<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bonica-tcmp-tcp-ao-algs-00" category="std" consensus="true" submissionType="IETF" updates="RFC 5926" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="tcp-ao-algs">Additional Security Algorithms For Use With TCP-AO</title>
    <seriesInfo name="Internet-Draft" value="draft-bonica-tcmp-tcp-ao-algs-00"/>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>HPE</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ronald.bonica@hpe.com</email>
      </address>
    </author>
    <author initials="T." surname="Li" fullname="Tony Li">
      <organization>HPE</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>tony.li@tony.li</email>
      </address>
    </author>
    <date year="2025" month="December" day="12"/>
    <area>Transport</area>
    <workgroup>TCPM Working Group</workgroup>
    <keyword>TCP-AO</keyword>
    <abstract>
      <?line 50?>

<t>RFC5926 specifies cryptographic algorithms for TCP-AO.
It explains how to use KDF_HMAC_SHA1 and KDF_AES_128_CMAC 
as KDFs. It also explains how to use HMAC-SHA-1-96 and 
AES-128-CMAC-96 as MAC algorithms.</t>
      <t>This document specifies several new KDFs and MAC
algorithms for TCP-AO. The KDFs and MAC algorithms specified in 
this document are based upon more recent, stronger
cryptography.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="intro">
      <name>Introduction</name>
      <t>TCP end-points use the TCP Authentication Option (TCP-AO) <xref target="RFC5925"/> to authenticate
segments. TCP-AO relies upon:</t>
      <ul spacing="normal">
        <li>
          <t>A Master Key Tuple (MKT)</t>
        </li>
        <li>
          <t>A Key Derivation Function (KDF)</t>
        </li>
        <li>
          <t>A Message Authentication Code (MAC) algorithm</t>
        </li>
      </ul>
      <t>TCP-AO systems are configured with one or more MKTs for each connection that they protect.
When a connection is associated with multiple MKTs, TCP-AO can rotate among them during
the course of a TCP session. This facilitates dynamic key change and authentication algorithm
agility.</t>
      <t>An MKT includes:</t>
      <ul spacing="normal">
        <li>
          <t>Two MKT identifiers, one used for sending and one used for receiving</t>
        </li>
        <li>
          <t>A connection identifier (i.e., a TCP socket pair)</t>
        </li>
        <li>
          <t>A master key (i.e., a shared secret)</t>
        </li>
        <li>
          <t>A KDF</t>
        </li>
        <li>
          <t>A MAC algorithm</t>
        </li>
        <li>
          <t>A flag indicating whether TCP options other than TCP-AO are authenticated</t>
        </li>
      </ul>
      <t>The KDF generates a traffic key. Its inputs are:</t>
      <ul spacing="normal">
        <li>
          <t>A pseudorandom function (PRF) used to generate the traffic key</t>
        </li>
        <li>
          <t>The master key</t>
        </li>
        <li>
          <t>Context (i.e., A binary string containing information related to the connection)</t>
        </li>
        <li>
          <t>Output length (i.e., the length of the traffic key, in bits)</t>
        </li>
      </ul>
      <t>The MAC algorithm produces a MAC. It is defined by:</t>
      <ul spacing="normal">
        <li>
          <t>The KDF algorithm used to generate the traffic key</t>
        </li>
        <li>
          <t>The length of the traffic key, in bits</t>
        </li>
        <li>
          <t>The length of the MAC, in bits</t>
        </li>
      </ul>
      <t>The following are inputs to the MAC Algorithm:</t>
      <ul spacing="normal">
        <li>
          <t>traffic key</t>
        </li>
        <li>
          <t>message</t>
        </li>
      </ul>
      <t>TCP-AO systems include the MAC in the TCP-AO. They use the MAC
to authenticate segments.</t>
      <t><xref target="RFC5926"/> specifies cryptographic algorithms for TCP-AO.
It explains how to use KDF_HMAC_SHA1 and KDF_AES_128_CMAC 
as KDFs. It also explains how to use HMAC-SHA-1-96 and 
AES-128-CMAC-96 as MAC algorithms.</t>
      <t>This document specifies several new KDFs and MAC
algorithms for TCP-AO. The KDFs and MAC algorithms defined in 
this document are based upon more recent, stronger
cryptography.</t>
      <t>The MAC algorithms described in <xref target="notrunc"/> of this document
are not truncated. They yield MACs ranging from 256 to 512
bits (i.e., 32 to 64 bytes). Therefore, when they are encoded 
in a TCP-AO, the TCP-AO ranges from 36 to 68 bytes.</t>
      <t>The MAC algorithms described in <xref target="trunc"/> of this document
are truncated to 128 bits (i.e., 16 bytes). Therefore, when they 
are encoded in TCP-AO, the TCP-AO consumes 20 bytes.</t>
      <t>The TCP-AO is encoded in the TCP Options field. The TCP Options
field is frequently required to carry multiple options, including
the TCP-AO.</t>
      <t>Currently, the TCP-Options field cannot exceed 40 bytes. 
However, TCP Extended Options 
<xref target="I-D.bonica-tcpm-extended-options"/> removes this limitation.
Therefore, many of the MAC algorithms described in this
document can only be used on systems that support
TCP Extended Options or some other mechanism that 
extends the TCP Options field.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="updates-to-rfc-5926">
      <name>Updates to RFC 5926</name>
      <section anchor="concrete-kdfs">
        <name>Concrete KDFs</name>
        <section anchor="kdfhmacsha224">
          <name>KDF_HMAC_SHA224</name>
          <t>For KDF_HMAC_SHA224:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA224 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.180-4"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA224(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  224 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha256">
          <name>KDF_HMAC_SHA256</name>
          <t>For KDF_HMAC_SHA256:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA256 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.180-4"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA256(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  256 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha384">
          <name>KDF_HMAC_SHA384</name>
          <t>For KDF_HMAC_SHA384:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA384 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.180-4"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA384(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  384 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha512">
          <name>KDF_HMAC_SHA512</name>
          <t>For KDF_HMAC_SHA512:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA512 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.180-4"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA512(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  224 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha3-224">
          <name>KDF_HMAC_SHA3-224</name>
          <t>For KDF_HMAC_SHA3-224:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA3-224 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.202"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA3-224(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  224 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha3-256">
          <name>KDF_HMAC_SHA3-256</name>
          <t>For KDF_HMAC_SHA3-256:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA3-256 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.202"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA3-256(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  256 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha3-384">
          <name>KDF_HMAC_SHA3-384</name>
          <t>For KDF_HMAC_SHA3-384:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA3-384 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.202"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA3-384(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  384 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
        <section anchor="kdfhmacsha3-512">
          <name>KDF_HMAC_SHA3-512</name>
          <t>For KDF_HMAC_SHA3-512:</t>
          <ul spacing="normal">
            <li>
              <t>PRF for KDF_alg:  HMAC-SHA3-512 <xref target="RFC2104"/> <xref target="DOI.10.6028_NIST.FIPS.202"/></t>
            </li>
            <li>
              <t>Use:       HMAC-SHA3-512(Key, Input).</t>
            </li>
            <li>
              <t>Input:     ( i || Label || Context || Output_Length)</t>
            </li>
            <li>
              <t>Key:       Master_Key, configured by user, and passed to the KDF</t>
            </li>
            <li>
              <t>Output_Length:  512 bits</t>
            </li>
            <li>
              <t>Result:    Traffic_Key, used in the MAC function by TCP-AO</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="notrunc">
        <name>Non-truncated MAC Algorithms</name>
        <t>The following subsections should be added to Section 3.2 of <xref target="RFC5926"/>.</t>
        <section anchor="the-use-of-hmac-sha224">
          <name>The Use of HMAC-SHA224</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA224 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA224 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA224.</t>
            </li>
            <li>
              <t>Key_Length:  224 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  224 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA224 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA224.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha256">
          <name>The Use of HMAC-SHA256</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA256 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA256 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA256</t>
            </li>
            <li>
              <t>Key_Length:  256 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  256 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA256 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA256</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha384">
          <name>The Use of HMAC-SHA384</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA384 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA384 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA384</t>
            </li>
            <li>
              <t>Key_Length:  384 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  384 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA384 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA384</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha512">
          <name>The Use of HMAC-SHA512</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA512 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA512 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA512</t>
            </li>
            <li>
              <t>Key_Length:  512 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  512 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA512 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA512</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-224">
          <name>The Use of HMAC-SHA3-224</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-224 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-224 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-224.</t>
            </li>
            <li>
              <t>Key_Length:  224 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  224 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-224 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-224.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-256">
          <name>The Use of HMAC-SHA3-256</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-256 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-256 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-256.</t>
            </li>
            <li>
              <t>Key_Length:  256 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  256 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-256 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-256.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-384">
          <name>The Use of HMAC-SHA3-384</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-384 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-384 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-384.</t>
            </li>
            <li>
              <t>Key_Length:  384 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  384 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-384 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-384.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-512">
          <name>The Use of HMAC-SHA3-512</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-512 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-224 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-512.</t>
            </li>
            <li>
              <t>Key_Length:  512 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  512 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-512 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-512.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="trunc">
        <name>Truncated MAC Algorithms</name>
        <t>The following subsections should be added to Section 3.2 of <xref target="RFC5926"/>.</t>
        <section anchor="the-use-of-hmac-sha224-128">
          <name>The Use of HMAC-SHA224-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA224 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA224-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA224.</t>
            </li>
            <li>
              <t>Key_Length:  224 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA224-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA224.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha256-128">
          <name>The Use of HMAC-SHA256-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA256 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA256-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA256</t>
            </li>
            <li>
              <t>Key_Length:  256 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA256-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA256</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha384-128">
          <name>The Use of HMAC-SHA384-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA384 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA384-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA384</t>
            </li>
            <li>
              <t>Key_Length:  384 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA384-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA384</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha512-128">
          <name>The Use of HMAC-SHA512-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA512 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA512-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA512</t>
            </li>
            <li>
              <t>Key_Length:  512 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA512-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA512</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-224-128">
          <name>The Use of HMAC-SHA3-224-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-224 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-224-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-224.</t>
            </li>
            <li>
              <t>Key_Length:  224 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-224-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-224.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-256-128">
          <name>The Use of HMAC-SHA3-256-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-256 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-256-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-256.</t>
            </li>
            <li>
              <t>Key_Length:  256 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-256-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-256.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-384-128">
          <name>The Use of HMAC-SHA3-384-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-384 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-384-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-384.</t>
            </li>
            <li>
              <t>Key_Length:  384 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-384-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-384.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-use-of-hmac-sha3-512-128">
          <name>The Use of HMAC-SHA3-512-128</name>
          <t>By definition, HMAC <xref target="RFC2104"/> requires a cryptographic hash function.
SHA3-512 will be that hash function used for authenticating and providing
integrity validation on TCP segments with HMAC.</t>
          <t>The three fixed elements for HMAC-SHA3-224-128 are:</t>
          <ul spacing="normal">
            <li>
              <t>KDF_Alg:     KDF_HMAC_SHA3-512.</t>
            </li>
            <li>
              <t>Key_Length:  512 bits.</t>
            </li>
            <li>
              <t>MAC_Length:  128 bits.</t>
            </li>
          </ul>
          <t>For:</t>
          <ul spacing="normal">
            <li>
              <t>MAC = MAC_alg (Traffic_Key, Message)</t>
            </li>
          </ul>
          <t>HMAC-SHA3-512-128 for TCP-AO has the following values:</t>
          <ul spacing="normal">
            <li>
              <t>MAC_alg:     HMAC-SHA3-512.</t>
            </li>
            <li>
              <t>Traffic_Key: Variable; the result of the KDF.</t>
            </li>
            <li>
              <t>Message:     The message to be authenticated, as specified in <xref target="RFC5925"/>, Section 5.1.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entries to the "Cryptographic Algorithms for TCP-AO Registration" (https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml#tcp-parameters-3).</t>
      <table anchor="iana">
        <name>IANA Actions</name>
        <thead>
          <tr>
            <th align="left">Algorithm</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SHA224</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA256</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA384</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA512</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-224</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-256</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-384</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-512</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA224-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA256-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA384-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA512-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-224-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-256-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-384-128</td>
            <td align="left">This Document</td>
          </tr>
          <tr>
            <td align="left">SHA3-512-128</td>
            <td align="left">This Document</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2104">
        <front>
          <title>HMAC: Keyed-Hashing for Message Authentication</title>
          <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
          <author fullname="M. Bellare" initials="M." surname="Bellare"/>
          <author fullname="R. Canetti" initials="R." surname="Canetti"/>
          <date month="February" year="1997"/>
          <abstract>
            <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2104"/>
        <seriesInfo name="DOI" value="10.17487/RFC2104"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC4615">
        <front>
          <title>The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)</title>
          <author fullname="J. Song" initials="J." surname="Song"/>
          <author fullname="R. Poovendran" initials="R." surname="Poovendran"/>
          <author fullname="J. Lee" initials="J." surname="Lee"/>
          <author fullname="T. Iwata" initials="T." surname="Iwata"/>
          <date month="August" year="2006"/>
          <abstract>
            <t>Some implementations of IP Security (IPsec) may want to use a pseudo-random function (PRF) based on the Advanced Encryption Standard (AES). This memo describes such an algorithm, called AES-CMAC-PRF-128. It supports fixed and variable key sizes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4615"/>
        <seriesInfo name="DOI" value="10.17487/RFC4615"/>
      </reference>
      <reference anchor="RFC5925">
        <front>
          <title>The TCP Authentication Option</title>
          <author fullname="J. Touch" initials="J." surname="Touch"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5925"/>
        <seriesInfo name="DOI" value="10.17487/RFC5925"/>
      </reference>
      <reference anchor="RFC5926">
        <front>
          <title>Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)</title>
          <author fullname="G. Lebovitz" initials="G." surname="Lebovitz"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The TCP Authentication Option (TCP-AO) relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithms. This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism and provides the interface for future message authentication codes (MACs). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5926"/>
        <seriesInfo name="DOI" value="10.17487/RFC5926"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="I-D.bonica-tcpm-extended-options">
        <front>
          <title>TCP Extended Options</title>
          <author fullname="Ron Bonica" initials="R." surname="Bonica">
            <organization>HPE</organization>
          </author>
          <author fullname="Tony Li" initials="T." surname="Li">
            <organization>HPE</organization>
          </author>
          <date day="29" month="September" year="2025"/>
          <abstract>
            <t>   The TCP header can accommodates 40 octets of TCP options.  However,
   modern applications may require more than 40 octets of TCP Options.
   Therefore, this document describes an experiment that extends the TCP
   Options field.  If this experiment is successful, it will demonstrate
   that the extension procedures described herein are implementable and
   deployable.  It will also demonstrate that they maintain backwards
   compatibility.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bonica-tcpm-extended-options-02"/>
      </reference>
      <reference anchor="DOI.10.6028_NIST.FIPS.180-4">
        <front>
          <title>Secure hash standard</title>
          <author>
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="DOI.10.6028_NIST.FIPS.197">
        <front>
          <title>Advanced Encryption Standard (AES)</title>
          <author>
            <organization/>
          </author>
          <date year="2001"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.197"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="DOI.10.6028_NIST.FIPS.202">
        <front>
          <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
          <author>
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="DOI.10.6028_NIST.SP.800-38B">
        <front>
          <title>Recommendation for block cipher modes of operation :: the CMAC mode for authentication</title>
          <author fullname="M J Dworkin" initials="M." surname="Dworkin">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.sp.800-38b"/>
        <refcontent>National Institute of Standards and Technology</refcontent>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
