>Case #1a</name>
          <artwork><![CDATA[
         A = { }
         P = { }
         L = { 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 }
  full_tag = { 9b 1d 49 ea 42 b0 0a ec b0 bc eb 8d d0 ef c2 b9 }
       tag = { 9b 1d 49 ea 42 b0 0a ec b0 bc eb 8d }
        ct = { }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-1b">
          <name>Case #1b</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 }
         P = { }
         L = { 00 00 00 00 00 00 00 00 28 00 00 00 00 00 00 00 }
  full_tag = { 7f f3 cb a4 d5 f3 08 a5 70 4e 2f d5 f2 3a e8 f9 }
       tag = { 7f f3 cb a4 d5 f3 08 a5 70 4e 2f d5 }
        ct = { }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-1c">
          <name>Case #1c</name>
          <artwork><![CDATA[
         A = { }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b }
         L = { 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 }
  full_tag = { f8 de 17 85 fd 1a 90 d9 81 8f cb 7b 44 69 8a 8b }
       tag = { f8 de 17 85 fd 1a 90 d9 81 8f cb 7b }
        ct = { 64 f0 5b ae 1e d2 40 3a 71 25 5e dd }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-1d">
          <name>Case #1d</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f
               70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e }
         L = { f8 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 }
  full_tag = { 93 43 56 14 0b 84 48 2c d0 14 c7 40 7e e9 cc b6 }
       tag = { 93 43 56 14 0b 84 48 2c d0 14 c7 40 }
        ct = { 64 f0 5b ae 1e d2 40 3a 71 25 5e dd 53 49 5c e1
               7d c0 cb c7 85 a7 a9 20 db 42 28 ff 63 32 10 }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-1e">
          <name>Case #1e</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f
               70 }
         L = { 88 00 00 00 00 00 00 00 78 00 00 00 00 00 00 00 }
  full_tag = { f8 50 b7 97 11 43 ab e9 31 5a d7 eb 3b 0a 16 81 }
       tag = { f8 50 b7 97 11 43 ab e9 31 5a d7 eb }
        ct = { 64 f0 5b ae 1e d2 40 3a 71 25 5e dd 53 49 5c e1
               7d }
]]></artwork>
        </section>
      </section>
      <section anchor="aes-gcm-sst-test-2-128-bit-key">
        <name>AES-GCM-SST Test #2 (128-bit key)</name>
        <artwork><![CDATA[
         K = { 29 23 be 84 e1 6c d6 ae 52 90 49 f1 f1 bb e9 eb }
         N = { 9a 50 ee 40 78 36 fd 12 49 32 f6 9e }
         A = { 1f 03 5a 7d 09 38 25 1f 5d d4 cb fc 96 f5 45 3b
               13 0d }
         P = { ad 4f 14 f2 44 40 66 d0 6b c4 30 b7 32 3b a1 22
               f6 22 91 9d }
         H = { 2d 6d 7f 1c 52 a7 a0 6b f2 bc bd 23 75 47 03 88 }
       H_2 = { 3b fd 00 96 25 84 2a 86 65 71 a4 66 e5 62 05 92 }
         M = { 9e 6c 98 3e e0 6c 1a ab c8 99 b7 8d 57 32 0a f5 }
         L = { a0 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 }
  full_tag = { 45 03 bf b0 96 82 39 b3 67 e9 70 c3 83 c5 10 6f }
       tag = { 45 03 bf b0 96 82 }
        ct = { b8 65 d5 16 07 83 11 73 21 f5 6c b0 75 45 16 b3
               da 9d b8 09 }
]]></artwork>
      </section>
      <section anchor="aes-gcm-sst-test-3-256-bit-key">
        <name>AES-GCM-SST Test #3 (256-bit key)</name>
        <artwork><![CDATA[
         K = { 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f
               10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f }
         N = { 30 31 32 33 34 35 36 37 38 39 3a 3b }
         H = { 3b d9 9f 8d 38 f0 2e a1 80 96 a4 b0 b1 d9 3b 1b }
       H_2 = { af 7f 54 00 16 aa b8 bc 91 56 d9 d1 83 59 cc e5 }
         M = { b3 35 31 c0 e9 6f 4a 03 2a 33 8e ec 12 99 3e 68 }
]]></artwork>
        <section numbered="false" anchor="case-3a">
          <name>Case #3a</name>
          <artwork><![CDATA[
         A = { }
         P = { }
         L = { 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 }
  full_tag = { b3 35 31 c0 e9 6f 4a 03 2a 33 8e ec 12 99 3e 68 }
       tag = { b3 35 31 c0 e9 6f 4a 03 2a 33 8e ec }
        ct = { }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-3b">
          <name>Case #3b</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 }
         P = { }
         L = { 00 00 00 00 00 00 00 00 28 00 00 00 00 00 00 00 }
  full_tag = { 63 ac ca 4d 20 9f b3 90 28 ff c3 17 04 01 67 61 }
       tag = { 63 ac ca 4d 20 9f b3 90 28 ff c3 17 }
        ct = { }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-3c">
          <name>Case #3c</name>
          <artwork><![CDATA[
         A = { }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b }
         L = { 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 }
  full_tag = { e1 de bf fd 5f 3a 85 e3 48 bd 6f cc 6e 62 10 90 }
       tag = { e1 de bf fd 5f 3a 85 e3 48 bd 6f cc }
        ct = { fc 46 2d 34 a7 5b 22 62 4f d7 3b 27 }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-3d">
          <name>Case #3d</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f
               70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e }
         L = { f8 00 00 00 00 00 00 00 80 00 00 00 00 00 00 00 }
  full_tag = { c3 5e d7 83 9f 21 f7 bb a5 a8 a2 8e 1f 49 ed 04 }
       tag = { c3 5e d7 83 9f 21 f7 bb a5 a8 a2 8e }
        ct = { fc 46 2d 34 a7 5b 22 62 4f d7 3b 27 84 de 10 51
               33 11 7e 17 58 b5 ed d0 d6 5d 68 32 06 bb ad }
]]></artwork>
        </section>
        <section numbered="false" anchor="case-3e">
          <name>Case #3e</name>
          <artwork><![CDATA[
         A = { 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e }
         P = { 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f
               70 }
         L = { 88 00 00 00 00 00 00 00 78 00 00 00 00 00 00 00 }
  full_tag = { 49 7c 14 77 67 a5 3d 57 64 ce fd 03 26 fe e7 b5 }
       tag = { 49 7c 14 77 67 a5 3d 57 64 ce fd 03 }
        ct = { fc 46 2d 34 a7 5b 22 62 4f d7 3b 27 84 de 10 51
               33 }
]]></artwork>
        </section>
      </section>
      <section anchor="aes-gcm-sst-test-4-256-bit-key">
        <name>AES-GCM-SST Test #4 (256-bit key)</name>
        <artwork><![CDATA[
         K = { 29 23 be 84 e1 6c d6 ae 52 90 49 f1 f1 bb e9 eb
               b3 a6 db 3c 87 0c 3e 99 24 5e 0d 1c 06 b7 b3 12 }
         N = { 9a 50 ee 40 78 36 fd 12 49 32 f6 9e }
         A = { 1f 03 5a 7d 09 38 25 1f 5d d4 cb fc 96 f5 45 3b
               13 0d }
         P = { ad 4f 14 f2 44 40 66 d0 6b c4 30 b7 32 3b a1 22
               f6 22 91 9d }
         H = { 13 53 4b f7 8a 91 38 fd f5 41 65 7f c2 39 55 23 }
       H_2 = { 32 69 75 a3 3a ff ae ac af a8 fb d1 bd 62 66 95 }
         M = { 59 48 44 80 b6 cd 59 06 69 27 5e 7d 81 4a d1 74 }
         L = { a0 00 00 00 00 00 00 00 90 00 00 00 00 00 00 00 }
  full-tag = { c4 a1 ca 9a 38 c6 73 af bf 9c 73 49 bf 3c d5 4d }
       tag = { c4 a1 ca 9a 38 c6 73 af bf 9c 73 49 bf 3c }
        ct = { b5 c2 a4 07 f3 3e 99 88 de c1 2f 10 64 7b 3d 4f
               eb 8f f7 cc }
]]></artwork>
      </section>
    </section>
    <section removeInRFC="true" numbered="false" anchor="change-log">
      <name>Change Log</name>
      <t>Changes from -15 to -16:</t>
      <ul spacing="normal">
        <li>
          <t>Added section on multicast or broadcast allowing use in one-to-many scenarios. GCM-SST provides good security in such scenarios.</t>
        </li>
        <li>
          <t>Renamed Q to H<sub>2</sub> and some q to σ to avoid using the same symbol for different things.</t>
        </li>
        <li>
          <t>Updated information on confidentiality against passive attackers including comparison and links to papers showing that plaintext-recovery have similar complexity as distinguishing attacks.</t>
        </li>
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <t>Changes from -14 to -15:</t>
      <ul spacing="normal">
        <li>
          <t>Added 48-bit tags after feedback from media people.</t>
        </li>
        <li>
          <t>Added comparison to AEGIS in pure hardware based on Scott Fluhrer's analysis</t>
        </li>
        <li>
          <t>Changed "acceptable level" to "minimum threshold" as it can be discussed if 64-bit security is acceptable.</t>
        </li>
        <li>
          <t>Added requirement that security protocols using AES-GCM-SST <bcp14>MUST</bcp14> enforce limits to ensure that δ ≈ 1.</t>
        </li>
        <li>
          <t>Added that this specification does not allow use in multicast or broadcast. This simplify security considerations.</t>
        </li>
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <t>Changes from -13 to -14:</t>
      <ul spacing="normal">
        <li>
          <t>Explained the formatting of L as well as why replay protection after decryption may be used.</t>
        </li>
        <li>
          <t>Updated link to NIST's plans to standardize Rijndael-256 and aligned the name with NIST</t>
        </li>
        <li>
          <t>Aligned test vector tag length and terminology with the rest of the specification</t>
        </li>
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <t>Changes from -12 to -13:</t>
      <ul spacing="normal">
        <li>
          <t>Changed name to Strong Secure Tags to better illustrate that GCM-SST is intended to improve security for all tag lengths.</t>
        </li>
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <t>Changes from -11 to -12:</t>
      <ul spacing="normal">
        <li>
          <t>Introduced Q_MAX and V_MAX as formal names for the invocation constraints.</t>
        </li>
        <li>
          <t>Described that masking is important to mitigate weak keys.</t>
        </li>
        <li>
          <t>Improved and expanded the section comparing GCM-SST with Poly1305 and GCM.</t>
        </li>
        <li>
          <t>Editorial changes including subsections in the security considerations.</t>
        </li>
      </ul>
      <t>Changes from -10 to -11:</t>
      <ul spacing="normal">
        <li>
          <t>Added that protocols can impose stricter limits on P_MAX and A_MAX</t>
        </li>
        <li>
          <t>Added constraints on the number of decryption queries v</t>
        </li>
        <li>
          <t>More info on replay protection implementation</t>
        </li>
        <li>
          <t>More info on nonce constructions</t>
        </li>
        <li>
          <t>Introduced the Bernstein bound factor δ instead of just assuming that δ &lt; 2</t>
        </li>
        <li>
          <t>Clarified differences between GCM-SST with different keystream generators (ideal, AES, Rijndael)</t>
        </li>
        <li>
          <t>Made it clearer that Table 1 is for unicast security protocols with replay protection and that Poly1305 is keyed with ChaCha20.</t>
        </li>
        <li>
          <t>Editorial changes including RFC 2119 terminology</t>
        </li>
      </ul>
      <t>Changes from -09 to -10:</t>
      <ul spacing="normal">
        <li>
          <t>Corrected some probabilities that were off by a factor 2</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -07 to -09:</t>
      <ul spacing="normal">
        <li>
          <t>Changed replay requirements to allow replay protection after decryption to align with protocols like QUIC and DTLS 1.3.</t>
        </li>
        <li>
          <t>Added a comparison between GCM_SST_14, GCM_SST_12, GCM_16, POLY1305 in protocols like QUIC</t>
        </li>
        <li>
          <t>Added text on the importance of behaving like an ideal MAC</t>
        </li>
        <li>
          <t>Consideration on replay protection mechanisms</t>
        </li>
        <li>
          <t>Added text and alternative implementations borrowed from NIST</t>
        </li>
        <li>
          <t>Added constraints of 2^32 encryption invocations aligning with NIST</t>
        </li>
        <li>
          <t>Added text explaining that GCM-SST offer strictly better security than GCM and that "GCM allows universal forgery with lower complexity than GCM-SST, even when nonces are not reused", to avoid any misconceptions that Lindell's attack makes GCM-SST weaker than GCM in any way.</t>
        </li>
      </ul>
      <t>Changes from -06 to -07:</t>
      <ul spacing="normal">
        <li>
          <t>Replaced 80-bit tags with 96- and 112-bit tags.</t>
        </li>
        <li>
          <t>Changed P_MAX and A_MAX and made them tag_length dependent to enable 96- and 112-bit tags with near-ideal security.</t>
        </li>
        <li>
          <t>Clarified that GCM-SST tags have near-ideal forgery probabilities, even against multiple forgery attacks, which is not the case at all for GCM.</t>
        </li>
        <li>
          <t>Added formulas for expected number of forgeries for GCM-SST (q ⋅ 2<sup>-tag_length</sup>) and GCM (q<sup>2</sup> ⋅ (n + m + 1) ⋅ 2<sup>-tag_length + 1</sup>) and stated that GCM-SST fulfils BSI recommendation of using 96-bit ideal MACs.</t>
        </li>
      </ul>
      <t>Changes from -04 to -06:</t>
      <ul spacing="normal">
        <li>
          <t>Reference to Inoue et al. for security proof, forgery probability graph, and improved attack when GCM-SST is used without replay protection.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -03 to -04:</t>
      <ul spacing="normal">
        <li>
          <t>Added that GCM-SST is designed for unicast protocol with replay protection</t>
        </li>
        <li>
          <t>Update info on use cases for short tags</t>
        </li>
        <li>
          <t>Updated info on ETSI and 3GPP standardization of GCM-SST</t>
        </li>
        <li>
          <t>Added Rijndael-256-256</t>
        </li>
        <li>
          <t>Added that replay is required and that random nonces, multicast, and broadcast are forbidden based on attack from Yehuda Lindell</t>
        </li>
        <li>
          <t>Security considerations for active attacks on privacy as suggested by Thomas Bellebaum</t>
        </li>
        <li>
          <t>Improved text on H and Q being zero.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -02 to -03:</t>
      <ul spacing="normal">
        <li>
          <t>Added performance information and considerations.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Changes from -01 to -02:</t>
      <ul spacing="normal">
        <li>
          <t>The length encoding chunk is now called L</t>
        </li>
        <li>
          <t>Use of the notation POLYVAL(H, X_1, X_2, ...) from RFC 8452</t>
        </li>
        <li>
          <t>Removed duplicated text in security considerations.</t>
        </li>
      </ul>
      <t>Changes from -00 to -01:</t>
      <ul spacing="normal">
        <li>
          <t>Link to NIST decision to remove support for GCM with tags shorter than 96-bits based on Mattsson et al.</t>
        </li>
        <li>
          <t>Mention that 3GPP 5G Advance will use GCM-SST with AES-256 and SNOW 5G.</t>
        </li>
        <li>
          <t>Corrected reference to step numbers during decryption</t>
        </li>
        <li>
          <t>Changed T to full_tag to align with tag and expected_tag</t>
        </li>
        <li>
          <t>Link to images from the NIST encryption workshop illustrating the GCM-SST encryption and decryption functions.</t>
        </li>
        <li>
          <t>Updated definitions</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank <contact fullname="Richard Barnes"/>, <contact fullname="Thomas Bellebaum"/>, <contact fullname="Patrik Ekdahl"/>, <contact fullname="Scott Fluhrer"/>, <contact fullname="Eric Lagergren"/>, <contact fullname="Yehuda Lindell"/>, <contact fullname="Kazuhiko Minematsu"/>, <contact fullname="Santeri Paavolainen"/>, <contact fullname="Sini Ruohomaa"/>, <contact fullname="Erik Thormarker"/>, and <contact fullname="Magnus Westerlund"/> for their valuable comments and feedback. Some of the formatting and text were inspired by and borrowed from <xref target="I-D.irtf-cfrg-aegis-aead"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19S3McSXrYHb8iDYYtQNvvJ5pa7qoJgCSGBIhhY4a7sxoj
qquyu2tRXdVTVQ0QgxmHImRFWPZR4aPDOvhkXxU6+eS9S/9hfom/R2ZW1qOB
BmZn9VyNyGZ3VT6+/N6vrNfrO6mfBvK52H3tBJGfiMNoHaYyFqeRJ8WNny7E
JI2jcC4m0l3HUlw480TsvT48rU8mF/u7O850GstrfJ+/2t1xnVTOo/j2ufDD
WbSz40Vu6CxhCi92Zml96aRpkkRh3Z3F87ojk/rcXdaTJK23BzvJerr0k8SP
wvR2Ba+cfLh4JcQz4QRJBHP4oSdXEv4I092a2D0Zv4S/ohg+wXO7O+F6OZXx
8x0PVvB8x43CRIbJOnku0ngtd2CR3R0nls5z/fxNFF/N42i9gm8O49tVGolX
Ubxe7u5cyVv40Xu+I+oilJ9SMZehjJ0UFoZfrUPfjWL6mKyc+CrwAUCen6Sx
P12n0hOB9OYy3rmW4RpWIkT1LELwLnc/yEQ6sbsQr/E5/GHp+AH8gDD6U1+m
s0YUz/F7fAq+X6TpKnnebOJj+JV/LRv6sSZ+0eQBm7+U+MhlAGt7gYPhGHM4
1fUURoHfwt9GYfOBg8F3AgBpklozq3cbPFjDjx4a5aHfG4t0Gezu7DjrdBHB
IdYBffzUh5N/Lk4bsIRkHTMeHTrLlTMPHfiOvziFMRfyxv4B4PBcjJfOt1Eo
PsopYG987bsygZ9cxHBEz0MndDx8WDK0XfX6nzr0XsONlrlVjHOrOHU++cvo
2ixiHMhPDqBmbP1CqziOfRd3jKeniMX6yqxmciMBr7PVOHq8xpLH+1Op3iot
7LPcws5juf7d/ySgqDn4+8+iRVjx449Z429hyIY+0fz6dsIohl8AMZ/vwAsf
Xh322+3Bc/540Ot36Ovx8QS/AkJw4rkE/NLoFV4Hq/U0aYSAuI15dN3ED/hN
89XJ+aR5djK5aOCnRns0rK9XXrux8mY8kuJnY+/aCV2gxePQRaoD0gVWBhB1
Yk/swcT7u/R8AsuWCbIqXokQuzj6LgzxCnYbO4E4gR9pMxECMAI0SpDg9WiJ
OF9PA9/lB2BBPDBxIYD0rei0Ol0Cgv9beEEG1Vt2k9jN9ov/ai6l5zvNVRz9
Vrpp0qR9RPPYWS18t57o6evwd32+9j0JfEgmTWC46yWwyKSJ5OXJaxlEK/yi
GasF1J3lEtmoV4ba8QS3uIoSB85XL5g3pCmToVRXfwtARMTByAnFkSOXhB8V
D3zpw2mEKY6pn2EITeQqlci4AU4tgJOvoZ2hTnfYbivU6XVbXfVx0BuO1Mdh
vzsyuNUzaDZo62dHrVYr+6gHGw1affx4Uj9q+HE600xp7gNQpePR/F+cjDvV
J3Zzc9OYJ0sHEb6ZRMEaEYCPwwdW4qbNVLqLMAqiOaAYsGSQoH5627xZ1UE4
pXgi61UQOV7S7LTao2ar31xLp7P2nY7Xvu6UcfqL43FHwPC0JjFZSdefKbzb
4oiOLyYnYjJ+fZxDTxQ7APgRbvX4ZNz9g231+HjcvcQZLxN7I5fX7cuD0s7b
nYM6vkC7p3/Ai78XCHzmhGsnRiJtEwxeTk42g2Ca+I3pOvQanmxOFqBMeEeR
mzSPopuQN3d81oQBmhZDSJoXAJnXGXlevG512q0OPle/+FCnf9TbJP5yWz60
qV2cwiAOcIdlIj5IOASkXx6fQPJW3op3Mpyni2QjW4MJkavhckB/Ab5mFiWy
ddi865Wcxgo2nR7C5nQdpP4qkE9lYNMgcq/qrr9ayLhOCON/s85xrKm7bPLu
kN/duKgdNJc4bR24wlzWW2Wq0KtCtQq0rlsxTlPHvUrEeO7AsacAuyRx5lKM
ATdgYM2pD0HFTbbAmiPn2vfEqfs6ljfVT0zcKE3Fq2C9iEHrKzL/Vh9hd+TP
ZjKWwASroQfncNVIVjFIFpD5SGZw4MAZ42a71Wi3WsPmaHhQ79a77VF9eNAd
9usHl3AqNiAuFlKc+iycsumQn08DuawRopykAJfVymCnAHU0p/Nn4nIL0Lx2
fvd/QAwB6oFtEKbVD72SseeHOPnEh4Xcxk5SwYHaBwilkyWIngQfq4aSRACl
Dd9xY9J14b1Oc9DplpAiG0isAkCDFLV42hlofcFt4jPdAGpOHXiobj0UBaAu
I4I4Co+imRj06lM/FYTAghFYLJ+KP7zxs+hai712hwRdlGy9a+Af7V6ntOv3
oQAU1wc89QPgwbj8I6BKwIq1nywQOYoEAiaedJbikPa1zZZgK3Nab/XP5wuY
eSXeODdX0j7rnKjnPUsi660Pe9jsdsvbVqNYG7ZIvaACugvQUbbZ4+EiRqgB
dgNfCRRdl0WKfyXewXMbGEMqZ0gea4B29RPOVTQFCyX8VgYWoMaw8wARY0hE
EUbrrUHU6TXbo05Zgr5GCxYEyUSJZoSSsdkfBMb4yr+KeCEbHkgWN34oPls4
1b+/dGJkxGEIbK76ibfOt+sFznIKEgn0v2RdTSwsik5unNR5BI/odcsgeQlY
f4X0gJzgg1w5PnJfhEoGJWCe0WwbdLmQsGJe1ob9ST9ZX0nxfuEAFT4BBuP1
fA3EqtnFSxkD7Uo/3CCN48btqpFGTQfIYMaSsbmS8XKdMuevo2RqdSt4J3t8
ANgGCi9BQoCdA8OIc2uIrZhf6MsATNRsvVXqJ4tIIBMZV28n9rYRjq1uqz4a
DvqgyFyCQMltKpqlN6CxiffACJb+t6wDABFoI4d2hyIwDsWng0F90BPngZOi
MbLNRs/8WBzFtIMNvGAB2sDrtYyjPARIvVInGgSwwq2xegSSr1c6vbMIhD5I
N9jqWQQcUHqAOsfjI8Dwa5BrwA+32M2pv4D9qAVVP/IB3hdn8w3k/tvf/R3A
8QLEzNIJ7Q3bYo8UbrSo003HXrHrXhPMurLhmiHrWAt4OFyUhocR6gK+Pu/D
hQP/dVpE9edRcNvutvrbyLwo9pQDIM1peRldEmdC+6JzjxnVna9WtJdZumpe
TF5fTsbNj6+7l3r9+N2ke9luty7HKMRIPU6ak269020NQOh/66/ymG1bQXrT
nf6ANBbgaQIVm3jmgCroBPMI5lhshdFV1pJtEnTNbntb7jZN5peJU73b4eWp
46AH1V2k2Y573e6oV9rxl6Cl4F47jRbuV+/1MApnPjqHfYf0ANJ3Ye9zRguz
d6J00pMAOCcaOE+EiDl9lksfT462Pvz7wNG9PASzz5lHzSNz+v3WsHz6Z/IG
JxUAjlM/kCEYOnUASHbUW+yr+/r8fIOw7epNPfKMFWLjdi7bra51uJcIKuDU
amPncMit3nBw38bGnmfIVx92Ysj9MThd2KmWP3x2X31xuLWW1Qb9uzvKsyBa
KNjl6yVaVYhgMCIdRk7B3mKZ8J44AvN9DiwUXtygQvOqQUjBK9U6QM4iJ/dp
smoetFqgIg6b/ir28hA/mVwo758kw1B7OP1vgXWIjz56t790YtCJU1Kyjyfb
CEYY1drAkXTz6z9U5n734OUj/QrnecdofZV5XeoxCDt5U1euB8vDoNzmdeNl
SFYAkHr3YFrXP/E45ok6rrQkcNjFY1aPaDo5FzzUy8eDpXyuwBL6r6shsori
1AkyugM79CqNVmCQrgMJNGULhMI/j2Tq+EHScJLVp1/mHG8n3otue5BHaSNT
KciUAiQxBqgMZ9As4F/MTfuvxeQWtLttuY24mIhut9Fvte/H7aPD8z80CEaD
PFF8+BNxDmqMTEGXTR0UMtcS1qI8K2nkRoHYw4Xui+SR/kgDiYMG6OH3E4ly
SjyCQXW6+Z2YMYz9Dx857NvMuYAwvLu/jc+/URFP2nyY7zB8G2yIfmyOZE7j
6CaRTXTNN385n6Yv2v8BB/r0wv24um59Pv9VJ0ivPi5Sr/thtDr+ODxuH44L
+yYSJUFyPKlvb/T+uqHXXFbYaUdHcu5MY7BvNujsXuTTPsBI6Y46o6ZMF9/W
p/VWqzXo9zqDVsFAeQsaxgzQx8fVKvZPOsxyFWBgJTUaHqqtYbQEZiXegDUp
Xq1Dl915ILrBRov9pRSvYGHeNkIRzjHbycZHXvuBu9hk3ODv0TUCa0P45y3g
CsAvTqqsH+Z3p+PtxW+vedAuSF8RgsJAQbE64HQoBYwnMAkgBassFa4TBNKj
WbYxWxvioxNuMG7GDSvGW/H7eUMcX3nOIqj++aKBsVgQ2nlYfLaGNWtgjI+/
eoRBNByVDaIP0RT10pwjrJ45wtAm/IqwC/UU5SKGz04qQLmaRMH1Vk6yL4FW
xcU6nIs30UZ4XQDc38aAmem3GwC28AN0GH6I5s6Nc1tU0GrGE8ab2taB7sSw
70AaH0HSAmD166DU1luj3sGoPqqCGBiHYSgxrv4GwEOpHV+EsQx89BOLM5li
2kgCCyfIYTAm9sQ75xZwG0nz8y9ODgmuRxfvJqLd6G5jbTeAWBN3EfgbqOcV
kNfv/m+YbqS/wwYGsgoIZSJbKnoTfb6BTYFcS2OUcXHGe2/mzWX0TdOZRuu0
mYPTKSpf4j0yGtzsFvs7Ob54tUk0KDfwtb/J+Z1X/4DIMYTY6WJUicLUddD8
Ynq/nqzqrIDl9dpxGIJ4cyVLgZkJcKOKyzNnqtvR41W3zAJki/js/ccfIaXx
9fqX/nPAISE/gd0AnHwFFirGxFHnuM70b36U9K8gugFwzmMHxPfh+RfbkO5j
udSj2SDIhF9rnlAwt9oEqMlF+5Ea//E1qex0/unCj706EeMiWtVB58+FFyk6
U49m9WilMrfsxAjXRRz06isHfk2arAX9+05L6UHwCTUh+AtT4OAvzn7DDwDQ
FP7GPLiyj/1pOXTb8Acrt+lpR7FZU3vvppFt7cOiNiQ83GOJyUTrJ+p45gSL
usuwoOOoIyzqZLgDrSIg6ymAoukvnTmcFQ8FpmdS72d5YlN3mR0yjvwvFOqw
sMemQr0Dpc29bU7O6SsyPpzAMoIVL6wIl9kJBMQ/XlJgk/0TBEGSZe816Tzf
bCeQrHtttKp70qkmvMBcttT2TBdO4wjxwN/gTG6RgjBO3E020mY4qoXlkjYo
w2xy3sAFdrqdhr+qSJbCyeovnQT0m3f+fJHeSPxTWJkbt1aWGML5kPRRxw/h
lSNJKYlPhhssS5ywy0L9Jo4wx3IbYMoAJLCY/O7vwqX8FhS42Nmkt8sYMyoA
0923SjMrK8tAZYsIMyoWG3XAz0A7k/DI281PYH7iW1C85G31CbMWgwT8xYpT
fB/Fo35sFgrmqa5p4jIHOjwVvKbtTIv7ckmAaYBSPXdKVhLHyDiA9OPZszGM
KBQ4RRxGEQoaJiXlxhjwq2TMc1rAFmz50J5B0AxogpPf/XgCqjzMYGIwyphV
qTway8kcwUBWZhajm5tjdCoTE4hqbDmnttF8Jo1yHK7Ijl/JGLS67SB9OPlw
WHRJEkOtM0OtX1Qh2cvD06b2HjYPPx6iY6Kppy3nOBSSl26kcxXC9iVZIvDq
Nnprw2xrA3ad3QIM5n+gPXNOveWJVcoYL+LytR/A3+kloMglmGbJwrnZJPrR
0ieJr+LcKq2Hs0HcIAIFH1R935PONqmsbxsKDtU/vyFXCC5to6BSy7VtMTbu
GcpaG9jawu83e8PhQxiBKYAo2a8RAD/es5dTWao2+VEmMG4AVFxCpnafjXWy
5jfHjcgXEUsXEKrx21VTfoolunWb+vu6/FTHbAf8oxWXE/+Or51gbXxikwgs
JUJBd5Mas51VVPZCWFHPdvspkfpBsz8ohxAoX49yG79I7GyLe/KXnmsXJlL9
oxwM98byXzYeCtWDdlWv14UzRfXFTXd2LhZAeJqyhSdnmNxK3P1J+vjmjC16
dQyoCEoQ/kRe+D3MaNjPgpwNncskXLCbp1KsUdzQq054K67kbcIhOFXIE8U1
EUap+C1a7phPXMzuSwAisJclqGrCM7mUoMTF0ZIyhFAs4W5hIjwwmNVRUUqQ
Y8l6ClOKNz+HD7/o/LyJf9XocRBd/rXB2RkIrIV6OhFvSBzmXiKlUTpgNYeY
1lEzHjsglcDJXBoE9zfjyRsxU65g3jw5996/+/WX43fZL7QH4wo/+RK3Cgcm
Q/RwJVgtFfIpoHXG44TSievEQCt4LCiuNSHBNBeOSihc6pRc/bBKpayJm4UP
m0HgoXubgiWhFcz1lyt0FKqQGrqYYI3Z4SLKkV8cFoeQMe+tVCRGLZegw99K
3jPCDQ4oZpGJYEkYG/3QAxyAJXpY0sTDzhzYgyyg4NIPQR8KaFUL6bDusgCF
36xCwdEQRYyFBOjzhieuqZIEgeMQHmXZd4BBlJP5YL0Kp6npEo5Of9Bgmlz6
nhfInZ1nmMsQRx6rXDs7W4zoh5XUuqeQY1/c3cFf33+PgHcADJ4Mbpm0KKPI
kB88pyp84FlvzeIWThCOHbmFf533YcG00whAmuicLAIlLIv/AYcIzAr/xjEQ
Icj1moH5aE2JeniKFLNOTJyaKKtm1ByxijD5BRTPdSrSm6igNhHVIC3nJakh
lLs7PdD33zM/mPkxoIYexcZhAIwPcJaOxi9bB4HTTtYuqquzdUZB7LiDjSw5
QV3xHNhnBPAwk8SAPE6gkFYxFuEzyyGygmOj0aVHu8JFYLavmsfHcd8j2N/g
MV6F0U3IvMi8jTwTDQLEVtoJvYmTJRI0OEBlvcIaVnEmCKkg27A+i8KODRMo
bd3XWy0cCZ7+ikMRsAOXAAQTIR8SAVc3iOmaTQKp/B2wDBewggoabuAUBTmW
mHXhc4itQCgnACyhNE3ETsSbmtLzhIQhgwYcN/8bcFh+ooRwwJxFdCOSJa4C
CzAABJkpQ6yKsCiKJa8gZ1YBZab+HDgpPgJiIttpQ3yBVU7pOoRfg9sao7Hn
eySUZlEQwKx0RB76CJhj5xeLJIPsBDmRijtLz5ZBMRydHytWipBESUWczIIQ
oMt4hSW1/idxiIemCL6RX9EcKRgF6TJKlfjKsqhWTuwsJTIPdxH5xNz4BydJ
gBF6GZcOsBYtyXTLDPD6GwA9lprGyI3ZVUJyiOxAha0JoasTLKME3wZNDSac
piioZ0ACU3hI25kK8QSxdD9ArQOFbiaT5HKVAk5jiVLseL6balSmpa94nwSJ
JXrWSeQY4IE1tY4xJLOE41dH6AAwnZiSZxbONYrpwGdkAfldjzD1FI5GFxYQ
vgLauOvAMVMbcCZGFUX2yp8APozt/reKzSj9A9lY8XARRWLt6yNGuvBBz6GJ
8Hd6VOJZAUBHAwG/4ZxyFsgMEjQdMAG1QeAgQBmYxj3HTQJ+AQ0AoFeouROA
zEo2zoHbobCLwbMF8HrEMy2hWcexOINmlTgSDFvDo12ghKDDAjaF/A3AEOcr
AWAwnyUuzUm/4aQfEfBGk05YpAECUfCOZBlWCX7/PfNJYAYAEHiCC8wzHAI+
pvVNJDYwRxR3IYRlrZCVJmOhOoqRcVFJo5cBfcO6SfIiz2fFh84DZgaMgvUu
2RWSF8YI3/HxV7DPnZ1JnhlaErwmuh3Ses2PWorywEBcSBKRwLgqECXFN4Hh
B2sPz77/GmahFCWEkiqPMUORDYqIx8sE4goTQhBSw7LyIz2u0mApFzOUBLoL
rFRJWOGFldIc/K+DVn6ybB7yR9Qtxc2aCoA8XuN+VpTMo7aMjL2G5yrjaK1m
kyssEYmRMY0TQjRCg1t6AxU+gCB2FvBJr4HTztXlGv2wxqIqYfWdZ8WCfyU7
YZVsn4YB2pViSVBwcIk1w6LgG9BP/WvfWwMS6ZX7ilgAd+bIu1zEAVz5FFYI
o4WU9o06E6pKRhnLyKkmFN5ny8EBM5vJZnIXZG0kIMzxDekjxwNkZFXHy+l1
JKYCNIcVwYfAkLUdAUw++hyRJbr3ddaGl0jeCUc18zJVEz5S7+HFBzz9KQlq
WvgbJDQiYKwZ/v57puVBq49UXyAGbCqBe0a9BECkjAUD5ZsF+o1Wzi1VdjK6
kOUKGJwSHsDaGH9rtv0BX7NlmBk1CQlQ4BO3SiwtNcZbmk1NiXS1X9Y+mARD
lXRQs0ZHDWEKbwBJw74Df4lHjD8UmVQm6BpYyUQKlU0XpJxaGgEfc5JwHjWz
MhwXITuVKNUSmO5K5phbTfgN2WB2WeWEgyF/+Kv/ItqiKTpg365+AXNd8sbR
0F39QtmPM5QVS9Q0lKEOMIDhYef0ZVl0E0Oht5wKFRs5vR9IY90Qjhy+PKzj
ZvYO2cLJLJeiAEWxVGnuFpyKNTZUbAsnUSF5IgMtDsiWpTNAtF3FEtP7kYl4
fuKuqe+JVl1QrLtkS7AUt3S53HmBJJQo3KwsWmL8/7TcM0ql1TpFXKhgrlBv
M128YP3PMmJ3FJIEWYVDDdGbJ/JJEv8hXEHaSNYuId8yw/+5+4aYPrBhB7Ju
xjV1HsomRkRVlhF7kH5aBxIvQftKS+hhOYeQhODItvcRadGCflW17d4At51T
C1v4zeTDxbktZ2qUqgzf4F/4T5m6jcyj+7B7ClAHpMPMYcuJ1C9/SUnOYWqY
gdavG6ApURMi9FMlLoAdFMKEuVDBl4EC5j6ubRS6jZoz2KoJ6mgknXQmqlLa
XDvSzWqyrYcS/ZEdRFObeYGisCgL+yfgM7oIiwGKvTyQmDCtgIjL8OdazsmL
1jeMCDOkyMd8U+hDIA7I7lOqWIPK3gseqMzfBDMZT5SPTp0l5iLjyizqJpjr
x5he0XthETZGNf3wOtJyVemmYF0nRAxK+iuDTVEej/TDn/8PgHoayDqa4rC5
a65wgu9JbiD1at8prBD9kyjiQX/OvWVn6ScZYcSY8B4qW4nWCydiaclAvuil
k1Tv7CpBpafTXmFpQrB+Lh2ZssiVHbIyIdncSgzfoKCrOtuJwvwO2EDa76AC
+xUCjHS1sj/VkL7xq27tTEUbaaLWYkpACXV0hRHxXVKrURiAMLR9r6Q4qH+j
fzQUKtOJYIFcpELQ8HDaODYuLdh+76AG1jGz8Ha7Q1ahBpuVtK7dkGUiJ1cO
qnYaSNKrgE41NVqYhYKQrH7kNuh0CQJj1BtCoLIF1I0yv6uy2BVu24BiJ15+
vbhLlIFZVzVcvamG6Dc63d4Pf/7X9GEI81JRnXEWoP+BeIs1fX5KYMP4DHIM
J0gX0XpO0g7ocUkJOlOUkddUC5HoUi1cT+IuJNaPNPLD4VbJop1HUd5iyVBf
VQyvdMUwOQRWK6154BmendDGv2Q+YZk0d3dc+Yw7tPni+Pj1CUqiTe2JcH8W
cgDkZ0QcOae0MlQKzG+FKp7hgEWKviGlmdmG8YghSaXYRgUOeCqpbJ5xHf5t
cizptGFNQMB6VTcOOuD8uR+Soan6UTE/NAWVNRBnnmThh+3KxKnj9l/XLL3R
ISVYgsAjFQWRpaYUdsUMbsnzBquxtGlWnlFnJDZCjj7s0afcVygwlV8FdAoq
3EWbkYta8Th4HUgZxgpFhyZLCNiNQp5M+FjSj/ROhAfm6cKCYQrs26R4Dpb4
3d1hG6McSYFl7Ht8/DZ6a2Dm/Lh49ozuxMpqPBF7ZuAToT/PpB6DT8yrbFLr
tRSp9Q4UqfWIAT/jUqcwazJ0hIAkaZcgf2aawT6Jidg9/WJygT0Z8W9x9p4+
fzgGxenD8RF+nrwZv3tnPuyoJyZv3n/x7ij7lL15+P709PjsiF+Gb0Xuq53d
0/Gvd3l7u+/PL07en43f7XJIJyc2YqmMALIQwOLC43OSHTh0FxCBvX4vD8//
39+0e7D7fwe6RqfdRv2D/3HQHvbQMATuxbORu4b/iT6hHXb4aubrOis/BVlV
QwEARtoNqBnAdgCaf/wbhMzXz8XPp+6q3fuF+gI3nPtSwyz3JcGs/E3pZQZi
xVcV0xho5r4vQDq/3vGvc//WcLe+/PkvqZ1UvX3wy1/sMI5kFAyyRfH6zOFK
Zo86recAJfGW3FIKt5zM4PNDWxOEB8/0g2T83PvoWD/qZGYq1jzc+9K5finr
DHTf419Z62axD1+6qf6WLUkcBb5G2a9XVBLk/LvyjejHMp8xvRuSfgBPvrB2
BkyMLb4VKxvw8w9/9Tf6AVj1N2sui7ce+CT+7Ls/+07cKgaHRluYayOAvQ5S
DJWjMxYeRxK4xZH/63/XI8NSbrCEQn4CU4K8GcCj9BziV+8/wOOw/r1P++Xd
fLL28i0ohyvHw+diktIrcruFuTXAG8T68GGuUXYyWxEGBPtdj6et0L1PQKpm
bvUtbVELLWDzWWw35RAFLQ7Zx5Vc4ZmFBt2Me037CtzFOuSCIL2F8314Y/mY
N8b4hjbG/TKesQEOz7w87nYsUE79uVb+yaGMIIKJlGufxBJM/QlefHc86Nln
kDMc7HeVL99+98vf3H6tX8ztgQ+DyjERiZienTgG4/bLP2FnIAGVH0b5xs+2
aNBPz2FY7TSJ0YVANiUD5xMebnFMlEpP81/dPdMqtDItEmV//B5cY/lUiD+U
qwuMUVOv94SkJ6fS12XpbY6HootpTIWYsrltr6l2O1kWpXEnpc4VRe/WMRcu
Yas1Tf42WdtBzzGeDUhqEgFvQZQqFn9Wq2TiY+UEthj1OVtJFQBAwLI5lPIQ
BK23NMJZ8S0QeIIbTqOif04PjZUzEJOB1kv6ivrzwmfLnENdINuSNUhavazN
612RJ1GqIKD6+SudraFItsBXsiCBYmmLWEr941e/aX1dgz/bXyvt8Dedr02i
hI6o8hvG91greivxxVOVEWPQPVufmapLU/Xgz0ajgR9D8TNhzwfIpdAmL2vR
28K5Ddr9oc3PzAm0JNxSJucTnJls9HJoK+GgJ+aVGD9H5hMqOzzu97vQeim1
Xa1I0afF1QEvOOKHlcoOUCUaadbyVCrQPd5fXNkMS7yFDFRkQGtVelq246y8
oSzYrZM3ZmiWASiTK4VLKirVEC8xQ8uOpcIKMG6n/4nJFCEZdLwpMuJXa4pC
qbR9B4NogS0BiegxEOXPqXeEHwRryvLQ/FIf7uaJZ6bWXUF1RpUEJCmxpBCP
lj51tAEEFjQ2riOrBqMvUoenV6qRGcZWdT8LxVMTK6mmaFbUKH5DbYop0JAv
z0euoTzwtCMO/SUc1QacXiUZi1468ATlOnFMOEsisJ8n1yNjCFlbNROGSO0+
HLRwxS9Y6YziGD2y0TqFnXK4gLZO58TZVoCGgMqUIvXs2eYoj24wwDp9FadX
D+8BwwZGDUz5fF8/l+SYM5vkQCphUTUWDmXDKehUebJpi7AFPJeCAq2Szgoa
OwqGvLyoYeqc8h3jrs9jSdE17IzGZq4OGJA9os1cMtampKZ40RKTzjA8rFiM
g854RIfsEgBUK/F9jvYxDsA4mTTT1h87o4gm2QWCeOH6MaCa8trROMcY58kt
RFI/pZSZqCPQ7xlIy3ag1yyTnZMQKU+HcBpQoK4wQ0kuSpNDCmZLDKWv2LtP
bKPSesay+eEHx0W5/fAr55lEf+jhnfe0FV76YYZSgP4PToOYtZdTR1QIgZ7O
IAqzTJAeYY420OTMMmYIuhnqE22hqpUBnFFeyDhGjEC8nMIPO52GquFLq+W/
rZ/sdBviHSzyDdh9LMbzEuGFEuun9Knz9U6PnwcYvIA1oc1mjCKQzc9ZGNfI
Ojvf39/p8+MTeDqzS9hC1P920/2dAT/2Dh4jowJfh+/Vk+arMYw45Ed/hfOz
TNoDZWJCa5/QWkEv2N854Mdm6yC4xMOwns7rHb+iTbzbp79Od0b8Hr9itqaH
qeWOrt3CLCs6A1gt/bZvuJkxft4BDwJDWrFo+UnpWCUNgGP5FTzzSG7gmRUS
TD+c8Uy9MP00cs6MP9Zs1qeyMiqYJNnyxPlrJWabsUaOd+r0SEdjpp/lpfBk
OifaAVViS35pMhozP8LKpmQUaqLd2idRiWoR6kDolAaNOQh0GKZyGfxutz7a
NwRYudSkVprWmCkqm48wzebCzKTRW02s5F8v2/3p2KfNpLdn7nkEBZXb1fri
vUTgh6BL+Zmqy+fLOmpjW1YO77ppmZ3TD0AryOiIYNHVZvnt/hG5/UPsu789
+x5sx76HT2Tfiu3nCPJBPj7i44JHEeT2u7VNUEfWjxOdw+hwmPfKQYTETptx
4gw4EmUfl/I1zFTnzNxditr5iWJ4DreUzm0MM1GQd40MK1EhOZkl/WGuR4qt
uygdERNiUlIHfesCmkA6VxiFo8Y8zOSs5raZ0b/0E3gDA5piepvKRpUmmrHH
vDaKWyN9lLIoOCPQBY7g+Lom23pV525PJQxs3tVEl2AwjzReFL/FtBdlwWWQ
UOmlU0xGkQywNiWMcsUPf9FumM57OrsIJ6gvfBLjy+yqjLs7VfZIyUsqvaec
5G3Ee1VmzixV+a5KesPZZHUdPlmACdgSdZf7RulMJVYOjrVuYXQOcbGGyZKd
ndwtDCgJryRsrmgRKaFVxeFCsjZ80CUERybJCkQjj1KLucTKSTIhlePRh2RV
EttzKIEGQ/41I1EJIfwlZVRjiYpdlOLa8gE46CHTFfEPjGDsPKNcmGK5mipU
J/P+7pmd1bDBJfvIkrgflb3xCNevUvuy9e/sUD0B/+u02sWIANmz3tmvbfIF
4vucIpBLKdnZ+eo3/tcA6eOzQ1IYGd4UD/CBZ+2w1w9+1Z56HER1dLEq2ihU
3BAvs8CBmiVh1fdhzbdicQwSA+EquFxUwyWHIHvFEe6HUhG5iuDqALzERoiB
FOOHftbeDFYQchWQzU1cBnGGWRpVxkfkz+QkHERK0wcGq2GemQQdoISP2k0o
QvxD+d3V7zUdD2F5wIlTVn4cMWf0iNppITk6NFkZWyYhGc+01ueII5n3SDOK
ZeAohThzTNlpl8DfOceTZHKuLMP4kjDFI1efUUzG5tQdlQnNhbduvuE3QPs7
cYYC5zvx9vLdMWjHKPqSffj3+eXpGPWYMf2dfW/pbHu4X/gOBkGoXwIML9ud
g0sA2SWA7HIAj7fxD85g7w5U5nodAAff4h+bXgVg5t/tq3e/w5qoza/18q+1
R+Y1PJ/ce4CKuZV2O1uv1H6VVmq/u3mludd6+dc2rfTDyWdnR+Pjd09Zaund
Lddafu+hxd49F8+AMzp1JwDEo3YNL3aJEq1m43hRUPJiNxAx/t8ukO4hFyJZ
gR+jBfmfCpRMJtDZ5enJGSDlGSNlVVApwewfpdiRlkMRXFgle9J1vlVN+frx
nzZ3qintDcPiiPJknR6q6SqmKKoeqLDA60w9P8tRC0buiYpwyM/zQ2YOfzsh
Vs1R4T2mSdQhdtRhqJ1pjlW5Q/Ob2iWNcHDAI9Bev3zEwipcNNbCege/x4Vx
QUEZ/plavUcw3zcaYNXTxVDo3pjfoSRP0sepCAXV8axWwYgLYO2RTtl/uHGO
StDnVgj2WsySk2p3+42kYEaeAb/ACOqeIr9uG8i9WBBUq+II+7bmT8JOgn4S
3RodA/VozJtPqL8D+mliXRuFIVyam8K4+KkhPsNIOGXD5sTog9KTAl9UaQLa
9cz/hLWh5JDRxJGj7H08L137iuN1Oj2V4RtTGTsmZAe3bKKx5pav56TYlmFI
oLDiQzcRmHl1XRZQVXE1xcAYJ1o+UHxlpyCQKu5TGxBpKvBpr1iud19oxXJo
IX4z6ZlqNuyokWSBKtyCuRKIlypmjqtUu7//W7XkArGRm7BQa/fDf/5relhh
U0fjT6W919JBQVU5npuoeM5kIukMfy53ZqzS0crqDbDS+nlp+8D6p4GfLCia
r5k9htpBywkykxmdCQEo4BzQ8vJXt2nrUkzwPtV7wqTfrLk+mexZ9J5lscUY
Y7JKkSzsgBgWm3rqnHgbP/zV/+Lz/HEE+LkhQB4M3cl6tHUKiPstZe9b5012
qET/h1sekei5xsRc48HpcJsAScY+yi9ITFh3TwsyxSh/+G9/KfY+V999qb77
33+pUGmgWI/pj2Ohr8Yb2MIHOZNULaJKGhIKOKfffw9qBOvpL3aVabJLsWm8
p2bTrxyvxizw6ie4Pw33HYDj5psM0OI2tUZoWuBNHUq23T0ztVJZbo+uUCNr
5OHiNIrL4qB2LsEbNg2ogihR7qe8h/K+hkLblFWqHIRNyQ9ULqdcTXYZHOd1
5LPgdcFxZWuWhxuVWDVuVKm1dQcQ7iikyamcDkacPeO9lKeQ5YWptAWehvHO
MqYd3RrnVhUm214i9KVlvAEtYpMtr/BkvgY9FZBKQ9A0U0tUIJoLEAmoujzP
n4kE26xJJw58eIR/tPQNjmRbWWQ/tiivIY4pZeGpMXiRYyQ6Rw7TtZXTUEtg
dOPJFP9+zlJvY9CehL8eKVIFFZsS4EzOuH4wV6ZcFRTEVBAmLTUnB8m4r6+g
lDCJrUq4vv/EJP852v/B4kfFmDAZTVjX/lHgwimGHBzuQ7TCxhJeAWbKK5zl
FjL49dn/xlwr8jWnhdlw3nSmH6RK21KD+KENlYdzfwhIpt4UDh7r5azS0rs7
dXEHVnPo5J+cBzxzYWQJZVzShCKGDpi8ohVuDEE13bovGatGScUiOAqmWhgY
ka5fZvOAdWr0koXZtX3oTVeEVLj7IxEqnx9YtjoHahGlylAYYUDd+9X7D1wz
s6YWnNrs4QJQwU2dXPO1QgHYXh3JTJ2vSsKEHZkqYnLma8ePlX2vBGShGxa3
cksyEOri3hVxQZ18ZbrhkNlL7RAp9199+xvlwWfs8tnilZ8chItVj+pZDRHz
xbvvJ4fvPxyr7wbtbpYVRv2byRlaamWV0+aJv2j9HUCdqe8lwwBpkcqwCsCY
Y08uG502waISBm6uKIyKfoyKaukfd3cR3hoaYpcghJKb1wRgeK6OtHRpmovK
iOH5aRw5Xr6mGBtVcSktKhyU52/y4qhNCQzg6DO5p0sOevyoWqpUtcwu0uya
vrtnqDuxBaEXarkdsnoWZDLUv0V3WeixP4JgCGDnmFSuHUl7oLwgFA5Eu+FF
SSVs4lM/AzTiJkHW1D+n6oI6kPS8swcv7ysk+GmNMWmqO6sswwBrPVXyY+ZF
/p6rHSmGRrI5a5iFoTbMCcz35MqsvjzaKiaoeVZVcxN6H98kKWeBqwiorH5U
8WGsGjcxyzLQ0DhWiP3KnzdEl3dpuPk4odxZpDg4aknYaDKhTf+rXH+9e/uT
IL7k9U/ObtlUDT7bMvOkFAm+L+cEDU4jHGixOqjuc+0EJpJbfR2yJFXLJ6/i
tuQhsj3tn/CzrzoVRvEqwv4qif0mLNlUw6qIizJKmc+rhKl7KL3G0mwLsuG9
JPdmxb/izA8+jcp6hvSB9ejOM9cb6U031bku1+uUzWmrVFqZKK+K3sBtV/T3
f0sWDQBH2TRojD68zHv8JmrEqR4PDNk2sLK9b+CP630aVTtXcS44i9x3eubp
z9rZlPZm+WjL6yY7mDkINrBAVOaAfqIhYy/+6bCp2kEFvPTy+WzKLtlHLgKE
7VYHtAWalTGnYMlrYrDqiXXZdZJjJJXr1oX6qnUG75Z7CNC95JwZrxhojZIj
FB5lOpHqwE8c9uXkBIuQU+3zqOpmNxpofmt4SGIUDywooZt2tI+ZG5vkuk/B
KiYnNL/d5Shv7NJc2UwgpeDlhBIhFUpqJBy7C19es+7LWhNNzUIKM/G02KIh
CTMP8Q+82Fx3IUFZIKm6mxxZiY+GFmkpxQuG756RK0fnAOV/JDWQBb7xJWul
D8s1r6XV0nJbZpjrS1TqOsHBBg9jT0uqyVAtR6Y+YJkHNpjy8ZnqcXZk6OFW
dGHamivb7S5kPIwP9r4Tx9FNoXIMowAb+GARJj71ReCbt3T7RSNRP8i5E3us
bc6skHMt1+kW5f0SNw0nXOkb1ZiZd6MCzsXRJ3/JySzaVTwyrO8f/kLzqH/4
C+KcrBYiybN/kPRC5RlHpSxKsWrESHmF/EuwIahFHBxNviqLRDs3Gk3SauhY
GFMyLDajTklp444PrDtu40uudH2Tg6kCZp3+gQUzfZVJDRTqdcylMdjbBUnm
FjaK7MbQENriR6Z/FjaKznq8Mr3PHsLwPCrQQRPSonYQRjeB9OYVoTSXrlID
yk+tb+uxvivB2J8KxDmSYg8GdhAJbjMb2ALr3nqF2AzaDZgz6RK7FpM0Tvap
XnyD916r27l+K9ReVlXQ8f41TlLzuw2n50WcmiolXTsNs6NK69h7FWav2Eg2
US1QMWh5XwpNrsuSQeYCzuKarQgg9W20Ta5CEI+j1rWKEjm1DTaeHQ/ZRGoL
QtMsO5tNBTDJvR/z5Y33Pl8zhax8tNE68KhFJYd2uGTL1M4xF0FRR7iJzqHN
PqEs2uSIQwc73tY/yjkcGw1Abj8FFS7ZA0owN64CJWDFPOkBToAdUB0MCGat
Lu/u8NZS1RXpXraRC1wqdFb913MMw/OxPAAwGpu78v43WEZ4NSz1h8b6iFB7
z/nW40Iz15qliiDq5LkSNTyMluhBWGGbO/eWkpns6JozmylPrKX/4BxWjRd5
PLWPUTeYLvSHVqE92KLEnW/XFZoFXLll5oW2pGuG4qjSUS2wllsds7/iAdFy
MYo6RZqKseEoFvuxwx29pNS2XOquy5wgBagVU554plqxEvJROlekIFBTc1UW
XmOLn8MCROncs5x5r7Jxs1Q8jtxxri3y3Cg1lvhDJaeYSl7D2nN1oe6NXg6Z
xNRinh/ZkLaaaTrkFLcS76krGkfn6U9iB6E6GJScMBJPklvUgxNiowgcq6KU
W3XH5fwKLoEluj/V8GR3rIim1360Bm0T8QrT3CS1iqWqUGzW75veR5Z8yhoy
5u4FB5RXvVqxl3b+fGbOdURKPQmYrM4BkBhzDZgnZdE6dyG14zSWVjMtGACR
S7LSkdPKNh1r1m418wbrmAGCLEvsowIKwoCqsbTjDTFqytiikkM5CnBuogC6
LEoZPjMVHyvmX5ts7mrVthRIsuLIWRTfyp9SLQ8pBl9whNeKrRTwQCuiF+OM
SQcUHEokGhqpLHnWrcFqpujUJtUolHh/LTqylkD0uGoQMjeSGEJurETRBFWE
sm5H3fY5wnMf3CzbQqkmue7pxqT0gKNJGk81q45lFGOQNZzX7Es5cvy/UPys
I9JkDigvfcKN2Tcu0DS6+/DqsNdtdVVLCfr3oDcckbdNT8OtKotjTW+V8Yg/
Zzls3LwixjAxUhfthomSsCijLqDhUA2FF2vohHk78kRYCmdW6JDEUNTKskMN
BTiwzhoJhWdIiF3jDfeK1DljDCAfmYhDAhYfa3AgOUBw4NW1iYzp+gcteFB7
w0F1YvFhVnbCnY0XDvzXadWNLUt8ThtazyitYGfn7g7ZSxvvEuDAgm4RpIVu
djlNrWJMq0tnLT+B1RTEtxqUbhvrzTxx8BNfWfiwR45YXG6/ZNVvcvRaxPCQ
/1+xTraRM597rdIFZ2dUZP64J/vgjGlqd/Ek70iWslTjDADUQLl/O95fpDuN
UnjyLELPyy23ezdyUKv0aFNs7PpanUaRv+HmPmcUXWmgw1J4VWOK/Q1rtiuq
6HDakNpiUrpfVRynKhTikid93tWPciFP7snvxPF9/jTMIM6nYmfno9PMNn57
XfWtPWAn9+poUDGe9eV1xZcwGlorhPjf5Zyh7VbXvLnp++uSC9X6lRdafLtz
YC3yO0DE/xBOk9WfwDj8IeehLfwGA/GHJv9VdMFw1jUxJp1xfZirqrNsgmWU
SfcKDpXnSk/hRI1towEIHvVgvg0QidH7+1Bs9hXxBoDO1dDV/v5GRQo6s/bO
H4q1F1Mrc1V1ToVyptKHkU9F8W2VCKAOuSZYYG530GnP9yegYtt9Dn2B4mXl
hGqS4QDxXnXG6H7DpnYlSTStbuw2TVPdC8lNgNSJ46q3MQgPMrL19XLAxDs/
/Plf93TI+hV7901ScgXabxPZwAaN3LDymg3PsjaFXlrK6sQElAqdgnzsSoHO
RYGfcgnOqK3qjCwHcq1iUUZ8meJLJbuYEB/c+jzGLJ1v1o4Xm347tJjrmj5r
fchFhyoG92XxyO89Ch2CJS6CHQQtm7whPtK0oHsw/vW1eEDvkcqzttKen3gv
UW6E5MfeT0RhX3bPXNsuCVUPmFsn1qe0hzrii9oKxs32bVF+kQ2QlWL9E5Dv
P42Qhz9+n4IeC8KsV9tV47WrxmuXpDvVltlbGzxawOfFeXtYEuedn0ycI7bZ
kWUtgZX5SiIDkHHQ73d14k9BZNpCs1sUmmU/a0UwuZCOZXowZ19UM4i8pA0o
OMkaN2ZG2kXMtc2xHx3jKa3zgTDhP1aM8BiTXbJG35xrCRvGfgYqpV93k4Ph
ikxPm2ovilIdIfx57qeOUmT3SweU8XhyQI56pt1rKTVvU+zmfHMICV0R94Ke
s7Hs+JGVX1Q9oQnhW4E0ZTvZ0bRc8Sv2skfs1yWt5Cl4MA6IfOHwzRj+67Qu
LYaDsaHvTPzP5kqI7Jf917qy8t5ni2WY5uFME8sHF1UFZ67QtOKlfBTXYjzd
asZTJJfNkVVmTGWaL5H4PSxLoV4Dl/ZjoscZ43KFi0zr2TO+O5w4Ic720mRv
3j3TeaBYgY8qZvGGAOpp8EB2cy4LPpcjtilrlHz0FGeDdRt9Td05IT85KuJU
uIRG6UP5e2mqLvMyJ4XeUiA9f+Xz1SCmusJEhimeh4zURGyLYxDLJU+DGakY
os9SRB6xGlPzUliO9q/jPkE5RGaX00pCeVNQ3vgyD7M2OEq1HiVWxAxeqapY
yfZIj2RjqIrF4tLovmBJ+8hWcYsBgOxdHS/OkLfSvMjUYu49k1Rqmuq2K8qX
z9o2mtRZZaiYNIZIWxy0RNPzpHKdpnlkYbIsZyAX9E1UQMjBGyRACG3I7CpG
BamsjH29Bj5GvujUN0p0QesB3eZIJ1YubVnvLnXL0vpzvK9VnLjskrBx92Kx
5v4QKqZAOQMmzXqjy3WDIVEAcy6TEvX5+J5EN9NpbYPBYKWYVO2XytlOxmfj
Qinbzg596Sf6JhDVg41a36sCnFTjYWoaIQHfXC9DbpWRq6HluF+5rp9v0IHj
zjSV3Sddf3duGgHsCjTpTXixcElFwpnOkjNs8Up3DFerNjpGcbnAu0++lBTA
KXag4R+ftcWeFhugOe7v7Pyn6v/tCP2/t6Ay3YlWS7TaotURra5o9QQI/dZA
tIaidSBaI9FyRGsqWq5oeaIlRWsmvs8GOKMBui3RbWNLhW5XdHui2xegcXeH
onsguiPRdUR3ar/0hl7qdIQrxagjPFCIpqLfEsOh6E2FM8WZ2geiA696YgDU
K8XQmvXNZYeX3RXtrhh0sTZj2KNWwI44GIgeesjEbCoOWriO6VA48MG1V3BK
A4ymou2J3giIWfQ6YtrCvUoXP0xdIWEAT3gtwGPhwq8jGGATQOE8nolDTOJ5
1nZAA2FCkt6L3ZkTJBIF9oNnMaY1WYs8L37xzpzWY/7DAazebE/Ztpr/MQNk
y6b2o3dbAm/6o4DXa4leG5fU64pe70fAsnOwJSwBL2ddRF+nJ7w+fgaicfpi
CCsBeTKjLztIAvJAzCpguc0AT4Sl+/tFxEFLDNpi0EGKG/TArBaDgRgMxeBA
DEZi4IjBtAzgwY9F1tmBwPSzoTgA4ABbcMSoJbyROGiLgxnCbTjFo4YVHADx
T8sA3maAEoBhf7OW6E+R9bRB6eggasEhDttgf4g+fONteQje7xOhe33RA/42
xL44QH49B/llz0WOB8jSmz3t0AauGBCfHcyy1/l/gIWw5WFHDLvIYoeAlwNk
08MDMRyJoYPAG7pi6ImhLB/+bAMVHWzNqbq4cTD42j2UQQc93HjHRe4E37hD
hA9MLEfCBe4zqOBUWwzwpMPvd/EA+sDt2iWYecJtIWK5hHMOiJ8R3vDtTfEg
gbPMZngaIC3brS2RSP7hkOgnwKASXhxswIvhtlwXEAvUBRDso6Fot3FfoDQA
FoAS0neEN0QZBCoHSKX2AAm9iik8OMBPgBf3nnaFQtd5okIHmlOniwoRILxs
4/F4A1x1v4PMDxY4a+N/U9pzbqtKoRs5CB8picAOUItC1tnBVwFvZwMxymEK
41l7hioZwA92CnojKH8AFviyD+pEDwli5qKqNusjCnanRfiALtfyyvjneMjY
gFpBjCL2thD/gH4B7dweap5wiqh5wrHAOXSKo8JaQdEctcUoN7ZSQT3EWxDB
bRdh45CmCAPDVKDITD2EIvA8oBXYGGBtSQWFWQEwgKKwL9gsgLtDKihQCWAF
iHRYq+wj9YBSDapuWQWVeDojADGwsRZ+BgEFuOgeiNEItwaqVJ82CMg865dp
ydnAS0fb8lg4C9jcdIbaG+zioIMq+7SLJA7IAeTrwtZBQ+kjuxrMyrRUHqBE
OdMDhAhoMm2yK2A4IDoQKZ027mlAmuOQ0AJLdLvFMwQDAU5vStbIY0moK/Ys
b/pPZhOVkLmFWwSKAawG3G3TzkAJAbOmPcIzbk8R6UCNBk7S/n2ZVPAdaDaj
GWINPAjcqiORLA7oZAAdUUNv4zPwZHtaxmdnhtTQ7+H2YcGOg1AHUgD6ASEK
73ltPL0+CVzZL+MzIA4utY0iENAH8AXkC4AQyAI2ciDRTACoAG4Dwg8OtpN/
3X/yJtXjt10gom0GeJoZ0P3nZlKBnuG4wnVQIQG1CbAZgDNqKc0JuBGQEVJk
m7SQCuG+zQBPhOW/CJMKNALMZJmh6OrPkJeAmiq7qA+CyAPUA9pGXY4U1FGr
DOBtBigBGIQ/qJ0gcYGbgaAFNQrkMswBwh30LeBHneGWh/BvJtWPMKkA/VFT
JSEMlIESeIiKoAOWyoFwOshrQB6hc8dDMisd/jYDPOnwQXlCQx007JLq3GWF
gcz4PiBZHxcHOiBotaBcAuBRPxrQKra0y7v/ZlIV1MARYh2oKoCKsBQ4zS5p
nrA+V5KSC8IIlHeQREM8gLIauMUAPwFePFYf7D1RH3ykSVVcKUggZ4AugK4r
DoaoOYIiAOpAp4fUhP5ulzB4iE+2c4bCvyqLDKZEE3qKTOXAwadQj/VoiW0y
q8grDSpwv48HUrbIOkhDwFWdLgomEPhwSKAOgGYL7Gk2RQ0WhVQHFz2q0GBB
t0Uq7iFLnQ6E6+E3cDQwKiAjHBbA8qCNNA4jDXtlUnyqRVY3HLaHgAP9Bc4c
du8OUFTA+kHgjlz8DGcOnwGTwKLqeRUseusBypZaH8ELlgKYOrOuQtIDcqG6
bXRHoxHYQxnVRSwoni36/md4dqQBbKZMTJnA+37fRXPgw7FcRtfyJPzw6vDF
Lvad3RUVrPlQdWCkdlx1sKjSCP4aUCftsYeFVfoCiWhjioKjLytVfQgrY6VW
MFcnC82jKLvoSrWrW9hNrP5YfIDPWIz6Oa6rUGCHfYSwb+I3+Ns//AWFLa8j
31MNuUyWQnK7nEYUyrcK7lJM0qEpvlhxfYd9H0wUPiKjhWvfqEgqy4mhNkk+
XtiK1844K8oQWegrjPFOyXLCE6V06NQlK5tpc8k7Xqbl+WkU+1S4SEdZOtMe
n2nfOtOe3dCJUzx1PS+9RDeUiJWMVtilQ79lbY9aTbw+oTsrVmvqiBV7N7k2
nhM3SlPxKlgvYhn/EdZrOcFt4uMt4rxAT+xajUwo2XkXB94tdfHdRRBkZYQA
DHedUMtJc7N2hkaJ1R4lW3upDUpF2QLjzcZGuSqZrtD9NutZq6dSnZiz205V
iapJ3uGMEUUs1TRlmv9hxersNlttvv3cdgjQZQToEQIcfyLM44pJ1QpXX3n8
zq5IvFlUlBKUb+5ZOqZvp01NiPs47dnJ5OKPqGFySKBL1FUzmEiX65PA7aO5
pynlYyDpUmAfh0Dg6h9R47imkH3uzgxTgRgF0fw2u+4O20sXOnvxgWwFuw7D
rstXYCq8pbVhb+LyDebwra5m0LfwlpvMIuFT3zpsisYdHbMT1mlK1j0i2x1z
m5faoaWe6NI5r9gfWnBrwSWmG8E+svsUsub9VoNtmvtIJm7sTzVu66pu3MkS
r25zOAHeFBFk5eu4Et6gp1stOaEq1zWSRfEVq4kiHV6x/rASChb3BamQ6GbR
KlllI9kUYddi2LUtHqlv/lXMAXnP1k3wLZaZXUmj6vLvq30S1/DmKSbnozTC
NyoKSXLFwcXnuRw71y85jw33tjqjqzTUBeF8oT02gzAyCx74ueggIYCE4g55
nsmWTUyRde4UM5Fb0X8pEXvqHgS6bkMzBLwA8dTh3ktuIEGsxLyACxIVbd2x
9NElaCqLCkayG1PBwnSJvk46fQjXQKkCI709sllOEanANiCkajHv4NtDpVJa
8i26aUl4qQQmk2Katil37VQtpIS/oFfiVK1Rjk2p7Vuij2u3SfxsdymbdXtV
BlvKNqVEcgTnkWoQmwlAx9YULKRQNSE1q5KDP7cHtawWI3cZgZkqI0t1zypx
LMV9uGCfcmLxcErZsAR+iwFUE1ZWO5+fjCWT6U5Qur1rGmFuvr4PREurMvnP
ROc/giFlNWK2r0shSJtkttwotArJctvQYi77eHOHZZN4bDB/96fur7xby1Rx
uo/dx5bAqJLRRmkRqpM0qoXcX2zpXMFAhnOAALFbpGJPGxjpxrkto/6AUX9I
qP+BGw6BMdnKNFzd6U7fwWV+aVjEUuDg6r4g7s6/tFMqs3ahqbnppWpwdYki
cK86I6I+k0aOgeYOk94jM8B6r7KrvzoFbZWYbvtWVi3XOZgGibmuWA4na6vm
hhnpbt98eGZVTu59Q+mrnLpaL+au7ptSwL1vSrX6e3hP6BJ7A+xXj4E/2eNQ
78QC2MDQn2EnCeytmL8MANfMar3qdGh4QgUTZUOpNVCYpOQafpm7QoA6ilkS
J5rVKs7olnvx1nRDD6UDqW56hSv8TF93vH60XDi9nQxgNb/VK+owG28NUNIz
X0dcmt0o9UbHQMvFpYYFBApzm1zBmMZHjy/gSBAC3dfn55bybw5HLc6s2LYJ
8P/zW1GLU9nKfqy0Sv7N7qBfy+wqPgHLWxETlUx9GDbMzFV1MgTLX8vF2nM0
k4IlTKr1SNbV7VZgCV9gQa24UNFO1vM5J1WDUL9YRKA6C+y9LqfOemkrx1qs
cfufz4GPI9Jyp5+tTp8NlVbXOn2VNe9wg57Mu6HaaT1kR5bnYAuj1TGXkisS
NZe9U10NM5sb3cvqHaJFYt23prraWJcf/+qyjX90+Opjng01rINev0OkuCQY
eWtu36TBZV958YCC32IFv8UK/jvLOEWFh25a4PqWJdlifCO16f2q73VMGNm1
ZGKWkmQ4dApIkKDSw5wCtVh0IEXqgl+igf5rfQUrDAssGIkppzCrAifu+chF
UY2c/hjbnIku79XNjNSFvpkKZ8m3C+pjqIMTedWu6m5lC0z+0jGQxCMksFlq
zE0UXwFgVpnJq/1vemMPXz6Rc8V52U3vGxDzmRi7ujklKbbVgacL1b0MLQ08
sitxhzeJuuitEi+dOMS+7tRA5a5InPr7cwdUqytxfOU5i0B/mfNt6S+PQQUT
7wBU8RyOR3+b5yX627fOt+uFfxWJUx+rytJkbYbG62NiX5w7oEGRp8YMNQGg
iA/rCFfqWLNeIWcB4o6v1GK4kPHu1JmH60R8RAYUB2Dofa/6wXBNKbXKQ+2F
Baa6Rk07AhtignZK1kpe+4nY0fJJ2Sugfax81SiR+GxOGb67O6kfNfw4ndXd
WTyvO1gFAn86HtZW/n+0csUpKucAAA==

-->

</rfc>
