Hi All,

A new TLS extension draft for omitting the explicit nonce included in every 
record when AEAD ciphers are used has been proposed. This extension allows the 
Client Hello & Server Hello messages to negotiate a method for generating 
explicit nonce and thereby omit including it in every TLS/DTLS record.

Request your comments & suggestions.

Thanks!
 
Regards,
Jay

***************************************************************************************
This e-mail and attachments contain confidential information from HUAWEI, which 
is intended only for the person or entity whose address is listed above. Any 
use of the information contained herein in any way (including, but not limited 
to, total or partial disclosure, reproduction, or dissemination) by persons 
other than the intended recipient's) is prohibited. If you receive this e-mail 
in error, please notify the sender by phone or email immediately and delete it!
***************************************************************************************

-----Original Message-----
From: internet-dra...@ietf.org [mailto:internet-dra...@ietf.org] 
Sent: 29 September 2015 21:17
To: Jayaraghavendran k; Jayaraghavendran k; Raja ashok; Raja ashok
Subject: New Version Notification for 
draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt


A new version of I-D, draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt
has been successfully submitted by Jayaraghavendran K and posted to the IETF 
repository.

Name:           draft-jay-tls-omit-aead-explicit-nonce-extension
Revision:       00
Title:          TLS/DTLS Omit AEAD Explicit Nonce from Record Extension
Document date:  2015-09-29
Group:          Individual Submission
Pages:          8
URL:            
https://www.ietf.org/internet-drafts/draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt
Status:         
https://datatracker.ietf.org/doc/draft-jay-tls-omit-aead-explicit-nonce-extension/
Htmlized:       
https://tools.ietf.org/html/draft-jay-tls-omit-aead-explicit-nonce-extension-00


Abstract:
   With emergence of Internet of Things(IoT), DTLS is being widely
   considered as a protocol of choice for communication security in IoT
   applications. Further, AES_CCM has emerged as the cipher of choice in
   constrained environments. Constrained Application Protocol (CoAP),
   which is the application layer protocol for resource constrained
   environments, mandates DTLS as underlying security protocol and
   proposes AES_CCM based ciphers to be used with different key exchange
   methods. AEAD ciphers requires an explicit nonce of 8 bytes must be
   carried in each transmitted record.This document defines a TLS (and
   DTLS) extension, which will allow clients and servers to omit the
   explicit nonce sent in TLS/DTLS records.  This document can be
   considered as an extended version of "Transport Layer Security (TLS)
   Extensions : Extension Definitions". The extension defined in this
   document apply equally to both DTLS and TLS protocols.

                                                                                
  


Please note that it may take a couple of minutes from the time of submission 
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to