Lines Matching refs:AES
65 4.1.1. AES in Counter Mode. . . . . . . . . . . . . . . 21
66 4.1.2. AES in f8-mode . . . . . . . . . . . . . . . . . 22
73 4.3.3. AES-CM PRF . . . . . . . . . . . . . . . . . . . 28
75 5.1. Encryption: AES-CM and NULL. . . . . . . . . . . . . . . 29
77 5.3. Key Derivation: AES-CM PRF . . . . . . . . . . . . . . . 29
110 B.1. AES-f8 Test Vectors. . . . . . . . . . . . . . . . . . . 51
119 B.2. AES-CM Test Vectors. . . . . . . . . . . . . . . . . . . 52
1108 The default cipher is the Advanced Encryption Standard (AES) [AES],
1109 and we define two modes of running AES, (1) Segmented Integer Counter
1110 Mode AES and (2) AES in f8-mode. In the remainder of this section,
1111 let E(k,x) be AES applied to key k and input block x.
1127 4.1.1. AES in Counter Mode
1129 Conceptually, counter mode [AES-CTR] consists of encrypting
1136 blocks of the AES cipher in the encrypt direction, using key k = k_e,
1163 re-use, see below. The AES has a block size of 128 bits, so 2^16
1192 4.1.2. AES in f8-mode
1200 AES as a block cipher to be used in what we shall call "f8-mode of
1201 operation" RTP encryption. The AES f8-mode SHALL use the same
1202 default sizes for session key and salt as AES counter mode.
1265 The figure represents the KG in Figure 3, when AES-f8 is used.
1315 The SRTP IV for 128-bit block AES-f8 SHALL be formed in the following
1323 The presence of the SSRC as part of the IV allows AES-f8 to be used
1329 The SRTCP IV for 128-bit block AES-f8 SHALL be formed in the
1540 4.3.3. AES-CM PRF
1544 to 2^23. PRF_n(k_master,x) SHALL be AES in Counter Mode as described
1547 bits. (Requiring n/128, rounded up, applications of AES.)
1558 encryption AES-CM, NULL AES-f8 AES-CM
1560 key derivation (PRF) AES-CM - AES-CM
1575 5.1. Encryption: AES-CM and NULL
1577 AES running in Segmented Integer Counter Mode, as defined in Section
1596 5.3. Key Derivation: AES-CM PRF
1598 The AES Counter Mode based key derivation and PRF defined in Sections
2041 The pre-defined transforms (AES-CM and AES-f8) allow master keys to
2167 192-bit keys since existing AES implementations to be used in the
2169 bits. Since AES is not defined (or properly analyzed) for use with
2228 that encryption algorithms, including AES Counter Mode and f8, do not
2603 [AES] NIST, "Advanced Encryption Standard (AES)", FIPS PUB 197,
2641 [AES-CTR] Lipmaa, H., Rogaway, P. and D. Wagner, "CTR-Mode
2832 B.1. AES-f8 Test Vectors
2887 B.2. AES-CM Test Vectors
2889 Keystream segment length: 1044512 octets (65282 AES blocks)
2922 function, which uses AES-128 in Counter Mode. In the following, we
2923 walk through the initial key derivation for the AES-128 Counter Mode
2940 AES-CM is generated by exclusive-oring the master salt with the
2944 is then AES-CM- encrypted using the master key to get the cipher key.
2952 x*2^16: 0EC675AD498AFEEBB6960B3AABE60000 (AES-CM input)
2954 cipher key: C61E7A93744F39EE10734AFE3FF7A087 (AES-CM output)
2976 AES-CM is generated by exclusive-oring the master salt with the
2987 x*2^16: 0EC675AD498AFEE9B6960B3AABE60000 (AES-CM input)
2989 30CBBC08863D8C85D49DB34A9AE17AC6 (AES-CM ouptut)
2993 We now show how the auth key is generated. The input block for AES-
3002 x*2^16: 0EC675AD498AFEEAB6960B3AABE60000 (AES-CM input)
3004 Below, the auth key is shown on the left, while the corresponding AES
3007 auth key AES input blocks