Hi All, A new TLS extension draft for omitting the explicit nonce included in every record when AEAD ciphers are used has been proposed. This extension allows the Client Hello & Server Hello messages to negotiate a method for generating explicit nonce and thereby omit including it in every TLS/DTLS record.
Request your comments & suggestions. Thanks! Regards, Jay *************************************************************************************** This e-mail and attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient's) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it! *************************************************************************************** -----Original Message----- From: internet-dra...@ietf.org [mailto:internet-dra...@ietf.org] Sent: 29 September 2015 21:17 To: Jayaraghavendran k; Jayaraghavendran k; Raja ashok; Raja ashok Subject: New Version Notification for draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt A new version of I-D, draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt has been successfully submitted by Jayaraghavendran K and posted to the IETF repository. Name: draft-jay-tls-omit-aead-explicit-nonce-extension Revision: 00 Title: TLS/DTLS Omit AEAD Explicit Nonce from Record Extension Document date: 2015-09-29 Group: Individual Submission Pages: 8 URL: https://www.ietf.org/internet-drafts/draft-jay-tls-omit-aead-explicit-nonce-extension-00.txt Status: https://datatracker.ietf.org/doc/draft-jay-tls-omit-aead-explicit-nonce-extension/ Htmlized: https://tools.ietf.org/html/draft-jay-tls-omit-aead-explicit-nonce-extension-00 Abstract: With emergence of Internet of Things(IoT), DTLS is being widely considered as a protocol of choice for communication security in IoT applications. Further, AES_CCM has emerged as the cipher of choice in constrained environments. Constrained Application Protocol (CoAP), which is the application layer protocol for resource constrained environments, mandates DTLS as underlying security protocol and proposes AES_CCM based ciphers to be used with different key exchange methods. AEAD ciphers requires an explicit nonce of 8 bytes must be carried in each transmitted record.This document defines a TLS (and DTLS) extension, which will allow clients and servers to omit the explicit nonce sent in TLS/DTLS records. This document can be considered as an extended version of "Transport Layer Security (TLS) Extensions : Extension Definitions". The extension defined in this document apply equally to both DTLS and TLS protocols. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls