
|
AES/GCM advantages encryption is provided by “state-of-the-art” AES (128/256 bit keys) mode of operation uses a counter to thwart replay attacks Integrity Check Value verifies the payload integrity encryption, integrity, and source authentication by a single algorithm authentication can be performed without encrypting data not in packet payload (e.g. source identifiers) can be authenticated too Initialization Vector nonce can be any length (but should not repeat for given key) algorithm can be efficiently implemented in software computation can be parallelized for high speed hardware implementations unencumbered by IPR claims adopted by IEEE 802.1ae for MACsec and RFCs 4106 and 4543 for IPsec |