Open ydnar opened 3 days ago
Related Issues
(Emoji vote if this was helpful or unhelpful; more detailed feedback welcome in this discussion.)
It still seems early. Is there any real world software that supports this today?
CC @golang/security
I'm happy to send a CL with https://github.com/ericlagergren/aegis, obviously being updated from 00 to 13.
What is the advantage of AEGIS over AES-GCM in TLS 1.3, considering that nonce reuse is not a concern in TLS 1.3?
What is the advantage of AEGIS over AES-GCM in TLS 1.3, considering that nonce reuse is not a concern in TLS 1.3?
Performance.
It would be good to have AEGIS in x/crypto
, and Eric's Go implementation is an excellent starting point.
But regarding crypto/tls
, and although some TLS implementations already support AEGIS-based cipher suites, it may bit a bit premature. The document about usage of AEGIS in TLS 1.3 is distinct from the CFRG one, and hasn't been proposed to the TLS WG yet -- it will be after the document on the construction itself has at least reached the IESG review step.
Proposal Details
Resurrecting #58724 in a new proposal.
Voting for publication of AEGIS as an RFC closes December 12: https://mailarchive.ietf.org/arch/msg/cfrg/0T3m_Pageq7PIukaiG3Nxx4ENCM/
cc @jedisct1