<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-deprecate-obsolete-kex-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in TLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-01"/>
    <author initials="C." surname="Bartle" fullname="Carrick Bartle">
      <organization>Apple, Inc.</organization>
      <address>
        <email>cbartle@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="December" day="11"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document makes several prescriptions regarding the following key exchange
methods in TLS, most of which have been superseded by better options:</t>
      <ol spacing="normal" type="1"><li>This document deprecates the use of RSA key exchange in TLS.</li>
        <li>It limits the use of Diffie Hellman key exchange over a finite field to avoid, to the extent possible, known vulnerabilities and improper security properties.</li>
        <li>It discourages the use of static elliptic curve Diffie Hellman cipher suites.</li>
      </ol>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>TLS supports a variety of key exchange algorithms, including RSA, Diffie Hellman
over a finite field, and elliptic curve Diffie Hellman (ECDH).</t>
      <t>Diffie Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH  (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. However, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE are as follows:</t>
      <ol spacing="normal" type="1"><li>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group size, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</li>
        <li>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</li>
        <li>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</li>
        <li>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</li>
        <li>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>.</li>
      </ol>
      <t>The problems affecting RSA key exchange are as follows:</t>
      <ol spacing="normal" type="1"><li>RSA key exchange offers no forward secrecy, by construction.</li>
        <li>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</li>
        <li>In addition to the above point, there is no convenient mechanism in TLS for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</li>
      </ol>
      <t>Given these problems, this document updates <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, and <xref target="RFC5469"/> to remediate the above problems.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie Hellman</name>
      <t>Clients MUST NOT offer non-ephemeral FFDH cipher suites in TLS 1.2 connections.
(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and TLS 1.3 does not
support FFDH <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-dh"/>.</t>
      <t>Clients SHOULD NOT offer non-ephemeral ECDH cipher suites in TLS 1.2
connections. (Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and
TLS 1.3 does not support ECDH <xref target="RFC8446"/>.) This includes all cipher suites listed
in the table in <xref target="appendix-ecdh"/>.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie Hellman</name>
      <t>Clients and servers MAY offer fully ephemeral FFDHE cipher suites in TLS 1.2
connections under the following conditions:</t>
      <ol spacing="normal" type="1"><li>Clients and servers MUST NOT reuse ephemeral DHE public keys across TLS
connections for all existing (and future) TLS versions. Doing so invalidates
forward secrecy properties of these connections. For DHE, such reuse may also
lead to vulnerabilities such as those used in the <xref target="Raccoon"/> attack. See
<xref target="sec-considerations"/> for related discussion.</li>
        <li>The group size is at least 2048 bits.</li>
      </ol>
      <t>(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>. TLS 1.3 satisfies the
second point above <xref target="RFC8446"/> and is not vulnerable to the <xref target="Raccoon"/> Attack.)</t>
      <t>We note that, previously, supporting the broadest range of clients would have
required supporting either RSA key exchange or 1024-bit FFDHE. This is no longer
the case, and it is possible to support most clients released since circa 2015
using 2048-bit FFDHE or more modern key exchange methods, and without RSA key
exchange <xref target="server_side_tls"/>.</t>
      <t>All the cipher suites that do not meet the above requirements are listed in the
table in <xref target="appendix-dhe"/>.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients and servers MUST NOT offer RSA cipher suites in TLS 1.2 connections. (Note
that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>, and TLS 1.3 does not support
static RSA <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-rsa"/>. Note that these cipher suites are already marked as not
recommended in the "TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA. Note that all cipher suites listed in
<xref target="rsa"/> and in <xref target="non-ephemeral"/> are already marked as not recommended in the
"TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites, forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</li>
        <li>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</li>
        <li>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7919" target="https://www.rfc-editor.org/info/rfc7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept.  This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC4346" target="https://www.rfc-editor.org/info/rfc4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162" target="https://www.rfc-editor.org/info/rfc4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon">
              <organization/>
            </author>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee">
              <organization/>
            </author>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932" target="https://www.rfc-editor.org/info/rfc5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family.  This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288" target="https://www.rfc-editor.org/info/rfc5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209" target="https://www.rfc-editor.org/info/rfc6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim">
              <organization/>
            </author>
            <author fullname="J. Lee" initials="J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J. Park" initials="J." surname="Park">
              <organization/>
            </author>
            <author fullname="D. Kwon" initials="D." surname="Kwon">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367" target="https://www.rfc-editor.org/info/rfc6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289" target="https://www.rfc-editor.org/info/rfc5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm.  This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms.  Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM).   This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC5469" target="https://www.rfc-editor.org/info/rfc5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms.  DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246).  This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC4785" target="https://www.rfc-editor.org/info/rfc4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal">
              <organization/>
            </author>
            <author fullname="P. Goel" initials="P." surname="Goel">
              <organization/>
            </author>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol.  These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs).  These pre-shared keys are symmetric keys, shared in advance among the communicating parties.  The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487" target="https://www.rfc-editor.org/info/rfc5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm.  This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655" target="https://www.rfc-editor.org/info/rfc6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <author fullname="D. Bailey" initials="D." surname="Bailey">
              <organization/>
            </author>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication.  The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905" target="https://www.rfc-editor.org/info/rfc7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="W. Chang" initials="W." surname="Chang">
              <organization/>
            </author>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos">
              <organization/>
            </author>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="SC-tls-des-idea-ciphers-to-historic" target="https://datatracker.ietf.org/doc/status-change-tls-des-idea-ciphers-to-historic/">
          <front>
            <title>Moving single-DES and IDEA TLS ciphersuites to Historic</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="25"/>
          </front>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="server_side_tls" target="https://wiki.mozilla.org/Security/Server_Side_TLS">
          <front>
            <title>Server Side TLS</title>
            <author initials="A." surname="King">
              <organization/>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492" target="https://www.rfc-editor.org/info/rfc4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard">
              <organization/>
            </author>
            <author fullname="V. Gupta" initials="V." surname="Gupta">
              <organization/>
            </author>
            <author fullname="C. Hawk" initials="C." surname="Hawk">
              <organization/>
            </author>
            <author fullname="B. Moeller" initials="B." surname="Moeller">
              <organization/>
            </author>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <section anchor="appendix-dh">
      <name>DH Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-ecdh">
      <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-dhe">
      <name>DHE Cipher Suites Refered to by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-rsa">
      <name>RSA Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
