Internet-Draft | ipcrypt | September 2025 |
Denis | Expires 13 March 2026 | [Page] |
IP addresses are personally identifiable information that requires protection, yet common techniques such as truncation destroy data irreversibly while providing inconsistent privacy guarantees, and ad-hoc encryption schemes often lack interoperability and security analysis.¶
This document specifies secure, efficient methods for encrypting IP addresses for privacy-preserving storage, logging, and analytics. The methods enable data analysis while protecting user privacy from third parties without key access, addressing data minimization concerns raised in [RFC6973].¶
Four concrete instantiations are defined: ipcrypt-deterministic
provides deterministic, format-preserving encryption with 16-byte outputs; ipcrypt-pfx
provides deterministic, prefix-preserving encryption that maintains network relationships with native address sizes (4 bytes for IPv4, 16 bytes for IPv6); while ipcrypt-nd
and ipcrypt-ndx
introduce randomness to prevent correlation. All methods are reversible with the encryption key and designed for high-performance processing at network speeds.¶
This note is to be removed before publishing as an RFC.¶
Source for this draft and an issue tracker can be found at https://github.com/jedisct1/draft-denis-ipcrypt.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 13 March 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
IP addresses are personally identifiable information requiring protection, yet common anonymization approaches have fundamental limitations. Truncation (zeroing parts of addresses) irreversibly destroys data while providing variable privacy levels; A /24 mask may obscure one user or thousands depending on network allocation. Hashing produces non-reversible outputs that are unsuitable for operational tasks such as abuse investigation. Ad-hoc encryption schemes often lack rigorous security analysis and have limited interoperability between systems.¶
This document addresses these deficiencies by specifying secure, efficient, and interoperable methods for IP address encryption and obfuscation. The objective is to enable network operators, researchers, and privacy advocates to share or analyze data while protecting sensitive address information through cryptographically sound techniques.¶
This specification addresses concerns raised in [RFC7624] regarding confidentiality when sharing data with third parties. Unlike existing practices that obscure addresses, these methods provide mathematically provable security properties, which are discussed throughout this document and summarized in Section 8.¶
Organizations handling IP addresses require mechanisms to protect user privacy while maintaining operational capabilities. Generic encryption systems present challenges for IP addresses: such systems expand data unpredictably, lack compatibility with network tools, and operate at reduced speeds for high-volume processing. The specialized methods in this specification address these requirements through cryptographic techniques designed for IP addresses:¶
Efficiency and Compactness: All variants operate on 128 bits, achieving single-block encryption speed required for network-rate processing. Non-deterministic variants add only 8-16 bytes of tweak overhead versus potentially hundreds of bytes with generic encryption. This characteristic enables processing addresses in real-time rather than requiring batch operations.¶
High Usage Limits: Non-deterministic variants safely handle massive volumes - approximately 4 billion operations for ipcrypt-nd
and 18 quintillion for ipcrypt-ndx
per key - without degrading security. Generic encryption often requires complex key rotation schemes at lower thresholds.¶
Format Preservation: The ipcrypt-deterministic
and ipcrypt-pfx
variants produce valid IP addresses rather than arbitrary ciphertext, enabling encrypted addresses to pass through existing network infrastructure, monitoring tools, and databases without modification. The ipcrypt-pfx
variant uniquely preserves network prefix relationships while maintaining the original address type and size, enabling network-level analytics while protecting individual address identity (see Section 5.2).¶
Interoperability: This specification ensures that encrypted IP addresses can be exchanged between different systems, vendors, and programming languages. All conforming implementations produce identical results, enabling data exchange between systems and avoiding vendor lock-in.¶
These specialized encryption methods enable several use cases:¶
Privacy Protection: They prevent the exposure of sensitive user information to third parties in logs, analytics data, and network measurements ([RFC6973]). Protection is specifically against parties without key access; the key holder retains decryption capability.¶
Correlation Attack Resistance: While deterministic encryption can reveal repeated inputs, the non-deterministic variants leverage random tweaks to hide patterns and enhance confidentiality (see Section 7).¶
Privacy-Preserving Analytics: Encrypted IP addresses can be used directly for operations such as counting unique clients, rate limiting, or deduplication—without revealing the original values to third-party processors. This approach addresses the anonymization requirements for DNS query data sharing outlined in [RSSAC040], enabling research while protecting source IP privacy. The ipcrypt-pfx
variant specifically preserves network prefixes for network-level analytics, while other methods completely scramble network hierarchy. Organizations requiring geographic or ASN metadata with non-prefix-preserving modes SHOULD extract and store such data separately (e.g., country, ASN) rather than utilizing IP address truncation, which provides inconsistent privacy protection and irreversibly destroys information.¶
Third-Party Integration: Encrypted IP addresses can serve as privacy-preserving identifiers when interacting with untrusted services, cloud providers, or external platforms.¶
For implementation guidelines and practical examples, see Section 9.¶
This section is to be removed before publishing as an RFC.¶
This document does not conflict with active IETF working group efforts. While the IETF has produced several RFCs related to privacy ([RFC6973], [RFC7258], [RFC7624]), there is no current standardization effort for IP address encryption methods. This specification complements existing IETF privacy guidance by providing implementation methods.¶
The cryptographic primitives used (AES, format-preserving encryption) align with IETF cryptographic recommendations, and the document follows IETF formatting and terminology conventions where applicable.¶
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Throughout this document, the following terms and conventions apply:¶
IP Address: An IPv4 or IPv6 address as defined in [RFC4291].¶
16-Byte Representation: A fixed-length representation used for both IPv4 (via IPv4-mapped IPv6) and IPv6 addresses.¶
Tweak: A non-secret, additional input to a tweakable block cipher that further randomizes the output.¶
Deterministic Encryption: Encryption that always produces the same ciphertext for a given input and key.¶
Non-Deterministic Encryption: Encryption that produces different ciphertexts for the same input due to the inclusion of a randomly sampled tweak.¶
(Input, Tweak) Collision: A scenario where the same input is encrypted with the same tweak. This reveals that the input was repeated but not the input’s value.¶
This section describes the conversion of IP addresses to and from a 16-byte representation. This conversion is used by ipcrypt-deterministic
, ipcrypt-nd
, and ipcrypt-ndx
to operate a 128-bit cipher on both IPv4 and IPv6 addresses. The ipcrypt-pfx
method differs by maintaining native address sizes—4 bytes for IPv4 and 16 bytes for IPv6—to preserve network structure (see Section 6).¶
IPv6 addresses are natively 128 bits and are converted directly using network byte order (big-endian) as specified in [RFC4291].¶
Example:¶
IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 16-Byte Representation: [20 01 0d b8 85 a3 00 00 00 00 8a 2e 03 70 73 34]¶
IPv4 addresses (32 bits) are mapped using the IPv4-mapped IPv6 format as specified in [RFC4291]:¶
IPv4 Address: 192.0.2.1 16-Byte Representation: [00 00 00 00 00 00 00 00 00 00 FF FF C0 00 02 01]¶
The conversion algorithm is as follows:¶
This specification defines two generic cryptographic constructions:¶
Valid options for implementing a tweakable block cipher include, but are not limited to:¶
KIASU-BC (see Section 9.9 for implementation details)¶
AES-XTS (see Section 7.4.2 for usage)¶
Implementers MUST choose a cipher that meets the required security properties and provides robust resistance against related-tweak and other cryptographic attacks.¶
Deterministic encryption applies a 128-bit block cipher directly to the 16-byte representation of an IP address. The defining characteristic is that the same IP address consistently encrypts to the same ciphertext when using the same key.¶
Deterministic encryption is appropriate when:¶
Duplicate IP addresses need to be detected in encrypted form (e.g., for rate limiting)¶
Storage space is critical (produces only 16 bytes output)¶
Format preservation is required (output remains a valid IP address)¶
Correlation of the same address across records is acceptable¶
All instantiations documented in this specification (ipcrypt-deterministic
, ipcrypt-pfx
, ipcrypt-nd
, and ipcrypt-ndx
) are invertible, allowing encrypted IP addresses to be decrypted to their original values using the same key. For non-deterministic modes, the tweak must be preserved along with the ciphertext to enable decryption.¶
Implementation details are provided in Section 9.¶
The ipcrypt-deterministic
instantiation employs AES-128 in a single-block operation. The key MUST be exactly 16 bytes (128 bits) in length. As AES-128 is a permutation, each distinct 16-byte input maps to a unique 16-byte ciphertext, preserving the IP address format.¶
Test vectors are provided in Appendix A.1.¶
+---------------------+ | IP Address | | (IPv4 or IPv6) | +---------------------+ | v +---------------------+ | Convert to 16 Bytes | +---------------------+ | v +---------------------+ | AES128 Encrypt | | (Single Block) | +---------------------+ | v +---------------------+ | 16-Byte Output | +---------------------+ | v +---------------------+ | Convert to IP Format| +---------------------+¶
Most encryption methods in this specification scramble network hierarchy, with the notable exception of ipcrypt-pfx
:¶
ipcrypt-deterministic
, ipcrypt-nd
, and ipcrypt-ndx
: These methods completely scramble IPv4 and IPv6 prefixes in the encrypted output. Addresses from the same subnet appear unrelated after encryption, and geographic or topological proximity cannot be inferred.¶
ipcrypt-pfx
: This method preserves network prefix relationships in the encrypted output. Addresses from the same subnet share a common encrypted prefix, enabling network-level analytics while protecting the actual network identity. The encrypted prefixes themselves are cryptographically transformed and unrecognizable without the key.¶
The methods specified in this document typically result in IPv4 addresses being encrypted as IPv6 addresses.¶
IPv4 format preservation (maintaining IPv4 addresses as IPv4 rather than mapping them to IPv6) is not specified in this document and is generally discouraged due to the limited 32-bit address space, which significantly reduces encryption security.¶
If IPv4 format preservation is absolutely required despite the security limitations, implementers SHOULD implement a Format-Preserving Encryption (FPE) mode such as the FF1 algorithm specified in [NIST-SP-800-38G] or FAST [FAST].¶
Organizations requiring network metadata for analytics have two options:¶
Use ipcrypt-pfx
to preserve network structure within the encrypted addresses, enabling network-level analysis while keeping actual network identities encrypted.¶
For non-prefix-preserving modes (ipcrypt-deterministic
, ipcrypt-nd
, ipcrypt-ndx
), extract and store metadata (geographic location, ASN, network classification) as separate fields before encryption.¶
Both approaches provide advantages over IP address truncation (e.g., storing only /24 or /48 prefixes), which provides inconsistent protection and irreversibly destroys data.¶
Recommended approach: 1. Extract metadata (geographic location, ASN, network type) from the original IP address 2. Store this information as separate fields alongside the encrypted IP address 3. Apply appropriate privacy-preserving aggregation to the metadata itself¶
Example storage schema: ~~~ { “encrypted_ip”: “bde9:6789:d353:824c:d7c6:f58a:6bd2:26eb”, “country”: “US”, “asn”: 15169, “network_type”: “cloud_provider” } ~~~¶
This approach ensures consistent privacy protection through encryption while preserving analytical capabilities.¶
Prefix-preserving encryption maintains network structure in encrypted IP addresses. Addresses from the same network produce encrypted addresses that share a common prefix, enabling privacy-preserving network analytics while preventing identification of specific networks or users.¶
Unlike standard encryption that completely scrambles addresses, prefix-preserving encryption enables network operators to:¶
Detect traffic patterns from common networks without knowing which specific networks¶
Perform network-level rate limiting on encrypted addresses¶
Implement DDoS mitigation while preserving user privacy¶
Analyze network topology without accessing raw IP addresses¶
This mode balances privacy with analytical capability: individual addresses remain encrypted and network identities are cryptographically transformed, but network relationships remain visible through shared encrypted prefixes.¶
The encryption process achieves prefix preservation through a bit-by-bit transformation that maintains consistency across addresses with shared prefixes. For any two IP addresses sharing the first N bits, their encrypted forms also share the first N bits. This property holds recursively for all prefix lengths.¶
The algorithm operates as follows:¶
Process each bit position sequentially from most significant to least significant¶
For each bit position, extract the prefix (all bits processed so far) from the original IP address¶
Apply a pseudorandom function (PRF) that takes the padded prefix as input to generate a cipher bit¶
XOR the cipher bit with the original bit at the current position to produce the encrypted bit¶
The encrypted bit depends deterministically on the prefix from the original IP, ensuring identical prefixes always produce identical encrypted prefixes¶
This construction ensures:¶
Identical prefixes always produce identical transformations for subsequent bits¶
Different prefixes produce cryptographically distinct transformations¶
The transformation is deterministic yet cryptographically secure¶
Network relationships are preserved while actual network identities remain encrypted¶
The algorithm maintains native address sizes: IPv4 addresses remain 4 bytes (32 bits) and IPv6 addresses remain 16 bytes (128 bits).¶
The ipcrypt-pfx
instantiation implements prefix-preserving encryption using a pseudorandom function based on the XOR of two independently keyed AES-128 encryptions.¶
The pseudorandom function requires a 32-byte key split into two independent 16-byte AES-128 keys (K1
and K2
). For each bit position, the algorithm performs:¶
Padding: The prefix (all bits processed so far from the original IP address) is padded to 128 bits using the format zeros || 1 || prefix_bits
, where:¶
The prefix bits are extracted from the most significant bits of the original IP address¶
A single 1
bit serves as a delimiter at position prefix_len_bits
¶
The prefix bits are placed immediately after the delimiter, from high to low positions¶
For an empty prefix (processing the first bit), this produces a block with only a single 1
bit at position 0¶
Dual Encryption: The padded prefix is encrypted independently with both K1
and K2
, producing two 128-bit outputs (e1
and e2
).¶
XOR Combination: The final PRF output is computed as e = e1 ⊕ e2
.¶
For each bit position (processing from MSB to LSB):¶
Pad the prefix (bits processed so far from the original IP) to 128 bits¶
Compute the PRF output using the padded prefix: e = AES(K1, padded_prefix) ⊕ AES(K2, padded_prefix)
¶
Extract the least significant bit from the PRF output as the cipher bit¶
XOR the cipher bit with the original bit at the current position to produce the encrypted bit¶
Complete pseudocode implementation is provided in Section 9.6.¶
CRITICAL: The two 16-byte halves of the 32-byte key (K1 and K2) MUST NOT be identical. Using identical values for K1 and K2 (e.g., repeating the same 16 bytes twice) causes the XOR operation to cancel out, returning the original IP address unchanged.¶
The ipcrypt-pfx
construction improves upon earlier designs like CRYPTO-Pan through enhanced cryptographic security:¶
Sum-of-Permutations: The XOR of two independently keyed AES-128 permutations provides security beyond the birthday bound [SUM-OF-PRPS], supporting more than 2^78 distinct IP addresses per key [REVISITING-SUM]. This construction ensures that even with billions of encrypted addresses, security remains robust.¶
Prefix-Based Context Isolation: Each bit depends on the entire prefix history.¶
Note: Prefix-preserving encryption intentionally reveals network structure to enable analytics. Organizations requiring complete address obfuscation should use non-prefix-preserving modes.¶
Key implementation characteristics:¶
Computational Requirements:¶
Performance Optimizations:¶
Caching encrypted prefix values (e1 and e2) significantly improves performance for addresses sharing common prefixes¶
The encryption algorithm is inherently parallelizable since AES computations for different bit positions are independent¶
The padded prefix computation can be optimized by maintaining state across iterations: instead of recomputing the padded prefix from scratch for each bit position, implementations can shift the previous padded prefix left by one bit and insert the next input bit.¶
Non-deterministic encryption enhances privacy by ensuring that the same IP address produces different ciphertexts each time it is encrypted, preventing correlation attacks that plague deterministic schemes. This is achieved through tweakable block ciphers that incorporate random values called tweaks.¶
Non-deterministic encryption is appropriate when:¶
Preventing correlation of the same IP address across records is critical¶
Storage can accommodate the additional tweak data (8-16 bytes)¶
Stronger privacy guarantees than deterministic encryption provides are required¶
Processing the same address multiple times without revealing repetition patterns¶
Implementation details are provided in Section 9.¶
The encryption process for non-deterministic modes consists of the following steps:¶
Generate a random tweak using a cryptographically secure random number generator¶
Convert the IP address to its 16-byte representation¶
Encrypt the 16-byte representation using the key and the tweak¶
Concatenate the tweak with the encrypted output to form the final ciphertext¶
The tweak is not considered secret and is included in the ciphertext, enabling its use for decryption.¶
The decryption process consists of the following steps:¶
Split the ciphertext into the tweak and the encrypted IP¶
Decrypt the encrypted IP using the key and the tweak¶
Convert the resulting 16-byte representation back to an IP address¶
Although the tweak is generated uniformly at random, occasional collisions may occur according to birthday bounds. Such collisions are benign when they occur with different inputs. An (input, tweak)
collision reveals that the same input was encrypted with the same tweak but does not disclose the input’s value. The usage limits discussed below apply per cryptographic key; rotating keys can extend secure usage beyond these bounds.¶
The output of non-deterministic encryption is binary data. For applications that require text representation (e.g., logging, JSON encoding, or text-based protocols), the binary output MUST be encoded. Common encoding options include hexadecimal and Base64. The choice of encoding is application-specific and outside the scope of this specification. However, implementations SHOULD document their chosen encoding method clearly.¶
This document defines two concrete instantiations:¶
ipcrypt-nd
: Uses the KIASU-BC tweakable block cipher with an 8-byte (64-bit) tweak. See [KIASU-BC] for details.¶
ipcrypt-ndx
: Uses the AES-XTS tweakable block cipher with a 16-byte (128-bit) tweak. See [XTS-AES] for background.¶
In both cases, if a tweak is generated randomly, it MUST be uniformly random. Reusing the same randomly generated tweak on different inputs is acceptable from a confidentiality standpoint.¶
Test vectors are provided in Appendix A.3 and Appendix A.4.¶
The ipcrypt-nd
instantiation uses the KIASU-BC tweakable block cipher with an 8-byte (64-bit) tweak. Implementation details are provided in Section 9.9. The output is 24 bytes total, consisting of an 8-byte tweak concatenated with a 16-byte ciphertext.¶
Random sampling of an 8-byte tweak yields an expected collision for a specific tweak value after about 2^(64/2) = 2^32 operations (approximately 4 billion operations). If an (input, tweak)
collision occurs, it indicates that the same input was processed with that tweak without revealing the input’s value.¶
These collision bounds apply per cryptographic key. Regular key rotation can extend secure usage beyond these bounds. The effective security is determined by the underlying block cipher’s strength.¶
Test vectors are provided in Appendix A.3.¶
The ipcrypt-ndx
instantiation uses the AES-XTS tweakable block cipher with a 16-byte (128-bit) tweak. The output is 32 bytes total, consisting of a 16-byte tweak concatenated with a 16-byte ciphertext.¶
For AES-XTS encryption of a single block, the computation avoids the sequential tweak calculations required in full XTS mode. Independent sampling of a 16-byte tweak results in an expected collision after about 2^(128/2) = 2^64 operations (approximately 18 quintillion operations).¶
Similar to ipcrypt-nd
, an (input, tweak)
collision reveals repetition without compromising the input value. These limits are per key, and regular key rotation further extends secure usage. The effective security is governed by the strength of AES-128 (approximately 2^128 operations).¶
Mode selection depends on specific privacy requirements and operational constraints:¶
Deterministic (ipcrypt-deterministic
):¶
Prefix-Preserving (ipcrypt-pfx
):¶
Output size: 4 bytes for IPv4, 16 bytes for IPv6 (maintains native sizes)¶
Privacy: Preserves network prefix relationships while encrypting actual network identities¶
Use case: Network analytics, traffic pattern analysis, subnet monitoring, DDoS mitigation¶
Performance: Bit-by-bit processing (64 AES operations for IPv4, 256 for IPv6)¶
Non-Deterministic ipcrypt-nd
(KIASU-BC):¶
Non-Deterministic ipcrypt-ndx
(AES-XTS):¶
While this specification recommends uniformly random tweaks for non-deterministic encryption, alternative approaches may be considered:¶
Monotonic Counter: A counter could be used as a tweak, but this is difficult to maintain in distributed systems. If the counter is not encrypted and the tweakable block cipher is not secure against related-tweak attacks, this could enable correlation attacks.¶
UUIDs: UUIDs (such as UUIDv6 or UUIDv7) could be used as tweaks; however, these would reveal the original timestamp of the logged IP addresses, which may not be desirable from a privacy perspective.¶
Although the birthday bound presents considerations with random tweaks, random tweaks remain the recommended approach for practical deployments.¶
The methods specified in this document provide strong confidentiality guarantees but explicitly do not provide integrity protection. This distinction is significant for secure deployment:¶
These methods provide protection against:¶
Unauthorized parties learning the original IP addresses (without the key)¶
Statistical analysis revealing patterns in network traffic (non-deterministic modes)¶
Brute-force attacks on the address space (128-bit security level)¶
These methods do not provide protection against:¶
Active attackers modifying, reordering, or removing encrypted addresses¶
Authorized key holders decrypting addresses (by design)¶
Traffic analysis based on volume and timing (metadata)¶
Applications requiring integrity protection must additionally employ authentication mechanisms such as HMAC, authenticated encryption modes, or digital signatures over the encrypted data. While outside this specification’s scope, implementers should evaluate whether their threat model requires such additional protections.¶
A permutation ensures distinct inputs yield distinct outputs. However, repeated inputs result in identical ciphertexts, thereby revealing repetition.¶
This property renders deterministic encryption suitable for applications where format preservation is required and linkability of repeated inputs is acceptable.¶
The inclusion of a random tweak ensures that encrypting the same input generally produces different outputs. In cases where an (input, tweak)
collision occurs, an attacker learns only that the same input was processed with that tweak, not the value of the input itself.¶
Security is determined by the underlying block cipher (≈2^128 for AES-128) on a per-key basis. Key rotation is recommended to extend secure usage beyond the per-key collision bounds.¶
Implementations MUST ensure that:¶
This specification focuses on the cryptographic transformations and does not mandate specific key management practices. However, implementers MUST ensure:¶
Keys are generated using cryptographically secure random number generators (see [RFC4086])¶
Keys are stored securely and access-controlled appropriately for the deployment environment¶
Key rotation policies are established based on usage volume and security requirements¶
Key compromise procedures are defined and tested¶
For high-volume deployments processing billions of IP addresses, regular key rotation (e.g., monthly or quarterly) is RECOMMENDED to stay well within the security bounds discussed in this document.¶
This section provides detailed pseudocode and implementation guidance for the key operations described in this document.¶
In the pseudocode throughout this document, the notation “for i from x to y” indicates iteration starting at x (inclusive) and ending before y (exclusive). For example, “for i from 0 to 4” processes values 0, 1, 2, and 3, but not 4.¶
The following diagrams illustrate the key processes described in this specification.¶
IPv4: 192.0.2.1 | v Octets: C0 00 02 01 | v 16-Byte Array: [00 00 00 00 00 00 00 00 00 00 | FF FF | C0 00 02 01]¶
IP Address | v [Convert to 16 Bytes] | v [AES-128 Single-Block Encrypt] | v 16-Byte Ciphertext | v [Convert to IP Format] | v Encrypted IP Address¶
IP Address | v [Convert to 16 Bytes] | v [Split 32-byte key into K1, K2] | v [For each bit position (MSB to LSB): - Pad current prefix to 128 bits: zeros || 1 || prefix_bits - e1 = AES(K1, padded_prefix) - e2 = AES(K2, padded_prefix) - e = e1 ⊕ e2 - Extract LSB from e as cipher_bit - XOR cipher_bit with original bit - Set result bit in encrypted output - Add original bit to prefix for next iteration] | v Encrypted IP Address (4 bytes for IPv4, 16 bytes for IPv6)¶
IP Address | v [Convert to 16 Bytes] | v [Generate Random 8-Byte Tweak] | v [KIASU-BC Tweakable Encrypt] | v 16-Byte Ciphertext | v [Concatenate Tweak || Ciphertext] | v 24-Byte Output (ipcrypt-nd)¶
IP Address | v [Convert to 16 Bytes] | v [Generate Random 16-Byte Tweak] | v [AES-XTS Tweakable Encrypt] | v 16-Byte Ciphertext | v [Concatenate Tweak || Ciphertext] | v 32-Byte Output (ipcrypt-ndx)¶
A diagram of this conversion process is provided in Section 9.1.1.¶
function ipv4_to_16_bytes(ipv4_address): // Split the IPv4 address into its octets parts = ipv4_address.split(".") if length(parts) != 4: raise Error("Invalid IPv4 address") // Create a 16-byte array with the IPv4-mapped prefix bytes16 = [0x00] * 10 // 10 bytes of 0x00 bytes16.append(0xFF) // 11th byte: 0xFF bytes16.append(0xFF) // 12th byte: 0xFF // Append each octet (converted to an 8-bit integer) for part in parts: bytes16.append(int(part)) return bytes16¶
Example: For "192.0.2.1"
, the function returns¶
[00, 00, 00, 00, 00, 00, 00, 00, 00, 00, FF, FF, C0, 00, 02, 01]¶
function ipv6_to_16_bytes(ipv6_address): // Parse the IPv6 address into eight 16-bit words. words = parseIPv6(ipv6_address) // Expands shorthand notation and returns 8 words bytes16 = [] for word in words: high_byte = (word >> 8) & 0xFF low_byte = word & 0xFF bytes16.append(high_byte) bytes16.append(low_byte) return bytes16¶
Example: For "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
, the output is the corresponding 16-byte sequence.¶
function bytes_16_to_ip(bytes16): if length(bytes16) != 16: raise Error("Invalid byte array") // Check for the IPv4-mapped prefix // When an IPv4-mapped IPv6 address (::ffff:x.x.x.x) is detected, // it is converted back to IPv4 format. This is expected // behavior as IPv4 addresses are internally represented as IPv4-mapped // IPv6 addresses for uniform processing. ipv4_mapped_prefix = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF] if bytes16[0..12] == ipv4_mapped_prefix: // Convert the 4 last bytes to an IPv4 address ipv4_parts = [] for i from 12 to 16: ipv4_parts.append(integer_to_string(bytes16[i])) ipv4_address = join(ipv4_parts, ".") return ipv4_address else: // Convert the 16 bytes to an IPv6 address words = [] for i from 0 to 16 step 2: word = (bytes16[i] << 8) | bytes16[i+1] // Format words without leading zeros for canonical IPv6 representation words.append(format_hex_no_leading_zeros(word)) ipv6_address = join(words, ":") return ipv6_address¶
function ipcrypt_deterministic_encrypt(ip_address, key): // The key MUST be exactly 16 bytes (128 bits) in length if length(key) != 16: raise Error("Key must be 16 bytes") bytes16 = convert_to_16_bytes(ip_address) ciphertext = AES128_encrypt(key, bytes16) encrypted_ip = bytes_16_to_ip(ciphertext) return encrypted_ip¶
function ipcrypt_deterministic_decrypt(encrypted_ip, key): if length(key) != 16: raise Error("Key must be 16 bytes") bytes16 = convert_to_16_bytes(encrypted_ip) plaintext = AES128_decrypt(key, bytes16) original_ip = bytes_16_to_ip(plaintext) return original_ip¶
function ipcrypt_pfx_encrypt(ip_address, key): // The key MUST be exactly 32 bytes (256 bits) if length(key) != 32: raise Error("Key must be 32 bytes") // Convert IP to 16-byte representation bytes16 = convert_to_16_bytes(ip_address) // Split the key into two AES-128 keys // IMPORTANT: K1 and K2 MUST be different K1 = key[0:16] K2 = key[16:32] // Initialize encrypted result with zeros encrypted = [0] * 16 // If we encrypt an IPv4 address, start where the IPv4 address starts (bit 96) // Note the first 12 bytes of bytes16 are set to the prefix for IPv4 mapping in that case // This provides domain separation between an IPv4 address and the first 32 bits of an IPv6 address if is_ipv4(encrypted_ip): prefix_start = 96 else: prefix_start = 0 // Initialize padded_prefix for the starting prefix length padded_prefix = pad_prefix(bytes16, prefix_start) // Process each bit position sequentially // Note: prefix_len_bits represents how many bits from the MSB have been processed // Range is [prefix_start, 128), i.e., up to but not including 128 for prefix_len_bits from prefix_start to 128: // Compute pseudorandom function with dual AES encryption e1 = AES128_encrypt(K1, padded_prefix) e2 = AES128_encrypt(K2, padded_prefix) e = e1 ⊕ e2 // Output of the pseudorandom function is the least significant bit of e cipher_bit = get_bit(e, 0) // Encrypt the current bit position (processing from MSB to LSB) // For IPv6: prefix_len_bits=0 encrypts bit 127, prefix_len_bits=1 encrypts bit 126, etc. // For IPv4: prefix_len_bits=96 encrypts bit 31, prefix_len_bits=97 encrypts bit 30, etc. bit_pos = 127 - prefix_len_bits original_bit = get_bit(bytes16, bit_pos) set_bit(encrypted, bit_pos, cipher_bit ^ original_bit) // Prepare padded_prefix for next iteration // Shift left by 1 bit and insert the next bit from bytes16 padded_prefix = shift_left_one_bit(padded_prefix) set_bit(padded_prefix, 0, get_bit(bytes16, 127 - prefix_len_bits)) // Convert back to IP format // If the input was an IPv4 address, return an IPv4 address built from the last 32 bits of the encrypted block // If the input was an IPv6 address, return an IPv6 address built from the entire encrypted block if is_ipv4(ip_address): return bytes_4_to_ip(encrypted[12:16]) else: return bytes_16_to_ip(encrypted)¶
function ipcrypt_pfx_decrypt(encrypted_ip, key): // The key MUST be exactly 32 bytes (256 bits) if length(key) != 32: raise Error("Key must be 32 bytes") // Convert encrypted IP to 16-byte representation encrypted_bytes = convert_to_16_bytes(encrypted_ip) // Split the key into two AES-128 keys K1 = key[0:16] K2 = key[16:32] // Initialize decrypted result with zeros decrypted = [0] * 16 // If we decrypt an IPv4 address, start where the IPv4 address starts (bit 96) if is_ipv4(encrypted_ip): prefix_start = 96 else: prefix_start = 0 // Initialize padded_prefix for the starting prefix length padded_prefix = pad_prefix(decrypted, prefix_start) // Process each bit position sequentially // Note: prefix_len_bits represents how many bits from the MSB have been processed // Range is [prefix_start, 128), i.e., up to but not including 128 for prefix_len_bits from prefix_start to 128: // Compute pseudorandom function with dual AES encryption e1 = AES128_encrypt(K1, padded_prefix) e2 = AES128_encrypt(K2, padded_prefix) // e is expected to be the same as during encryption since the prefix is the same e = e1 ⊕ e2 // Output of the pseudorandom function is the least significant bit of e cipher_bit = get_bit(e, 0) // Decrypt the current bit position (processing from MSB to LSB) // For IPv6: prefix_len_bits=0 decrypts bit 127, prefix_len_bits=1 decrypts bit 126, etc. // For IPv4: prefix_len_bits=96 decrypts bit 31, prefix_len_bits=97 decrypts bit 30, etc. bit_pos = 127 - prefix_len_bits encrypted_bit = get_bit(encrypted_bytes, bit_pos) set_bit(decrypted, bit_pos, cipher_bit ^ encrypted_bit) // Prepare padded_prefix for next iteration // Shift left by 1 bit and insert the next bit from decrypted padded_prefix = shift_left_one_bit(padded_prefix) set_bit(padded_prefix, 0, get_bit(decrypted, 127 - prefix_len_bits)) // Convert back to IP format // If the input was an IPv4 address, return an IPv4 address built from the last 32 bits of the decrypted block // If the input was an IPv6 address, return an IPv6 address built from the entire decrypted block if is_ipv4(encrypted_ip): return bytes_4_to_ip(decrypted[12:16]) else: return bytes_16_to_ip(decrypted)¶
The following helper functions are used in the ipcrypt-pfx
implementation:¶
function is_ipv4(ip_address): // Check if the IP address is IPv4 based on its byte length // IPv4 addresses are 4 bytes, IPv6 addresses are 16 bytes return length(ip_address) == 4 function get_bit(data, position): // Extract bit at position from 16-byte array representing an IPv6 address in network byte order // position: 0 = LSB of byte 15, 127 = MSB of byte 0 // Example: position 127 refers to bit 7 (MSB) of data[0] // Example: position 0 refers to bit 0 (LSB) of data[15] byte_index = 15 - (position / 8) bit_index = position % 8 return (data[byte_index] >> bit_index) & 1 function set_bit(data, position, value): // Set bit at position in 16-byte array representing an IPv6 address in network byte order // position: 0 = LSB of byte 15, 127 = MSB of byte 0 byte_index = 15 - (position / 8) bit_index = position % 8 data[byte_index] |= ((value & 1) << bit_index) function pad_prefix(data, prefix_len_bits): // Specialized for the only two cases used: 0 and 96 // For prefix_len_bits=0: Returns a block with only bit 0 set (position 0 = LSB of byte 15) // For prefix_len_bits=96: Returns the IPv4-mapped prefix with separator at position 96 if prefix_len_bits == 0: // For IPv6 addresses starting from bit 0 padded_prefix = [0] * 16 padded_prefix[15] = 0x01 // Set bit at position 0 (LSB of byte 15) return padded_prefix else if prefix_len_bits == 96: // For IPv4 addresses, always returns the same value since all IPv4 addresses // share the same IPv4-mapped prefix (00...00 ffff) padded_prefix = [0] * 16 padded_prefix[3] = 0x01 // Set separator bit at position 96 (bit 0 of byte 3) padded_prefix[14] = 0xFF // IPv4-mapped prefix padded_prefix[15] = 0xFF // IPv4-mapped prefix return padded_prefix else: raise Error("pad_prefix only supports prefix_len_bits of 0 or 96") function shift_left_one_bit(data): // Shift a 16-byte array one bit to the left // The most significant bit is lost, and a zero bit is shifted in from the right result = [0] * 16 carry = 0 // Process from least significant byte (byte 15) to most significant byte (byte 0) for i from 15 down to 0: // Current byte shifted left by 1, with carry from previous byte result[i] = ((data[i] << 1) | carry) & 0xFF // Extract the bit that will be carried to the next byte carry = (data[i] >> 7) & 1 return result¶
function ipcrypt_nd_encrypt(ip_address, key): if length(key) != 16: raise Error("Key must be 16 bytes") // Step 1: Generate random tweak (8 bytes) tweak = random_bytes(8) // MUST be uniformly random // Step 2: Convert IP to 16-byte representation bytes16 = convert_to_16_bytes(ip_address) // Step 3: Encrypt using key and tweak ciphertext = KIASU_BC_encrypt(key, tweak, bytes16) // Step 4: Concatenate tweak and ciphertext result = concatenate(tweak, ciphertext) // 8 bytes || 16 bytes = 24 bytes total return result¶
function ipcrypt_nd_decrypt(ciphertext, key): // Step 1: Split ciphertext into tweak and encrypted IP tweak = ciphertext[0:8] // First 8 bytes encrypted_ip = ciphertext[8:24] // Remaining 16 bytes // Step 2: Decrypt using key and tweak bytes16 = KIASU_BC_decrypt(key, tweak, encrypted_ip) // Step 3: Convert back to IP address ip_address = bytes_16_to_ip(bytes16) return ip_address¶
function ipcrypt_ndx_encrypt(ip_address, key): if length(key) != 32: raise Error("Key must be 32 bytes (two AES-128 keys)") // Step 1: Generate random tweak (16 bytes) tweak = random_bytes(16) // MUST be uniformly random // Step 2: Convert IP to 16-byte representation bytes16 = convert_to_16_bytes(ip_address) // Step 3: Encrypt using key and tweak ciphertext = AES_XTS_encrypt(key, tweak, bytes16) // Step 4: Concatenate tweak and ciphertext result = concatenate(tweak, ciphertext) // 16 bytes || 16 bytes = 32 bytes total return result¶
function ipcrypt_ndx_decrypt(ciphertext, key): // Step 1: Split ciphertext into tweak and encrypted IP tweak = ciphertext[0:16] // First 16 bytes encrypted_ip = ciphertext[16:32] // Remaining 16 bytes // Step 2: Decrypt using key and tweak bytes16 = AES_XTS_decrypt(key, tweak, encrypted_ip) // Step 3: Convert back to IP address ip_address = bytes_16_to_ip(bytes16) return ip_address¶
function AES_XTS_encrypt(key, tweak, block): // Split the key into two halves K1, K2 = split_key(key) // Encrypt the tweak with the second half of the key ET = AES128_encrypt(K2, tweak) // Encrypt the block: AES128(block ⊕ ET, K1) ⊕ ET return AES128_encrypt(K1, block ⊕ ET) ⊕ ET function AES_XTS_decrypt(key, tweak, block): // Split the key into two halves K1, K2 = split_key(key) // Encrypt the tweak with the second half of the key ET = AES128_encrypt(K2, tweak) // Decrypt the block: AES128_decrypt(block ⊕ ET, K1) ⊕ ET return AES128_decrypt(K1, block ⊕ ET) ⊕ ET¶
This section provides a detailed guide for implementing the KIASU-BC tweakable block cipher used in ipcrypt-nd
. KIASU-BC is based on AES-128 with modifications to incorporate a tweak.¶
KIASU-BC extends AES-128 by incorporating an 8-byte tweak into each round. The tweak is padded to 16 bytes and XORed with the round key at each round of the cipher. This construction is used in the ipcrypt-nd
instantiation.¶
The 8-byte tweak is padded to 16 bytes using the following method:¶
Split the 8-byte tweak into four 2-byte pairs¶
Place each 2-byte pair at the start of each 4-byte group¶
Fill the remaining 2 bytes of each group with zeros¶
Example:¶
8-byte tweak: [T0 T1 T2 T3 T4 T5 T6 T7] 16-byte padded: [T0 T1 00 00 T2 T3 00 00 T4 T5 00 00 T6 T7 00 00]¶
Each round of KIASU-BC consists of the following standard AES operations:¶
The key schedule follows the standard AES-128 key expansion:¶
The following pseudocode illustrates the core operations of KIASU-BC:¶
function pad_tweak(tweak): // Input: 8-byte tweak // Output: 16-byte padded tweak padded = [0] * 16 for i in range(0, 8, 2): padded[i*2] = tweak[i] padded[i*2+1] = tweak[i+1] return padded function kiasu_bc_encrypt(key, tweak, plaintext): // Input: 16-byte key, 8-byte tweak, 16-byte plaintext // Output: 16-byte ciphertext // Expand key and pad tweak round_keys = expand_key(key) padded_tweak = pad_tweak(tweak) // Initial round state = plaintext state = add_round_key(state, round_keys[0] ^ padded_tweak) // Main rounds for round in range(1, 10): state = sub_bytes(state) state = shift_rows(state) state = mix_columns(state) state = add_round_key(state, round_keys[round] ^ padded_tweak) // Final round state = sub_bytes(state) state = shift_rows(state) state = add_round_key(state, round_keys[10] ^ padded_tweak) return state¶
Key and tweak sizes for each variant:¶
ipcrypt-deterministic
: Key: 16 bytes (128 bits), no tweak, Output: 16 bytes¶
ipcrypt-pfx
: Key: 32 bytes (256 bits, split into two independent AES-128 keys), no external tweak (uses prefix as cryptographic context), Output: 4 bytes for IPv4, 16 bytes for IPv6¶
ipcrypt-nd
: Key: 16 bytes (128 bits), Tweak: 8 bytes (64 bits), Output: 24 bytes¶
ipcrypt-ndx
: Key: 32 bytes (256 bits, split into two AES-128 keys), Tweak: 16 bytes (128 bits), Output: 32 bytes¶
This section is to be removed before publishing as an RFC.¶
This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in [RFC7942]. The description of implementations in this section is intended to assist draft document reviewers in judging whether the specification is suitable for publication.¶
The listing of any individual implementation does not imply endorsement. The information presented has not been independently verified. This list is not intended as a catalog of available implementations or their features.¶
Multiple independent, interoperable implementations of the schemes described in this document have been developed:¶
Awk¶
C¶
D¶
Dart (pub.dev package)¶
Elixir (hex package)¶
Go¶
Java (maven package)¶
JavaScript/TypeScript (npm package)¶
Kotlin¶
PHP (Composer package)¶
Python reference¶
Ruby (rubygems package)¶
Rust (cargo package)¶
Swift¶
Zig¶
A comprehensive list of implementations and their test results is available at: https://ipcrypt-std.github.io/implementations/¶
All implementations pass the common test vectors specified in this document, demonstrating interoperability across programming languages.¶
This section is to be removed before publishing as an RFC.¶
Implementations of the ipcrypt methods are freely available under permissive open source licenses (MIT, BSD, or Apache 2.0) at the repository listed in the Implementation Status section.¶
There are no known patent claims on these methods.¶
This appendix provides test vectors for the ipcrypt variants. Each test vector includes the key, input IP address, and encrypted output. For non-deterministic variants (ipcrypt-nd
and ipcrypt-ndx
), the tweak value is also included.¶
Implementations MUST verify their correctness against these test vectors before deployment.¶
# Test vector 1 Key: 0123456789abcdeffedcba9876543210 Input IP: 0.0.0.0 Encrypted IP: bde9:6789:d353:824c:d7c6:f58a:6bd2:26eb # Test vector 2 Key: 1032547698badcfeefcdab8967452301 Input IP: 255.255.255.255 Encrypted IP: aed2:92f6:ea23:58c3:48fd:8b8:74e8:45d8 # Test vector 3 Key: 2b7e151628aed2a6abf7158809cf4f3c Input IP: 192.0.2.1 Encrypted IP: 1dbd:c1b9:fff1:7586:7d0b:67b4:e76e:4777¶
The following test vectors demonstrate the correctness and prefix-preserving property of ipcrypt-pfx. Addresses from the same network produce encrypted addresses that share a common encrypted prefix, enabling network-level analysis while keeping actual network identities cryptographically protected.¶
# Test vector 1 (IPv4) Key: 0123456789abcdeffedcba98765432101032547698badcfeefcdab8967452301 Input IP: 0.0.0.0 Encrypted IP: 151.82.155.134 # Test vector 2 (IPv4) Key: 0123456789abcdeffedcba98765432101032547698badcfeefcdab8967452301 Input IP: 255.255.255.255 Encrypted IP: 94.185.169.89 # Test vector 3 (IPv4) Key: 0123456789abcdeffedcba98765432101032547698badcfeefcdab8967452301 Input IP: 192.0.2.1 Encrypted IP: 100.115.72.131 # Test vector 4 (IPv6) Key: 0123456789abcdeffedcba98765432101032547698badcfeefcdab8967452301 Input IP: 2001:db8::1 Encrypted IP: c180:5dd4:2587:3524:30ab:fa65:6ab6:f88¶
These test vectors demonstrate the prefix-preserving property. Addresses from the same network share common encrypted prefixes at the corresponding prefix length, while the encrypted prefixes themselves are cryptographically transformed and unrecognizable without the key.¶
# IPv4 addresses from same /24 network (10.0.0.0/24) Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 10.0.0.47 Encrypted IP: 19.214.210.244 Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 10.0.0.129 Encrypted IP: 19.214.210.80 Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 10.0.0.234 Encrypted IP: 19.214.210.30 # IPv4 addresses from same /16 but different /24 networks Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 172.16.5.193 Encrypted IP: 210.78.229.136 Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 172.16.97.42 Encrypted IP: 210.78.179.241 Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 172.16.248.177 Encrypted IP: 210.78.121.215 # IPv6 addresses from same /64 network (2001:db8::/64) Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8::a5c9:4e2f:bb91:5a7d Encrypted IP: 7cec:702c:1243:f70:1956:125:b9bd:1aba Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8::7234:d8f1:3c6e:9a52 Encrypted IP: 7cec:702c:1243:f70:a3ef:c8e:95c1:cd0d Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8::f1e0:937b:26d4:8c1a Encrypted IP: 7cec:702c:1243:f70:443c:c8e:6a62:b64d # IPv6 addresses from same /32 but different /48 networks Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8:3a5c::e7d1:4b9f:2c8a:f673 Encrypted IP: 7cec:702c:3503:bef:e616:96bd:be33:a9b9 Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8:9f27::b4e2:7a3d:5f91:c8e6 Encrypted IP: 7cec:702c:a504:b74e:194a:3d90:b047:2d1a Key: 2b7e151628aed2a6abf7158809cf4f3ca9f5ba40db214c3798f2e1c23456789a Input IP: 2001:db8:d8b4::193c:a5e7:8b2f:46d1 Encrypted IP: 7cec:702c:f840:aa67:1b8:e84f:ac9d:77fb¶
# Test vector 1 Key: 0123456789abcdeffedcba9876543210 Input IP: 0.0.0.0 Tweak: 08e0c289bff23b7c Output: 08e0c289bff23b7cb349aadfe3bcef56221c384c7c217b16 # Test vector 2 Key: 1032547698badcfeefcdab8967452301 Input IP: 192.0.2.1 Tweak: 21bd1834bc088cd2 Output: 21bd1834bc088cd2e5e1fe55f95876e639faae2594a0caad # Test vector 3 Key: 2b7e151628aed2a6abf7158809cf4f3c Input IP: 2001:db8::1 Tweak: b4ecbe30b70898d7 Output: b4ecbe30b70898d7553ac8974d1b4250eafc4b0aa1f80c96¶
# Test vector 1 Key: 0123456789abcdeffedcba98765432101032547698badcfeefcdab8967452301 Input IP: 0.0.0.0 Tweak: 21bd1834bc088cd2b4ecbe30b70898d7 Output: 21bd1834bc088cd2b4ecbe30b70898d782db0d4125fdace61db35b8339f20ee5 # Test vector 2 Key: 1032547698badcfeefcdab89674523010123456789abcdeffedcba9876543210 Input IP: 192.0.2.1 Tweak: 08e0c289bff23b7cb4ecbe30b70898d7 Output: 08e0c289bff23b7cb4ecbe30b70898d7766a533392a69edf1ad0d3ce362ba98a # Test vector 3 Key: 2b7e151628aed2a6abf7158809cf4f3c3c4fcf098815f7aba6d2ae2816157e2b Input IP: 2001:db8::1 Tweak: 21bd1834bc088cd2b4ecbe30b70898d7 Output: 21bd1834bc088cd2b4ecbe30b70898d76089c7e05ae30c2d10ca149870a263e4¶
For non-deterministic variants (ipcrypt-nd
and ipcrypt-ndx
), the tweak values shown are examples. Tweaks MUST be uniformly random for each encryption operation.¶
This document does not require any IANA actions.¶
The contributions and comments from members of the IETF and the cryptographic community have contributed to this specification. Tobias Fiebig provided a thorough review of this draft.¶