<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sakemi-areion-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Areion">Ultra-Low Latency Cryptography Areion</title>
    <seriesInfo name="Internet-Draft" value="draft-sakemi-areion-00"/>
    <author initials="Y." surname="Sakemi" fullname="Yumi Sakemi" role="editor">
      <organization>GMO Cybersecurity by Ierae, Inc.</organization>
      <address>
        <email>yumi.sakemi@gmo-cybersecurity.com</email>
      </address>
    </author>
    <author initials="S." surname="Kanno" fullname="Satoru Kanno">
      <organization>GMO Cybersecurity by Ierae, Inc.</organization>
      <address>
        <email>satoru.kanno@gmo-cybersecurity.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <keyword>Low Latency, AES instruction, Authenticated encryption</keyword>
    <abstract>
      <?line 105?>
<t>This document specifies a series of cryptographic wide-block permutations named "Areion"<xref target="Areion"/> for efficient encryption and hashing of relatively short input data.
Additionally, it describes AEAD scheme constructed from Areion.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>The recent evolution of communication technologies demands cryptographic primitives that can offer both robust security and high efficiency. 
Wide-block ciphers, which operate on larger block sizes than traditional block ciphers, have gained attention as a promising solution to address the limitations of 128-bit block sizes, such as those in AES-GCM. Notably, concerns regarding the limitations of 128-bit block sizes have been raised in public comments<xref target="PublicCommentOnSP800-38A"/> on NIST SP800-38A<xref target="SP800-38A"/>.</t>
      <t>Areion is a novel cryptographic primitive designed to meet these requirements, offering a wide-block permutation suitable for various cryptographic constructions.</t>
      <t>Areion's design is deeply influenced by the AES instructions and the Single Instruction, Multiple Data (SIMD) paradigm. The AES-NI instruction set, which is a part of modern CPUs, provides hardware support for AES operations. This hardware acceleration is crucial for Areion, enabling it to achieve low-latency operations.</t>
      <t>In this document, we specify a detailed specification of permutation on Areion.</t>
      <t>Note: While Areion can be applied for hashing, this document focuses on its encryption capabilities. Hashing functions using Areion are outside of scope in this document.</t>
      <section anchor="Conv">
        <name>Conventions Used in This Document</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="design-of-areion-permutation">
      <name>Design of Areion Permutation</name>
      <t>The Areion permutation algorithm is designed to provide a robust foundation for cryptographic constructions. This section provides a detailed specification of the Areion permutation algorithm for both Areion-256 and Areion-512.</t>
      <section anchor="notations">
        <name>Notations</name>
        <dl>
          <dt>SB:</dt>
          <dd>
            <t>SubBytes</t>
          </dd>
          <dt>SR:</dt>
          <dd>
            <t>ShiftRows</t>
          </dd>
          <dt>MC:</dt>
          <dd>
            <t>MixColumns</t>
          </dd>
          <dt>AC:</dt>
          <dd>
            <t>AddRoundConstant operations of the AES round function. AC is analogous to the AddRoundKey operation in AES, but instead of a round key, a constant is added.</t>
          </dd>
          <dt><tt>^</tt>:</dt>
          <dd>
            <t>Bitwise XOR operation</t>
          </dd>
          <dt><tt>◦</tt>:</dt>
          <dd>
            <t>Function composition, where the function on the right is applied first</t>
          </dd>
        </dl>
      </section>
      <section anchor="functions">
        <name>Functions</name>
        <t>Based on the operations in the AES round function, we define four functions F_i for i in {0, 1, 2, 3} as follows.</t>
        <ul spacing="normal">
          <li>
            <t>F_0 = MC ◦ SR ◦ SB</t>
          </li>
          <li>
            <t>F_1 = SR ◦ SB</t>
          </li>
          <li>
            <t>F_2 = MC ◦ SR ◦ SB ◦ AC ◦ MC ◦ SR ◦ SB</t>
          </li>
          <li>
            <t>F_3 = MC ◦ SR ◦ SB ◦ AC ◦ SR ◦ SB</t>
          </li>
        </ul>
      </section>
      <section anchor="areion-256-permutation">
        <name>Areion-256 Permutation</name>
        <dl>
          <dt>Input:</dt>
          <dd>
            <t>A 256-bit block divided into two 128-bit halves: <tt>L</tt> and <tt>R</tt></t>
          </dd>
        </dl>
        <t>Procedures:</t>
        <artwork><![CDATA[
For each round r from 1 to 10
    a. L' = L ^ F_0(R)
    b. R' = R ^ F_1(L ^ F_0(R))
    c. Update L = L' and R = R'
]]></artwork>
        <dl>
          <dt>Output:</dt>
          <dd>
            <t>Concatenation of <tt>L</tt> and <tt>R</tt></t>
          </dd>
        </dl>
      </section>
      <section anchor="areion-512-permutation">
        <name>Areion-512 Permutation</name>
        <dl>
          <dt>Input:</dt>
          <dd>
            <t>A 512-bit block divided into four 128-bit quarters: <tt>A</tt>, <tt>B</tt>, <tt>C</tt>, and <tt>D</tt>.</t>
          </dd>
        </dl>
        <t>Procedures:</t>
        <artwork><![CDATA[
For each round r from 1 to 15:
    a. A' = A ^ F_2(D)
    b. B' = B ^ F_3(C ^ F_2(D))
    c. C' = C ^ F_0(B ^ F_3(C ^ F_2(D)))
    d. D' = D ^ F_1(A ^ F_0(B ^ F_3(C ^ F_2(D))))
    e. Update A = A', B = B', C = C', and D = D'
]]></artwork>
        <dl>
          <dt>Output:</dt>
          <dd>
            <t>Concatenation of <tt>A</tt>, <tt>B</tt>, <tt>C</tt>, and <tt>D</tt>.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="permutation-based-aead-schemes-by-areion">
      <name>Permutation-based AEAD schemes by Areion</name>
      <t>The Areion can be constructed as AEADs by combining it with various permutation-based AEAD.
In this document, we describe an Areion-OPP as concrete example in <xref target="OPP"/></t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For security considerations of Areion, this document refers to Section 5 of <xref target="Areion"/>.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>These research results were obtained from the commissioned research(No.05801) by National Institute of Information and Communications Technology (NICT) , Japan.</t>
      <t>The authors would like to thank Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, and Rentaro Shiba for their academic insights and advice as a design team on Areion.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="Areion" target="https://eprint.iacr.org/2023/794.pdf">
          <front>
            <title>Areion: Highly-Efficient Permutations and Its Applications (Extended Version)</title>
            <author initials="T." surname="Isobe" fullname="Takanori Isobe">
              <organization>University of Hyogo</organization>
            </author>
            <author initials="R." surname="Ito" fullname="Ryoma Ito">
              <organization>National Institute of Information and Communications Technology</organization>
            </author>
            <author initials="F." surname="Liu" fullname="Fukang Liu">
              <organization>University of Hyogo</organization>
            </author>
            <author initials="K." surname="Minematsu" fullname="Kazuhiko Minematsu">
              <organization>NEC</organization>
            </author>
            <author initials="M." surname="Nakahashi" fullname="Motoki Nakahashi">
              <organization>University of Hyogo</organization>
            </author>
            <author initials="K." surname="Sakamoto" fullname="Kosei Sakamoto">
              <organization>University of Hyogo</organization>
            </author>
            <author initials="R." surname="Shiba" fullname="Rentaro Shiba">
              <organization>Mitsubishi Electric Corporation</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP800-38A" target="https://doi.org/10.6028/NIST.SP.800-38A">
          <front>
            <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title>
            <author initials="M." surname="Dworkin" fullname="Morris Dworkin">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2001"/>
          </front>
        </reference>
        <reference anchor="PublicCommentOnSP800-38A" target="https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38a-initial-public-comments-2021.pdf">
          <front>
            <title>PUBLIC COMMENTS ON SP 800-38A, Recommendation for Block Cipher Modes of Operation: Methods and Techniques and SP 800-38A Addendum, Three Variants of Ciphertext Stealing for CBC Mode</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 234?>

<section anchor="OPP">
      <name>Permutation-based authenticated encryption modes, OPP</name>
      <t>In this section, we describe the algorithm for Areion-OPP. For details, see <xref target="Areion"/>.
Note: We plan to describe our Internet Draft based on Section 4.2.2 of <xref target="Areion"/>.</t>
      <t>(TBD)</t>
    </section>
    <section anchor="example-implementation">
      <name>Example Implementation</name>
      <t>(TBD)</t>
    </section>
    <section anchor="test-cases-test-vectors">
      <name>Test Cases &amp; Test Vectors</name>
      <t>(TBD)</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
