<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-barnes-sframe-iana-256-06" category="std" consensus="true" submissionType="IETF" updates="9605" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SFrame IANA Updates">Updates to SFrame Cipher Suites Registry</title>
    <seriesInfo name="Internet-Draft" value="draft-barnes-sframe-iana-256-06"/>
    <author fullname="Richard Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <author fullname="Emad Omara">
      <organization>Apple</organization>
      <address>
        <email>eomara@apple.com</email>
      </address>
    </author>
    <author fullname="Aron Rosenberg">
      <organization>Apple</organization>
      <address>
        <email>aron.rosenberg@apple.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="04"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Media Frames</workgroup>
    <keyword>SFrame</keyword>
    <keyword>cryptography</keyword>
    <abstract>
      <?line 49?>

<t>This document addresses two omissions in the Secure Frames (SFrame) protocol
specification.  First, the definition of the IANA registry for SFrame
ciphersuites omits several important fields.  This document updates the IANA
registry specified by RFC 9605 and requests that IANA add those fields,
defining the contents of those fields for current entries.
Second, the AEAD construction based on AES-CTR and HMAC is defined only for
the 128-bit security level.  This document registers parallel constructions
at the 256-bit security level.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bifurcation.github.io/sframe-iana-256/draft-barnes-sframe-iana-256.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-barnes-sframe-iana-256/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Media Frames Working Group mailing list (<eref target="mailto:sframe@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sframe/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sframe/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bifurcation/sframe-iana-256"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document addresses two omissions in the Secure Frames (SFrame) protocol
specification <xref target="RFC9605"/>.  First, the definition in <xref section="8.1" sectionFormat="of" target="RFC9605"/> of the IANA registry for SFrame ciphersuites omits several important
fields.  This document requests that IANA add those fields and defines the
contents of those fields for current entries.  Second, the AEAD construction
based on AES-CTR and HMAC (in <xref section="4.5.1" sectionFormat="of" target="RFC9605"/>) is defined only for
the 128-bit security level.  This document registers parallel constructions at
the 256-bit security level.</t>
    </section>
    <section anchor="aes-256-ctr-with-hmac-sha512">
      <name>AES-256-CTR with HMAC-SHA512</name>
      <t><xref section="4.5.1" sectionFormat="of" target="RFC9605"/> defines a compound authenticated encryption
construction, using the unauthenticated CTR mode of AES for encryption and HMAC
for authentication.</t>
      <t>The original specification only defines cipher suite values for instances of
this construction using AES-128-CTR and HMAC-SHA256.  The construction works the
same way when used with AES-256-CTR and HMAC-SHA512.  The only differences are
in the lengths of some SFrame-internal fields:</t>
      <ul spacing="normal">
        <li>
          <t>The keys generated by SFrame-internal key derivation (<tt>derive_key_salt</tt>) are
longer to match the needs of AES-256-CTR and HMAC-SHA512 (96 bytes vs 48 bytes
for AES-128-CTR and HMAC-SHA256).</t>
        </li>
        <li>
          <t>The initial tag value <tt>tag</tt> in <tt>compute_tag</tt> is 64 bytes instead of 32 bytes.</t>
        </li>
      </ul>
      <t>Identifiers for cipher suites using AES-256-CTR and HMAC-SHA512 are defined in
<xref target="cipher-suites"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The registry changes in this document have no affect on the security of SFrame.</t>
      <t>The new algorithms registered by this document allow the CTR+HMAC construction
to be used in environments that require a 256-bit security level.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes three requests of IANA: Updating the columns in the "SFrame
Cipher Suites" registry, adding entries to the updated registry for the new
cipher suites defined in this document, and add this document as an additional
reference for this registry.</t>
      <section anchor="sframe-cipher-suites">
        <name>"SFrame Cipher Suites" Registry Update</name>
        <t>The SFrame Cipher Suites registry should be updated to add the following
columns:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Nh</tt>: The size in bytes of the output of the hash function</t>
          </li>
          <li>
            <t><tt>Nka</tt>: For cipher suites using the compound AEAD described in <xref section="4.5.1" sectionFormat="of" target="RFC9605"/>, the size in bytes of a key for the underlying encryption
algorithm</t>
          </li>
          <li>
            <t><tt>Nk</tt>: The size in bytes of a key for the encryption algorithm</t>
          </li>
          <li>
            <t><tt>Nn</tt>: The size in bytes of a nonce for the encryption algorithm</t>
          </li>
          <li>
            <t><tt>Nt</tt>: The overhead in bytes of the encryption algorithm (typically the size of
a "tag" that is added to the plaintext)</t>
          </li>
        </ul>
        <t><xref target="new-cipher-suite-registry"/> illustrates the new structure of the registry, and provides
the required values for the currently registered entries.</t>
        <table anchor="new-cipher-suite-registry">
          <name>New structure and contents of the SFrame Cipher Suites registry</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Nh</th>
              <th align="left">Nka</th>
              <th align="left">Nk</th>
              <th align="left">Nn</th>
              <th align="left">Nt</th>
              <th align="left">R</th>
              <th align="left">Reference</th>
              <th align="left">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0001</td>
              <td align="left">
                <tt>AES_128_CTR_HMAC_SHA256_80</tt></td>
              <td align="left">32</td>
              <td align="left">16</td>
              <td align="left">48</td>
              <td align="left">12</td>
              <td align="left">10</td>
              <td align="left">Y</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0002</td>
              <td align="left">
                <tt>AES_128_CTR_HMAC_SHA256_64</tt></td>
              <td align="left">32</td>
              <td align="left">16</td>
              <td align="left">48</td>
              <td align="left">12</td>
              <td align="left">8</td>
              <td align="left">Y</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">
                <tt>AES_128_CTR_HMAC_SHA256_32</tt></td>
              <td align="left">32</td>
              <td align="left">16</td>
              <td align="left">48</td>
              <td align="left">12</td>
              <td align="left">4</td>
              <td align="left">Y</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0004</td>
              <td align="left">
                <tt>AES_128_GCM_SHA256_128</tt></td>
              <td align="left">32</td>
              <td align="left">n/a</td>
              <td align="left">16</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">Y</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0005</td>
              <td align="left">
                <tt>AES_256_GCM_SHA512_128</tt></td>
              <td align="left">64</td>
              <td align="left">n/a</td>
              <td align="left">32</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">Y</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0xF000 - 0xFFFF</td>
              <td align="left">Reserved for Private Use</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">-</td>
              <td align="left">RFC 9605</td>
              <td align="left">IETF</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="cipher-suites">
        <name>Cipher Suites for AES-256-CTR with HMAC-SHA512</name>
        <t>The following new entries should be added to the SFrame Cipher Suites registry:</t>
        <table anchor="new-entries">
          <name>New entries SFrame Cipher Suites registry</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Nh</th>
              <th align="left">Nka</th>
              <th align="left">Nk</th>
              <th align="left">Nn</th>
              <th align="left">Nt</th>
              <th align="left">R</th>
              <th align="left">Reference</th>
              <th align="left">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0006</td>
              <td align="left">
                <tt>AES_256_CTR_HMAC_SHA512_80</tt></td>
              <td align="left">64</td>
              <td align="left">32</td>
              <td align="left">96</td>
              <td align="left">12</td>
              <td align="left">10</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0007</td>
              <td align="left">
                <tt>AES_256_CTR_HMAC_SHA512_64</tt></td>
              <td align="left">64</td>
              <td align="left">32</td>
              <td align="left">96</td>
              <td align="left">12</td>
              <td align="left">8</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
              <td align="left">IETF</td>
            </tr>
            <tr>
              <td align="left">0x0008</td>
              <td align="left">
                <tt>AES_256_CTR_HMAC_SHA512_32</tt></td>
              <td align="left">64</td>
              <td align="left">32</td>
              <td align="left">96</td>
              <td align="left">12</td>
              <td align="left">4</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
              <td align="left">IETF</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9605">
          <front>
            <title>Secure Frame (SFrame): Lightweight Authenticated Encryption for Real-Time Media</title>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="J. Uberti" initials="J." surname="Uberti"/>
            <author fullname="S. G. Murillo" initials="S. G." surname="Murillo"/>
            <author fullname="R. Barnes" initials="R." role="editor" surname="Barnes"/>
            <author fullname="Y. Fablet" initials="Y." surname="Fablet"/>
            <date month="August" year="2024"/>
            <abstract>
              <t>This document describes the Secure Frame (SFrame) end-to-end encryption and authentication mechanism for media frames in a multiparty conference call, in which central media servers (Selective Forwarding Units or SFUs) can access the media metadata needed to make forwarding decisions without having access to the actual media.</t>
              <t>This mechanism differs from the Secure Real-Time Protocol (SRTP) in that it is independent of RTP (thus compatible with non-RTP media transport) and can be applied to whole media frames in order to be more bandwidth efficient.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9605"/>
          <seriesInfo name="DOI" value="10.17487/RFC9605"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TestVectors" target="https://github.com/bifurcation/sframe-iana-256/blob/main/test-vectors/test-vectors-aes256.json">
          <front>
            <title>SFrame Test Vectors</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 151?>

<section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>This section provides a set of test vectors that implementations can use to
verify that they correctly implement SFrame encryption and decryption with the
cipher suites registered in this document.  Test vectors are provided for both
the AES-256-CTR-HMAC construction and for full SFrame encryption with the new
cipher suites.</t>
      <t>All values are either numeric or byte strings.  Numeric values are represented
as hex values, prefixed with <tt>0x</tt>.  Byte strings are represented in hex
encoding.</t>
      <t>Line breaks and whitespace within values are inserted to conform to the width
requirements of the RFC format.  They should be removed before use.</t>
      <t>These test vectors are also available in JSON format at <xref target="TestVectors"/>.  In the
JSON test vectors, numeric values are JSON numbers and byte string values are
JSON strings containing the hex encoding of the byte strings.</t>
      <section anchor="aead-encryptiondecryption-using-aes-ctr-and-hmac">
        <name>AEAD Encryption/Decryption Using AES-CTR and HMAC</name>
        <t>For each case, we provide:</t>
        <ul spacing="normal">
          <li>
            <t><tt>cipher_suite</tt>: The index of the cipher suite in use (see
<xref target="sframe-cipher-suites"/>)</t>
          </li>
          <li>
            <t><tt>key</tt>: The <tt>key</tt> input to encryption/decryption</t>
          </li>
          <li>
            <t><tt>enc_key</tt>: The encryption subkey produced by the <tt>derive_subkeys()</tt> algorithm</t>
          </li>
          <li>
            <t><tt>auth_key</tt>: The authentication subkey produced by the <tt>derive_subkeys()</tt> algorithm</t>
          </li>
          <li>
            <t><tt>nonce</tt>: The <tt>nonce</tt> input to encryption/decryption</t>
          </li>
          <li>
            <t><tt>aad</tt>: The <tt>aad</tt> input to encryption/decryption</t>
          </li>
          <li>
            <t><tt>pt</tt>: The plaintext</t>
          </li>
          <li>
            <t><tt>ct</tt>: The ciphertext</t>
          </li>
        </ul>
        <t>An implementation should verify that the following are true, where
<tt>AEAD.Encrypt</tt> and <tt>AEAD.Decrypt</tt> are as defined in <xref section="4.5.1" sectionFormat="of" target="RFC9605"/>:</t>
        <ul spacing="normal">
          <li>
            <t><tt>AEAD.Encrypt(key, nonce, aad, pt) == ct</tt></t>
          </li>
          <li>
            <t><tt>AEAD.Decrypt(key, nonce, aad, ct) == pt</tt></t>
          </li>
        </ul>
        <t>The other values in the test vector are intermediate values provided to
facilitate debugging of test failures.</t>
      </section>
      <section anchor="sframe-encryptiondecryption">
        <name>SFrame Encryption/Decryption</name>
        <t>For each case, we provide:</t>
        <ul spacing="normal">
          <li>
            <t><tt>cipher_suite</tt>: The index of the cipher suite in use (see
<xref target="sframe-cipher-suites"/>)</t>
          </li>
          <li>
            <t><tt>kid</tt>: A KID value</t>
          </li>
          <li>
            <t><tt>ctr</tt>: A CTR value</t>
          </li>
          <li>
            <t><tt>base_key</tt>: The <tt>base_key</tt> input to the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>sframe_key_label</tt>: The label used to derive <tt>sframe_key</tt> in the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>sframe_salt_label</tt>: The label used to derive <tt>sframe_salt</tt> in the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>sframe_secret</tt>: The <tt>sframe_secret</tt> variable in the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>sframe_key</tt>: The <tt>sframe_key</tt> value produced by the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>sframe_salt</tt>: The <tt>sframe_salt</tt> value produced by the <tt>derive_key_salt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>metadata</tt>: The <tt>metadata</tt> input to the SFrame <tt>encrypt</tt> algorithm</t>
          </li>
          <li>
            <t><tt>pt</tt>: The plaintext</t>
          </li>
          <li>
            <t><tt>ct</tt>: The SFrame ciphertext</t>
          </li>
        </ul>
        <t>An implementation should verify that the following are true, where
<tt>encrypt</tt> and <tt>decrypt</tt> are as defined in <xref section="4.4" sectionFormat="of" target="RFC9605"/>, using an SFrame
context initialized with <tt>base_key</tt> assigned to <tt>kid</tt>:</t>
        <ul spacing="normal">
          <li>
            <t><tt>encrypt(ctr, kid, metadata, plaintext) == ct</tt></t>
          </li>
          <li>
            <t><tt>decrypt(metadata, ct) == pt</tt></t>
          </li>
        </ul>
        <t>The other values in the test vector are intermediate values provided to
facilitate debugging of test failures.</t>
        <sourcecode type="test-vectors"><![CDATA[
cipher_suite: 0x0006
kid: 0x0000000000000123
ctr: 0x0000000000004567
base_key: 000102030405060708090a0b0c0d0e0f
sframe_key_label: 534672616d6520312e30205365637265
                  74206b65792000000000000001230006
sframe_salt_label: 534672616d6520312e30205365637265
                   742073616c7420000000000000012300
                   06
sframe_secret: 0fc3ea6de6aac97a35f194cf9bed94d4
               b5230f1cb45a785c9fe5dce9c188938a
               b6ba005bc4c0a19181599e9d1bcf7b74
               aca48b60bf5e254e546d809313e083a3
sframe_key: 3c343886ec1c79278836863e00fe934c
            8894460cfa367ebdc4856b0a9268a4f4
            fb99437876819394ef90b10ee12602d0
            23f7128ee50f2314c2cc3cff4c56616d
            2fe03ad2a254cc2ed29b2a4d3f2534c0
            dda9e7c391ad1917ea07aa221dd4b224
sframe_salt: e082f7ce012ad30c87c49e3f
metadata: 4945544620534672616d65205747
nonce: e082f7ce012ad30c87c4db58
aad: 99012345674945544620534672616d65
     205747
pt: 64726166742d696574662d736672616d
    652d656e63
ct: 9901234567b369e03ec6467ad505ddc8
    4914115069280c5c797555be6e32cde6
    ac25bc9e
]]></sourcecode>
        <sourcecode type="test-vectors"><![CDATA[
cipher_suite: 0x0007
kid: 0x0000000000000123
ctr: 0x0000000000004567
base_key: 000102030405060708090a0b0c0d0e0f
sframe_key_label: 534672616d6520312e30205365637265
                  74206b65792000000000000001230007
sframe_salt_label: 534672616d6520312e30205365637265
                   742073616c7420000000000000012300
                   07
sframe_secret: 0fc3ea6de6aac97a35f194cf9bed94d4
               b5230f1cb45a785c9fe5dce9c188938a
               b6ba005bc4c0a19181599e9d1bcf7b74
               aca48b60bf5e254e546d809313e083a3
sframe_key: 7271d6c6cbccd2e2343d480ebea65718
            a7bb379eefcf3f8d107c1e2a76e75529
            3a497fd9e4e8291b965161987ef4ef24
            983eabb06cb0a392defaab18654780a3
            9c106ffa4a47d4183a6e593cd0c1bcab
            2b9c6dcf049215845bfb7580c4dea80e
sframe_salt: 46b4367993a314910d4d9f3d
metadata: 4945544620534672616d65205747
nonce: 46b4367993a314910d4dda5a
aad: 99012345674945544620534672616d65
     205747
pt: 64726166742d696574662d736672616d
    652d656e63
ct: 990123456797cb5644d8831ff8bdc080
    249990b24b569144cab2a87be22c20d9
    7976
]]></sourcecode>
        <sourcecode type="test-vectors"><![CDATA[
cipher_suite: 0x0008
kid: 0x0000000000000123
ctr: 0x0000000000004567
base_key: 000102030405060708090a0b0c0d0e0f
sframe_key_label: 534672616d6520312e30205365637265
                  74206b65792000000000000001230008
sframe_salt_label: 534672616d6520312e30205365637265
                   742073616c7420000000000000012300
                   08
sframe_secret: 0fc3ea6de6aac97a35f194cf9bed94d4
               b5230f1cb45a785c9fe5dce9c188938a
               b6ba005bc4c0a19181599e9d1bcf7b74
               aca48b60bf5e254e546d809313e083a3
sframe_key: afe92c81e0df8c00fab619e0559fe5ae
            efce1ef77789d4c728af1b1c1f2e3552
            c405d274415a5291ec075c2d9954c450
            fbd36682a4e978494808b703ce78b409
            f9fec29b91e6e703a75c4131377c80c9
            d51b8906088092452e2593eb142eea2d
sframe_salt: f6de647bac1263524cfb6533
metadata: 4945544620534672616d65205747
nonce: f6de647bac1263524cfb2054
aad: 99012345674945544620534672616d65
     205747
pt: 64726166742d696574662d736672616d
    652d656e63
ct: 9901234567112a94a288b85b49ffef1d
    279f2830165c39d76cac8884011c
]]></sourcecode>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAEnA+GkAA+Vaa3PcNpb9zl+Bkb/Yu2qJD/DVVamKxrFnvLvxbNnO7O4n
NQiAao7ZZC/JlqzYyW/fcwGSTbZaspSdKdfMqJIOGwTu89yDC3QWi4XTFV2p
l+zkp60SnW5ZV7P3rxux0exlsV3rhr3fFTT+Tl8Vbdfcnjgiyxp9jSX9vDcX
by9Yv/zEkfjPVd3cLlnbKWdnh5csjdzQcVQtKyxZMtWIvFtkoql0u2hzkrMo
RCUWfhgt3Mhpd9mmaNuirrrbLea/efXhtVPtNplulg6JXDqyrlpdtTsI75qd
dmBR4IhGC1h2sd2WBSzB+paJSsF6US4+FBt94tzUzcerpt5tyQMtd41mP2pV
CGa8gQcf9S3mqKXDFn0o6Ek2t9uuvmrEdn3rXOtqBxMYe1AQY9b4k/+CyqK6
Yn+g2TS+EUWJcev494Xu8rO6uaI3opFrvFl33bZdnp/TRBoqrvXZMO2cBs6z
pr5p9bkVcU5Lr4puvcuwOCvyXWO9Pz+ILc0rKSPdRMlk/pkVclbUhyvPH0rZ
2brblCeOI3bdum4octDDWL4rS5vvd4Vci0ax35vl5iU8EVXxs1G7BNhaWZtx
bYPTlNn3xfb6rP10V9qrjVDsTxvRiCOSKPd6KknXNPN7QeNnst7clXfR1BV7
VwNOwNfVY2QKrDhrhhUT2Y5T1c0Gy66BD6eo8v03xj4g7n/WsqubdmmkDcXX
VxK9Z/2EEztBNFcauRpS1acHms4fyPJ5VtYZYac6p1Qvrq3I2ZeF0C1l7i9t
XRlVpqqY7/rhwk0dZ7FYMJGh4oXsHOfDumgZqne30VXHhFKNbltii5ua1X2l
tqyoWLfWrC8GWwbsuXXuBds2dVfLunTarZZF3tfnGWOvi6btTs1SpfOiKmic
1bkZMezS9OTDEM6hJqWhp9ayE2zoWtbqa92IkhWbbd10ApbmhS5VCx1zB3YD
2fUKnFFBb5tWLLtl716/NMRlKKTR/7tD/GiR6KxZiAO+AQW9nlPH2o9SJ8lg
qA7aWuvKfprxAiFqyBT82xS6PXMQtbpSNgwXry5+oOUwaSdNNDLRwiY8XLx6
v3j54Z0x6Y8/Xrxk5BdpNa9LEyKHZHh+ssiKDkGBqqK7ZSWiU94JhfUcgWRb
VElZ6nKmuHXgLIkjYj4izgJlUyiFAnGesTdwp1Z27d8SNuzz598hPZSdX365
F0MFzYNc8yU585AJZ7/saxBjj4GYcw/EHgEXk0ObOwNF50mAYexBxDj3I+b5
LCz8LDSBYfvAvPhbg4qJznkQVM+M1fSaLL8B6xnTF+//eBF6vuM8aP4YUwGt
yNMOjtPOBMsIPfBJV2Y7pzBN7Tplu3Yo3l01X0J2bGqlSRVsMynZixmD69D4
ZCUxHNUB1jXFVVEBOnMcm/AOBlvAMYM4di1KIMgoKmCjqCShMEfgEOoZOVir
KWKUn2muKWDE8pQgPV9EfZCFXUtYvxG37AZWQxi8NRGfpmAqEBnoBVrjizzX
gCaZh/7L6cu51NVVtzZYbmsosDW1KADxhsJgoY1N8l+MKHRdLbvSFaqrs+x7
uAAzEKimuLaBe74yX/Qlxi9bUXarF0Y9Gpy6ukIU0cli65VrY02ltWr73N3n
FHueRlBMxX7dMp7YZwikFDwQ3RdngxOGd2BqJ65s+tgKjyvioRVBcdfpSzvQ
soj3uii5Gg0NjAt8OwaBbxQhCEFq+vKfQKOdZPw+XxCKsYSLCgVjBSysAHAm
Fdn7oe5eAhmFotgbzjeAHRkRrRsC2vP0tMzX4hqRrZkAAGRHXEOhHosZDtkc
9hVQ6RsmShwOAK5NO5KEzfZcMjijvjHS4Nu/GtaakRtym2kLVVilq+sCDdnG
cKfhW2LfAhEQD1GMIeW7nk/t2IiPhpsbrfeMDr9o6dIeeva7fbnb7Hezvqdz
ZqeokzGop7Qb0NKezgmthnZMZ6Lm25EF8I0zx8A+u/PgnRos2M1mFlPacIxa
clWUaHr6uu2VFO2oluLzbOxLD3wYjoL9oY99ftb3n3OI2aQfPUzu2611vSuV
yWXvOOJgTSerCAUIktPH1pDF6u16tTTV1hY/U8n1ZdRv5vWuQ5kN39aiXaPR
r/p+hFZ/FFj++p6Ksons9wyzpyrdyqbIbJwPth1QA/SM+47die9YJQxzDXmE
YN2Utzb14y7E9oXRW3mfj3Np0x1oLqC6X0BV73P+kIiuF1Gj5VkTQx3G+thS
9hyHXmxuZXm7Dwd2LXjITsB9J7ZAgTWk2eabpm1LQUT/qXtBmzvAPgPTYgAM
NveiLHd0LBn6d2IVSwzUPfaWTcoMiUQLeY0abx37ylCDmu6vJu22v4LZE2Ia
u3PnC/uzIfT93xf2lpB97x/er+njozCf9FHRR4ePd/TvWH5f2EtDsURGaJ/R
LzXsi/NluTj4uzty5L2dtH8cP6arj0mCRuZ+cvE39eGdbnVzjVDc4+Oi/5g8
jh9f9icoPNMdzsHqQaM3lbjCtnaJrfYS1H9J1H9pt9nLxF3Re2ySX5gX0SP2
aDya7y4+/ufxGv1HaYz4/RpZ8jSNwaM0Bv4DGvnTNPKjGv/w8sdBGb6uhvdG
Y3UurN4hqtHTNIZ3NJKaXiO6kpnGiI8arbtP1viasLqgB/xNsUo1/Z+mU9Ts
p1YPGv9/WP28ZM/uJSZ7lfPdydsZGxH5zA91X9kQT9gvZuedvx36z/vOQ9iB
j2294/5pOHJoNPZb7oyAHzRr+U/Ff9FRFE8rlaDcs5FBMfCLz3RfN1M2+m/8
faVu4kdp7NnoqMYZGz1CY/IojT0bHdfIH6lxqJux091XyjD09Zow10yZkB+p
cZ/ek/Yde9v3ZcNWj26j1bYNpMn9pWffe2y2paaWuP+BQApz6kUlOOh0ivzW
TkNV4OxToyuQ1BWMqwZrD07/So9fTX2aC51ZiznpKw579jN7OTzaSae33hXL
ZlndrR170TPywOLOucgYQtPpbvuInYNhd08T6HAusKTviUi9xly8rmBfU0hG
NqD3I3IDo9D109v+zWRNo7cNOBiEpxwcN9b6U//2FN7guPJpuFpYuZ9WEPH7
icRDARQjCHBgfk0nJVj4HzjvsKzR4qO9O7tZk+lbAQohqVgwsQXHat30JwrE
iC7iB667KRSi2TeCmyk5E5btlb294ZieUDC1ps0l05hhDp/2XEvIOcydKFuc
Y67p15usNP33v73/09teNMM/nz9PfgwwN5hvzLnRMfOm8k7HFEycM7Ps72E2
FJPcTOZZaUOAaScS++tpys4Q3MH/WYrNTmQOQa9GCJ3/sIf5T+MlxPQCwnHo
cKWFXKOwWn3KbkYo2/Obxd2lwV1/wihwKPo02DC7BCtsaT5vNd3sfP589KT5
ywuSi3NRL848YikdBJHyfQGc74uUVuDF5X7VpE7aXUanrK25yh7uJyC3v3Gy
r9vnL1aTIxPk0b3fROD8GvC3CjWntcEx++URrgmhhjX0+IgV2+G4Nx7FTLKG
URtxM+xcVAccOlTJAX1OOhACLf1Me0qXjADminB11uNqZcBjh3p8rWwZzW45
jlz6jmdvC62p0OeI5qk96+IUKBQoqHvBvvuOwaVxbq/t7lxp58KQ/vbWkGFf
Wf0Vz6RKe8YBuW/oJ+D97e1I4thcciGLsujordLZ7upqKDySk4Mr0DJS1Zm6
68n7aOV9uxIrCFUX7N/f/GAdtBBpzCCRwDhIvz5MSmH/fY/EKfjHO9w59q0p
5i2IVJe9NPNsb/8gx4qYTl4NGXqceHrzePlWztMUIHN6KKSDQYSsKYZN4kkh
OZBn/LaXzvdRzNfDcGijmfybhG50J5ToxCBx/D4HQA/zlR6ZYCrkK5w0+5nu
r0dNesZK6nGExA+uAu19IjrL4efq2tg//ERQ/Dy2QvvSEG1bXFUWdbbWnH6b
MiSFQjtlGD5lQzBPJ/dmE2rrTX6+n/Yt6ezXX39l0//zwJmy07I/cjnwq3/e
/3l+4MDpw3EeRrEzRA0vMdH13cDlbuhGbuwmbuoKN3Olq1zt5s4hiyxZGPAo
9iMvUlGIlZ6vA0gIgyiMAoyHzt3TbMx9N8qiME5999BI48AdMvlNaoyeOMAa
SU93NR1bM9FuSAUxyWWgRaR0JIRMYxGEuZdymaeZVilX/FBKFkJ27smMhyJO
QpnmOlRSp9JLkjRIxJ35USZcN8wkl67wUi/xwjTVqfIymcdZfEe+kIInWeRm
eaj9kOuQRwppCrxAu0kggkmOliyQAQ+SJNLSkwh3nCRBlESY6eY6DbicCYd9
nEeuzEUQxTpTkidhlLki9aNE8HxuSZ6lKQ/iJI4SLw1SrvPUzTxXa8+PXF/N
g+sHeez5idahm/uBx6UvZSDznMswopzOJ+faDYTyBbyT0tfKTzNfcBXkPlAg
55KVEqmOZZB6QiF4sRZuLITve0rxzPf5FEtLhgj5eSw18i9U4MokljzVQe4M
5b1kPOVhiDAQuKaQC2MeO6atOS5GZWHioN9ZsjQleFFlHZdl7e8lbmFVxM0r
zPdVlKIueBT5Csjtl5gFsAFrIx1RHU+VZEGUImBaRlAhVOiGSsnErOGpxz0P
lZz6iStDICAOwzDTkQ58CUA7Fk8+wJdqIpfHMUz8984w8TdlmPgfimFiP/ZU
JCOZSal8DUwGiieuzuBRGHvJTLiIsyyIU61zmQd5ojw3lp72RRxpINNPZ5MD
wdM4V6nmOvFTL0NleJGXJrHOwTb+3Ow0QQizzIUdrghSH62FEJmXRCGPE4zM
J0vPjfJccMFjxT34FOkwDaRyJWIisjkdZamMlMxdnvpemPAwy7M4RD1xpQUc
nTMMjzIO9kxTxMlD/bmKqzQP1BMZ5pgYJULxTRgmjWUWRpwr7B5enifYGVC2
Zo3PU8zLfI4JIBuO4PkiiTPt+9J3lU0oBESPZ5fk751dkm/KLsk/FLsItCm+
TDztqjyR6FpEBgrQbhiSWULPhINVtKfzOI6TVHEZ+4nIvcyTXo5og15mkyUg
ovyYcy8UYB5PSzcOpa/SFF0HD92DZkehVhJ0ITqNExRd4iZZ7AZSx0nG3Tlv
5TBNomeBTNAaWhnI5R78i2MJ2phPVqGXJSmwmiAGPg/BoGAinXnc11r4as4u
OaWRx5mQ6LKC0EcagcMgeCK7HBODGfybsIuHJirlwk+SLAkznua5zj27xo/T
3E8C14tCdHgqjqSQSZJw1/OkJZT/AyHaifB3MQAA

-->

</rfc>
