<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-06" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-06">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3, and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-06"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2026" month="March" day="24"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 54?>

<t>This document proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction-and-rationale">
      <name>Introduction and Rationale</name>
      <t>AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS targets the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the need for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic is particularly advantageous for servers managing a large number of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, reducing the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is highly efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers integrate seamlessly into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite specifies the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>This document introduces additional cipher suites to accommodate AEGIS-based encryption algorithms:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X4_SHA256</tt></td>
            <td align="left">AEGIS-128X4</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X4_SHA512</tt></td>
            <td align="left">AEGIS-256X4</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale for recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites specified herein, these algorithms <bcp14>MUST</bcp14> be used with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specification detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="I-D.irtf-cfrg-aegis-aead"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(48, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the packet header are protected as specified in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the same procedure as in DTLS 1.3, with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 128 or 256 bits, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 5-byte (40-bit) mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(40, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation includes the cipher suites outlined in this document.</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM cipher suites of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aegis">the project repository</eref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed before encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Assigned IANA identifiers</name>
        <thead>
          <tr>
            <th align="center">Value</th>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">0x13,0x06</td>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0x13,0x07</td>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
      <t>Implementations <bcp14>MAY</bcp14> use the following identifiers reserved for local testing:</t>
      <table>
        <name>Additional identifiers</name>
        <thead>
          <tr>
            <th align="center">Test Value</th>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">0xff01</td>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff02</td>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff03</td>
            <td align="left">
              <tt>TLS_AEGIS_128X4_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">0xff04</td>
            <td align="left">
              <tt>TLS_AEGIS_256X4_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to assign the final identifiers.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-18"/>
        </reference>
      </references>
    </references>
    <?line 192?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            128 bits

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            256 bits

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+Va65LbRnb+j6fojP9IriHV3bizbO9ONCNLa42kaOR4HZdL
avSFxAoEuAA40qwtv0ryLMmL5etu8DZDyNJuqlKp8IdEAujT5/Kd75zTmMlk
EvRlX+kZOTm7+PbJ1aQQnVbkYbla6JZcrcted8Q0LXn19IqwaXhKzrffRK3I
v3z/5OFJIIqi1deQoVph+onSddlN+qqbCD3HN5qcBFL0et60NzNS1qYJylU7
I3277npOaU55EKhG1mIJRcZkBN26WJZdVzZ1f7PCg08uXj0Kgq6HHq9F1dS4
dKO7oFuKtn/913UD1f2VVTkjP/WNPCVd0/atNh2+3Sztl5+D4F3Tvp23zXoF
/V+1ou5WeIg8FTfWAVqu27K/OQmCt/oGT6pZEEyIdO7prHfwyymI/6Es/lX+
v7+uSxkE17pe61lAiNf45AfsVdZz8q3d7wTX52W/WBe48xetyk727MFR87G/
WPeLpsX2ZIJ1hJh1VXmHPYLSb8m5XeHuNO1c1OXfRA9P4a7o+uqGPKnl1N3V
S1FWM2KU/iOlZlrr/q7EK7Fc64o8XUtxTOSTWpXXpVqLijxEMNqyWPdNuy+9
cwImlRWQ/HG1nC51ENRNu4SEazgksCDY/iLkkoczt34A4+NSwQPkCsESywGN
nQPcq8tXz8lZ3wv5tiNNfQyXFpMenVflvBaVE9zKGXnY3qz6pmrmN0S/aMu6
J2etXECFU/JCrBBuTnn4IGehV0W0c93PyKLvV93swQO9skumpZDtFP54sHl4
ulLGLVCA+MzJcD873Za6s4Z60wg5f/5kRhidMkrTB3maTfKMTfJ8ksZJOGGv
GXfPbQLt15Q1QPynKXkxJZei77uuqYc7PlR/ahY1edHq9X/9++0HoOSMXLSl
tNfIS91pAXOB3wkwW3R9K2QfBK8WZUeQfOulhkNWbbNqOuR8rd8NMCedZwHP
DJDULzRxZEGMWJbAVmOc0lhf2jRXRNfSuhpgIaJC1gPkS08j8KCetw5H9nvj
hH2EW6xCyNym6qZe8SWQUQFMXwCFfduotfTb4PmXTqywd716v/zyhyeT82nZ
9mYiTTsfqERooT58IDBbfKYFCvGc17htTVmU88UEqHFArqUmYrWq7HIs6qaD
hzyIOmcmkkKThWjVO9FqIivRQYMOD15Nvn14eUpAAD3IYV12C8sRZd/pymAl
uGK+cBJMU1XNO3sTbEQQbZd6oLkgYFNEGN6Acku9BNGSVoODWm3DCgh5dXRV
Lsta2HBaebUebBFOYCcXEFFp581Vq2WzXK17H6xeFJUGb7a6W1e9068mUAb4
GPZTyP1awXKHKAlDgS/kAIyS1tkr0HIp15Vo4XChrkXdi7lu1h4YyJZrm+OQ
IeZWvCCV9R2p18sCmyBCsqlrLb17Az4lF+97XStYsO4giFjTdpYaLfo1lHVh
wvr9Z6wVcJXd5cALxrrMZkGr4Q5723oAwVIESG16K0dcg+CsL0izGlQJoUq9
sBBAesAIUVVkDxcbjUqvC4zXxpSytBvBsQ9ffN8hxVa26tgtLRy6lZalsW6r
kabrjc0DrIfqs80lIAssieh0kO2SSnc2XMCRVrsEgvFvt7lGChsDiHFOaHb4
tEJbIwBnV1iBVgdS/d6Dcy8bpre5oxwS8lPZYy+xLOCadV+V9YBMaA13ugDa
yOBSaclDNi38dJw+kO7/9PLRwyyKkg8fdlwyXM5ZlNrLW2IZLlNKwQX7LPOF
LWrXlgrgdPf8uTZlXbrf1mbtksU2Ax05ufz+6tXJqf+fPHvuvr+8wA4vL87t
96vHZ0+fbr8EwxNXj59///R892238uHzy8uLZ+d+Ma6Sg0vByeXZjyfeipPn
L149ef7s7OmJTcX+IBSWYOCdYognctmSGoo5GEyCNPADa/754Yv//A8WDa7g
jOVwxeBFlkb48Q6U6HdraoDL/4TPbwKQHcqJlWLhLsWq7EWFzAJWukXzriaI
vYY3v/zJeubnGfmqkCsWfTNcsAYfXNz47OCi89ndK3cWeyceuXRkm603D67f
8vShvmc/Hvze+H3v4ld/sNAlE5b94ZvAQugZEuCwibZORJ22POfxC0bbQPRS
gy7Rvi0HfG2ub2BpkV+tlZWCXO/tUsu1ore8e5hnyPreR3eXDqe2j3V75lP2
4QOiciHk4mAhGShnSL+zg2J4sSuG75Cv5AwNhSzdrXPRC3Lv7OLs/P4un13K
2vLRevrxmwMbaNLnXoTdZCG6xa1F607v7j++PHs4zCPfIeHOQVaD6x6ta2/P
vcffnT+6P/VeO3SE9bdTuwFHrhYg0xoDSF96Ccutxw/Istw2lC6F0FbZ3cGV
Vp8toxxtTka5UChV+sbkloZIUCFRYZaN7RzJ/vx1tP1Alf/1AFTkmWXs4fMr
sVEgZ1t//koeWwfvXwCxmVLZwIoKUw15qq/R5v8KsZORD7l96/cvbK9D7Bu4
7LUzDN1t9vQ10pfHyRuvrTXXXh3U9/fIzh7cIwXKNTn43BX7Z76Vuyf2z/wf
FRsdFRv9I2KxxAqNGX9Ddk7YCnJicXNPrL33KWK9E5zgPbF7Tvg7xUZHxUaf
KfaXmZ/svj554QcMdQD3g7w4+eDTud2081s6WSK11KZrG/Z2JGI2fGCfvBZt
id4Sib1cVc2N7yWh2ASKucpd3upGUNyt1M62vB2SY0OfGEodWd7pVoZujRRo
CW3cnWRLCptd9mYJ3zvP0RY/sn02amV/h6o23Ktc0Sx9iQUT7m3paibKueMj
x5Bit/Od3aD0DxsWdaWjGwqOl3unOzv1Sv0+W+4RpCv1Q882Wm+iKbMVxzbc
S4FmliBQkDTXyi1XzVBvNsVC3FSN2C8ae1vvvDSyWTzlLl5f7Jj6pZf7zM8Q
uzoWBE/qvWlzj27hpEGZzg0DcjOBdMP0NcxyQ4fu/aN0j6lgXzPbbu67gU89
liwIRpHvw7AU3VuL0bmudeuKLMI3gN5D8Y0/F3njMPfm33TbvBDqzTYL7Jxq
dlH52AxskeROtHZoAnxIpet5v8DlN139GinzxkdrX+qokXaVt6rX7/uf6HTK
kp/fzIZMa7ueMHDEjcW9B6SPw26JFVA3cPxrqDEs9Ha7q4NyCFrpBjLLu3Dq
hnkwRuvVQBNDfmOMhoqOclAgt0llM5tE3uiNz/3E61rlTbjhnt9++y1wT3w9
nEjdi7JT4l1zSgb/37tj9CnZmnH/vhMCaLq+4TG8D9VfbGHu8OjPrbazX6fn
bnbfuGkl5Fv0fgu/1rYnQ5p4dY+kB4Ybtp8e0f8EBN2UuB3P7M7lfir9LqIW
q48h6q7Gn4+n/yUoxROrBbkXUWv1/c/HFD0l3jmfi6nnK70plrbF69Di+d8Y
J55bdroubSNaAUDWlu0R1NnFle1AYdMwUsP4PeoVc0vZPbHyJpaFazSLwh+9
nt4qYd5Tw5GGd/MVaZs1CGpbnHcjma1kq7a0ziv/ptVwZLQt8Zv5fph57hbM
/bJzMPhODwy2B2AYU4eC2dmzfD1u/Skp0TC48zLvvI3CO03H88Yd/GyO8m7f
Mk6Ta7Qy8E83vFIA+NB8+wOHJwcbAxCiXyN2Xzq31AiIxZGf51FIsRVmEo1e
B15cu9HFNTl25iFIoumXFo52EHRbu/O226ZJPFrYzspGSPTkp+HQ5S+IPfZA
i1ba4fLne5vTb/+iYooIPfj4q4r7zqLNi5M7eDxzLdh65UaeTVcznJbtzNoU
ZJjFv0K79U2UffXA/j8U5243JTo+gkwLIu1auOGAY69p2QHkY61KMtRoxOPs
2dkdzd1FtJtQYW6HbHcseHAo60crcLA7nNueTR2MbC/d4vbGDXOE/Kuo1tq1
zudOcd+EHDTPjlwnz7/Dt5ebDMHWtlefDbPWjOy+3x3gZkeembn19D0LT+l7
mpDxKcVqSX70mrjPs92ssFmfkvFRb3z9big464ZzdefjPTfaWeDJLehenv3o
zgnGfe9PWYZD3aqRoEXkoUWT8/orfB8cP+72T/L7xxz/cc8T+M4YytxGHxln
x30/SOC3JdyeBX9XQnhMh+hzdIiO6RB9gg57CNgdktwOv4NE515naHe2Zc9N
HGA209vhouFFUYEyZXP54r2wAEICf/HF9nDnsX1TsRBv7YskXHbD0lH8+kKN
R5HttjTP9hAii4IXKVeCFzKlushiIzSNRWaSQuY8D8jRT2JCzU2e5KGO85SL
tOAiVCKhmY41hAXBQgPVr+1ku79dkaZxHmlVZKJQISpXpIrUxGgH4yzJNRvZ
Lk+MMamipmCFhsLGFELILKaFidJcZUHgKsRr1KXWvu7cfMJQKCqYTGiqJQ0L
mutEqjzLwySjUvOR7RgVyoSUCsEMTxKqWcG5ZtSwlJqcC1i38f3BlixOWCQi
nYhExjkeT3SeJlRJTinlYsw6LgxPVYJmVKShTBKRR2mqdFQkOU3C3ASBrOyb
ltvmJTqhUCwzSqUyK2gmZEx1TFlmRJprObJdaDKpuNaUh2GWMMYKqlLBKU91
LFmRbbfbGelAw6M0KpRUmc5kpoxhmTAIGcIWRYCOOLKuvIayETc6ygpFs0TK
WClhorDQUUypojI1wIp/b3Z7Pw21tGARo5HIcmmU4XGomaGahpQX9Mg6tx9A
xVnGIsqzMEl5nsdAJeNUpLIAHvjQcd5NmV3J+FjGpDxSEYMwKZRMojBWUUhh
VpLGCYwcC3KseaIUjaNIsDwFMLmkGVYaJGoBfccyhiEVVcqxOgQOecZSlSZZ
IfA9svaNBZlKmsJ3MhJFJGUY8VClAKQMJSRGxViiMRXJiOVRFIeqQIYZKbI0
zIpI51qEY5BKs7AoEpXnJk5zAyhzE+e5THLJZGrTeiQ/jUK6UFkkPOZFCIeo
vMgyFRdKZ3EYjrEPDaUQMRNMFcJuIDXLtBY0TGKFeNAxLZklKzBdHnMWZZwx
SnXGuEmLNM94NrIsyjM4DhBPpUqQnyaNkgghlEZwTqNkjA3iWCPTkGQx6DXN
CsOUEFHCEzhXZlk4sl2RRbzQMk6zNMmNzoVOTGESheTkWR6PLaNcI7ZgczgS
BILEUTRKBVgB40ES6VGqQ8BsqPPC0IxBVQmaLKRKIyHzNB3jnhS0w0BYRRTx
xERKyBBVmGXULo7DMVgKqmJ8WFREIQAVGWBTFnHOaBZGGR1bFgEZPC9yxFpJ
sH+mQxGaAj5FBPLRZSoHqcZ5rLVOjQFbGYQt1hG8KRjIc4zpwKQhnB8WLMrD
lIGMU6icR5wjMZBLY8lDWa50HqF25pxLLmOGnEAO0gKkp6MxgtRUcBbHRivr
Ci54HmfgS2nA/mFkxuAcgX6KWEZUJyg2MQziSHlZZKnJCs3lGK+GSaKZLlBL
OUg4EyLJWQg60yaOOEhsZDsJAo2ymMcS6SlZIoARpHiSxYlG+TlG4866zADr
qCsFSoQOsxzl1KDosxQdBgOtj22H5kPFSYzOANWfmahAfwG45ZlIjURjMrD4
kTdad06myKXo3n5al3SL7IcPyjejHGUnojFFM0EzoE4A6xI1TFNboW8fcjgp
jKK8chaCiIEFlqIs5aCtgkmmGEqZ/Xuy4STkYNfNe5jAHa/cVQg+VJrJjLHR
YrbfhP+fMs3mdI5e49Pr9N9p2HHc/b5dx/2B/olxzkMeoZYlHPzIbSoX4AE0
W3zUH5uDulF/aNsqaJ6nH/PHdlr6f+CRFKU/lgZqb84Oz+TbunlXaeUPmzGS
+dcdWn19YkTVaTuD/aDJu2ZdKf8nRO7PbuyfnB7720P/x1zr+dwP3GTRvBuO
XLuFE7F5iTUckMimtsbbkyrHRhsmmgb/DdTQVQWcLAAA

-->

</rfc>
