Re: [COSE] Multicast Use Case
Göran Selander <goran.selander@ericsson.com> Fri, 04 September 2015 13:16 UTC
Return-Path: <goran.selander@ericsson.com>
X-Original-To: cose@ietfa.amsl.com
Delivered-To: cose@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80A181A0010 for <cose@ietfa.amsl.com>; Fri, 4 Sep 2015 06:16:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.301
X-Spam-Level:
X-Spam-Status: No, score=-3.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_42=0.6, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T-MsAMroklOR for <cose@ietfa.amsl.com>; Fri, 4 Sep 2015 06:16:19 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3153B1A6F13 for <cose@ietf.org>; Fri, 4 Sep 2015 06:16:00 -0700 (PDT)
X-AuditID: c1b4fb3a-f79136d0000071e2-54-55e9998e8c9b
Received: from ESESSHC017.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 05.7C.29154.E8999E55; Fri, 4 Sep 2015 15:15:58 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.14]) by ESESSHC017.ericsson.se ([153.88.183.69]) with mapi id 14.03.0248.002; Fri, 4 Sep 2015 15:15:57 +0200
From: Göran Selander <goran.selander@ericsson.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "cose@ietf.org" <cose@ietf.org>
Thread-Topic: [COSE] Multicast Use Case
Thread-Index: AQHQ473OCJcli807O0ig5JfamPgHmZ4sYC2A
Date: Fri, 04 Sep 2015 13:15:57 +0000
Message-ID: <D20F54E9.34F4C%goran.selander@ericsson.com>
References: <55E400AC.7090507@gmx.net>
In-Reply-To: <55E400AC.7090507@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.7.141117
x-originating-ip: [153.88.183.18]
Content-Type: text/plain; charset="utf-8"
Content-ID: <C39A9E873D263A4BA5793643DEFC81A8@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpikeLIzCtJLcpLzFFi42KZGfG3Rrdv5stQgzUPZC2mbZ3KarF05z1W ByaPxZv2s3ksWfKTKYApissmJTUnsyy1SN8ugSuj4cJC9oJ/8hUtM9uYGhinyHcxcnJICJhI HJq4jg3CFpO4cG89kM3FISRwlFHi89U2RghnEaPEz/VHwarYBFwkHjQ8YgKxRQRCJPYdvw0W FxZQk5i55jkbRFxdYtXHXSwQtpHE7fdLWUFsFgEVifszZ4HFeQUsJFaf+gtmCwH1vupeC9bL CdT74fppsHpGoIu+n1oDtotZQFzi1pP5TBCXCkgs2XOeGcIWlXj5+B9YvaiAnsTK601Q3yhK fHy1D+gBDqBeTYn1u/QhTGuJ/ysEICYqSkzpfsgOcY2gxMmZT1gmMIrPQrJsFkLzLITmWUia ZyFpXsDIuopRtDi1uDg33chIL7UoM7m4OD9PLy+1ZBMjMNIObvlttYPx4HPHQ4wCHIxKPLwK v1+ECrEmlhVX5h5ilOZgURLnbWZ6ECokkJ5YkpqdmlqQWhRfVJqTWnyIkYmDU6qB0YLPunpj smIYk+29YzdLdle3sb+YsZDzEseEnPffV2X1OzGH1ZndsZ5y0spvnpjekSdyO5q5pNfGXEj4 ufRQvETmrocR07OvFs26WLtpyfP8skPXnL6rHTC9eXufR3Ff+VvJt5kJ53qTr344w2Q6R6rQ 4UGTh+9N99jXlxZN2vvjwV3dXgW5l0osxRmJhlrMRcWJAElPqWqVAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/cose/0UX0x7P-8KZuZ5U6B7mwKBRcxUk>
Subject: Re: [COSE] Multicast Use Case
X-BeenThere: cose@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: CBOR Object Signing and Encryption <cose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cose>, <mailto:cose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cose/>
List-Post: <mailto:cose@ietf.org>
List-Help: <mailto:cose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cose>, <mailto:cose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 13:16:21 -0000
Hi, Independently of the multicast use case, there is a secure communication setting that is similar to this example which I think deserves being considered in COSE. What I expect to be a common setting is that the receiver has already established a security context, including algorithm, key, sequence number/used nonces etc. with a context identifier that is locally unique. In this case the only information that needs to be passed in the message is context identifier and nonce/sequence number together with ciphertext + tag. You may of course argue that you should use the existing COSE_encrypt format. But since a) the assumptions are quite different, b) the optimizations may be significant and c) this may be a common mode of operation, I think it actually deserves a (sub-)format of its own. If we don’t define this in COSE, someone may be tempted to do this elsewhere. Regards Göran On 2015-08-31 09:22, "Hannes Tschofenig" <hannes.tschofenig@gmx.net> wrote: >Hi Jim, Brian, all, > >I am trying to compare the work on multicast security done by Sandeed & >co against an application layer solution using CBOR/COSE. > >The DTLS multicast includes the following relevant components: >- Epoch: 2 Byte >- Sender ID: 1 Byte >- Sequence Number: 5 Byte > >The combination of epoch, sender id and sequence number are used as a >nonce for the cipher and the use of the sender id ensures that no member >of the group accidentally selects values that will cause re-use. > >The 1 byte sender id is chosen small to reflect the expected size of a >group in the professional lighting environment, as explained in the DTLS >multicast document. > >Ciphersuite related information includes: >- Encrypted Content (variable length) >- MAC (variable length) > >Content Type, Version and Length are DTLS-specific aspects that cannot >be removed without re-design of the record layer. > >Data based on Figure 4 of >http://tools.ietf.org/html/draft-keoh-dice-multicast-security-08.txt. > >Since there is no sequence number defined in COSE I put the epoch and >the sequence number together into the nonce field. > >Here is the commented version of the COSE message I came up with: > >[ > 2, // Encrypted COSE message > { > 1: 10, // Algorithm - AES-CCM-16-64-128 > 5: h'89f52fa' // 7-byte nonce > }, > h'7b9dcfa42c4e1d3182c402dc18ef8b5637de4fb62cf1dd156ea6e6e0', > // encrypted payload. > [ > [ > h'', > { > 1: -6, // Direct use of CEK > 4: h'01' // Key ID - 0x01 > }, > h'' > ] > ] > ] > >According to cbor.me the resulting COSE encoding has 59 bytes whereby 28 >bytes are purely used for message encryption. This means that there is >31 bytes overhead with COSE compared to 12 bytes [= 8 for Epoch + >Sequence Number + Sender ID, 3 bytes for Content Type and Version fields]. > >Ciao >Hannes >
- [COSE] Multicast Use Case Hannes Tschofenig
- Re: [COSE] Multicast Use Case Jim Schaad
- Re: [COSE] Multicast Use Case Sandeep Kumar
- Re: [COSE] Multicast Use Case Jim Schaad
- Re: [COSE] Multicast Use Case Kumar, Sandeep
- Re: [COSE] Multicast Use Case Carsten Bormann
- Re: [COSE] Multicast Use Case Stephen Farrell
- Re: [COSE] Multicast Use Case Göran Selander
- Re: [COSE] Multicast Use Case Hannes Tschofenig
- Re: [COSE] Multicast Use Case Hannes Tschofenig
- Re: [COSE] Multicast Use Case Hannes Tschofenig
- Re: [COSE] Multicast Use Case Somaraju Abhinav
- Re: [COSE] Multicast Use Case Jim Schaad