rfc9528v3.txt   rfc9528.txt 
skipping to change at line 3303 skipping to change at line 3303
[CNSA] Wikipedia, "Commercial National Security Algorithm Suite", [CNSA] Wikipedia, "Commercial National Security Algorithm Suite",
October 2023, <https://en.wikipedia.org/w/index.php?title= October 2023, <https://en.wikipedia.org/w/index.php?title=
Commercial_National_Security_Algorithm_Suite&oldid=1181333 Commercial_National_Security_Algorithm_Suite&oldid=1181333
611>. 611>.
[CoAP-SEC-PROT] [CoAP-SEC-PROT]
Mattsson, J. P., Palombini, F., and M. Vučinić, Mattsson, J. P., Palombini, F., and M. Vučinić,
"Comparison of CoAP Security Protocols", Work in Progress, "Comparison of CoAP Security Protocols", Work in Progress,
Internet-Draft, draft-ietf-iotops-security-protocol- Internet-Draft, draft-ietf-iotops-security-protocol-
comparison-03, 23 October 2023, comparison-04, 4 March 2024,
<https://datatracker.ietf.org/doc/html/draft-ietf-iotops- <https://datatracker.ietf.org/doc/html/draft-ietf-iotops-
security-protocol-comparison-03>. security-protocol-comparison-04>.
[CottierPointcheval22] [CottierPointcheval22]
Cottier, B. and D. Pointcheval, "Security Analysis of the Cottier, B. and D. Pointcheval, "Security Analysis of the
EDHOC protocol", September 2022, EDHOC protocol", September 2022,
<https://arxiv.org/abs/2209.03599>. <https://arxiv.org/abs/2209.03599>.
[CURVE-REPR] [CURVE-REPR]
Struik, R., "Alternative Elliptic Curve Representations", Struik, R., "Alternative Elliptic Curve Representations",
Work in Progress, Internet-Draft, draft-ietf-lwig-curve- Work in Progress, Internet-Draft, draft-ietf-lwig-curve-
representations-23, 21 January 2022, representations-23, 21 January 2022,
skipping to change at line 3368 skipping to change at line 3368
<https://eprint.iacr.org/2010/264.pdf>. <https://eprint.iacr.org/2010/264.pdf>.
[Jacomme23] [Jacomme23]
Jacomme, C., Klein, E., Kremer, S., and M. Racouchot, "A Jacomme, C., Klein, E., Kremer, S., and M. Racouchot, "A
comprehensive, formal and automated analysis of the EDHOC comprehensive, formal and automated analysis of the EDHOC
protocol", October 2022, protocol", October 2022,
<https://hal.inria.fr/hal-03810102/>. <https://hal.inria.fr/hal-03810102/>.
[KUDOS] Höglund, R. and M. Tiloca, "Key Update for OSCORE [KUDOS] Höglund, R. and M. Tiloca, "Key Update for OSCORE
(KUDOS)", Work in Progress, Internet-Draft, draft-ietf- (KUDOS)", Work in Progress, Internet-Draft, draft-ietf-
core-oscore-key-update-06, 23 October 2023, core-oscore-key-update-07, 4 March 2024,
<https://datatracker.ietf.org/doc/html/draft-ietf-core- <https://datatracker.ietf.org/doc/html/draft-ietf-core-
oscore-key-update-06>. oscore-key-update-07>.
[LAKE-AUTHZ] [LAKE-AUTHZ]
Selander, G., Mattsson, J. P., Vučinić, M., Fedrecheski, Selander, G., Mattsson, J. P., Vučinić, M., Fedrecheski,
G., and M. Richardson, "Lightweight Authorization using G., and M. Richardson, "Lightweight Authorization using
Ephemeral Diffie-Hellman Over COSE", Work in Progress, Ephemeral Diffie-Hellman Over COSE", Work in Progress,
Internet-Draft, draft-ietf-lake-authz-01, 4 March 2024, Internet-Draft, draft-ietf-lake-authz-01, 4 March 2024,
<https://datatracker.ietf.org/doc/html/draft-ietf-lake- <https://datatracker.ietf.org/doc/html/draft-ietf-lake-
authz-01>. authz-01>.
[LAKE-REQS] [LAKE-REQS]
skipping to change at line 3402 skipping to change at line 3402
[Noise] Perrin, T., "The Noise Protocol Framework", Revision 34, [Noise] Perrin, T., "The Noise Protocol Framework", Revision 34,
July 2018, <https://noiseprotocol.org/noise.html>. July 2018, <https://noiseprotocol.org/noise.html>.
[Norrman20] [Norrman20]
Norrman, K., Sundararajan, V., and A. Bruni, "Formal Norrman, K., Sundararajan, V., and A. Bruni, "Formal
Analysis of EDHOC Key Establishment for Constrained IoT Analysis of EDHOC Key Establishment for Constrained IoT
Devices", September 2020, Devices", September 2020,
<https://arxiv.org/abs/2007.11427>. <https://arxiv.org/abs/2007.11427>.
[PreußMattsson23]
Preuß Mattsson, J., "Hidden Stream Ciphers and TMTO
Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal",
DOI 10.1007/978-981-99-7563-1_12, December 2023,
<https://eprint.iacr.org/2023/913>.
[PreußMattsson24]
Preuß Mattsson, J., "Security of Symmetric Ratchets and
Key Chains - Implications for Protocols like TLS 1.3,
Signal, and PQ3", February 2024,
<https://eprint.iacr.org/2024/220>.
[RFC2986] Nystrom, M. and B. Kaliski, "PKCS #10: Certification [RFC2986] Nystrom, M. and B. Kaliski, "PKCS #10: Certification
Request Syntax Specification Version 1.7", RFC 2986, Request Syntax Specification Version 1.7", RFC 2986,
DOI 10.17487/RFC2986, November 2000, DOI 10.17487/RFC2986, November 2000,
<https://www.rfc-editor.org/info/rfc2986>. <https://www.rfc-editor.org/info/rfc2986>.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
<https://www.rfc-editor.org/info/rfc5280>. <https://www.rfc-editor.org/info/rfc5280>.
skipping to change at line 4069 skipping to change at line 4057
where protected, external_aad, and payload are specified in where protected, external_aad, and payload are specified in
Sections 5.3 and 5.4. Sections 5.3 and 5.4.
Different header parameters to identify X.509 or C509 certificates by Different header parameters to identify X.509 or C509 certificates by
reference are defined in [RFC9360] and [C509-CERTS]: reference are defined in [RFC9360] and [C509-CERTS]:
* by a hash value with the 'x5t' or 'c5t' parameters, respectively: * by a hash value with the 'x5t' or 'c5t' parameters, respectively:
- ID_CRED_x = { 34 : COSE_CertHash }, for x = I or R and - ID_CRED_x = { 34 : COSE_CertHash }, for x = I or R and
- ID_CRED_x = { TBD3 : COSE_CertHash }, for x = I or R, - ID_CRED_x = { 22 : COSE_CertHash }, for x = I or R,
* or by a URI with the 'x5u' or 'c5u' parameters, respectively: * or by a URI with the 'x5u' or 'c5u' parameters, respectively:
- ID_CRED_x = { 35 : uri }, for x = I or R, and - ID_CRED_x = { 35 : uri }, for x = I or R, and
- ID_CRED_x = { TBD4 : uri }, for x = I or R. - ID_CRED_x = { 23 : uri }, for x = I or R.
When ID_CRED_x does not contain the actual credential, it may be very When ID_CRED_x does not contain the actual credential, it may be very
short, e.g., if the endpoints have agreed to use a key identifier short, e.g., if the endpoints have agreed to use a key identifier
parameter 'kid': parameter 'kid':
* ID_CRED_x = { 4 : kid_x }, where kid_x : kid, for x = I or R. For * ID_CRED_x = { 4 : kid_x }, where kid_x : kid, for x = I or R. For
further optimization, see Section 3.5.3. further optimization, see Section 3.5.3.
Note that ID_CRED_x can contain several header parameters, for Note that ID_CRED_x can contain several header parameters, for
example, { x5u, x5t } or { kid, kid_context }. example, { x5u, x5t } or { kid, kid_context }.
skipping to change at line 4441 skipping to change at line 4429
algorithm of the selected cipher suite. algorithm of the selected cipher suite.
The EDHOC_KeyUpdate takes the context as input to enable binding of The EDHOC_KeyUpdate takes the context as input to enable binding of
the updated PRK_out to some event that triggered the key update. The the updated PRK_out to some event that triggered the key update. The
Initiator and Responder need to agree on the context, which can, Initiator and Responder need to agree on the context, which can,
e.g., be a counter, a pseudorandom number, or a hash. To provide e.g., be a counter, a pseudorandom number, or a hash. To provide
forward secrecy, the old PRK_out and keys derived from it (old forward secrecy, the old PRK_out and keys derived from it (old
PRK_exporter and old application keys) must be deleted as soon as PRK_exporter and old application keys) must be deleted as soon as
they are not needed. When to delete the old keys and how to verify they are not needed. When to delete the old keys and how to verify
that they are not needed is up to the application. Note that the that they are not needed is up to the application. Note that the
security properties depends on the type of context and the number of security properties depend on the type of context and the number of
KeyUpdate iterations [PreußMattsson23] [PreußMattsson24]. KeyUpdate iterations.
An application using EDHOC_KeyUpdate needs to store PRK_out. An application using EDHOC_KeyUpdate needs to store PRK_out.
Compromise of PRK_out leads to compromise of all keying material Compromise of PRK_out leads to compromise of all keying material
derived with the EDHOC_Exporter since the last invocation of the derived with the EDHOC_Exporter since the last invocation of the
EDHOC_KeyUpdate function. EDHOC_KeyUpdate function.
While this key update method provides forward secrecy, it does not While this key update method provides forward secrecy, it does not
give as strong security properties as re-running EDHOC. give as strong security properties as re-running EDHOC.
EDHOC_KeyUpdate can be used to meet cryptographic limits and provide EDHOC_KeyUpdate can be used to meet cryptographic limits and provide
partial protection against key leakage, but it provides significantly partial protection against key leakage, but it provides significantly
 End of changes. 8 change blocks. 
20 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.48.