Re: [jose] Fully-specified ECDH algorithms

Michael Prorock <mprorock@mesur.io> Wed, 10 April 2024 15:48 UTC

Return-Path: <michael.prorock@mesur.io>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6763C14F69C for <jose@ietfa.amsl.com>; Wed, 10 Apr 2024 08:48:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mesur-io.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 78-y0jOz6n4w for <jose@ietfa.amsl.com>; Wed, 10 Apr 2024 08:48:14 -0700 (PDT)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A4EAC14F61B for <jose@ietf.org>; Wed, 10 Apr 2024 08:48:14 -0700 (PDT)
Received: by mail-ej1-x633.google.com with SMTP id a640c23a62f3a-a51d0dda061so505125066b.1 for <jose@ietf.org>; Wed, 10 Apr 2024 08:48:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mesur-io.20230601.gappssmtp.com; s=20230601; t=1712764092; x=1713368892; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=acFh7G1HUkAF2qbbvi9l5SG3LShx7TX8LYoElmmPIBA=; b=3FxPK6kljqYcnnXIell2T6i7b4DaMzZIYvlqBy54YTP0m6h6adLdBolY/QphXiNr8y jVi41Wt53mEhXyJEa63kDd8OwFbhMRCKc+v9f/5oCIk6FyBXFDiaE/Uqs/WodKUuxb+E KC2rTdiAixKF3a7H4SNPh4RYzEzs+RcCkri04E0C4ZnrxDge5gEtUx+L1EWbP4v3z/x+ UzYRB/GRUYVXZ30Q4I7p5nOvikW4gXDuuT0W/dGNL62HvUBEoAuPLM1UmMivqlpWAYiM nR5j3szf992fK0jL//gEFmVaLtZVIZaBke164RoUuVOyJwpDoBxU87ZRg70NigXSZcGD h2Pw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712764092; x=1713368892; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=acFh7G1HUkAF2qbbvi9l5SG3LShx7TX8LYoElmmPIBA=; b=Qcf0NElZqC5QkREyRkir739y3vvmdsAFOKIlncFmHrU73GAasSG8+UNhd6dd+s+IDO 1W5wFB6yrJXx4DkdFeT/EIWrcWdkJscWq4kYRcebPq1T8fCGbltg2goeuDmsySLg+hah uVBKYEO4tmnhCB4jhEppfYjAjcBhGSQ3BO95XyLSfbWffO0XluLoqjHLLNkZo3Sd47o4 Ww1UBp3/rslID3PO725aYwT32uFTI81C7FlkLXNe2/nCJfzdTJaJ0yBhBYX1QtVj7i5O x3ZfKmt+P2Uktz1TUWMo7zFuQa1ijTDm/w8teVbC60pgjvtTbUeQHBNJoq+2Dx+LEWy+ G+ng==
X-Gm-Message-State: AOJu0YyKFeG553dCOjb/2K3oDtQLUZ+QTU0vmdEhO5nFMpYFIk2t2N98 3WKDT/l9SNw+62WZZhpfJ4h0IFLhMuG/69Gls+U78c6riUrTfJuBdE6UugKrZMHXN0nYVl9m7Q+ M/jUqjCKNwqTyAWubz1fM/uUfVZuc9gyjVhzF
X-Google-Smtp-Source: AGHT+IEtLKnHMDchPNOGt/9/UoGUiv6jpipbbKnOqQSH5rcqKoyC1tok9WD5xBQn4T/5yRbkHeyhe4XRgi2XkvnkiAk=
X-Received: by 2002:a17:907:868f:b0:a52:fb5:da65 with SMTP id qa15-20020a170907868f00b00a520fb5da65mr41452ejc.8.1712764092385; Wed, 10 Apr 2024 08:48:12 -0700 (PDT)
MIME-Version: 1.0
References: <SJ0PR02MB743903D29F9E9A376FB6702EB7062@SJ0PR02MB7439.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB743903D29F9E9A376FB6702EB7062@SJ0PR02MB7439.namprd02.prod.outlook.com>
From: Michael Prorock <mprorock@mesur.io>
Date: Wed, 10 Apr 2024 09:48:00 -0600
Message-ID: <CAGJKSNRcddVvFERf3qPUehU0_HfGV=QL1m6Wc9fb-TjY7+sUXQ@mail.gmail.com>
To: Michael Jones <michael_b_jones@hotmail.com>
Cc: JOSE WG <jose@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004fa6fe0615bff732"
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/CpIDCJ9vkrVreLR5ePBDQidrL1A>
Subject: Re: [jose] Fully-specified ECDH algorithms
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 15:48:19 -0000

Thanks Mike & Orie.

This looks very sane.

Mike Prorock
founder - mesur.io

On Wed, Apr 10, 2024, 09:21 Michael Jones <michael_b_jones@hotmail.com>
wrote:

> At IETF 119, we’d been asked to describe to the working group what
> including fully-specified ECDH algorithms would look like.  Please let us
> know if you’re in favor of addressing this in
> draft-ietf-jose-fully-specified-algorithms or not, and whether you agree
> with the characterization of how to do so below, or if there are specific
> changes you’d suggest.
>
>
>
> These registered JOSE algorithms are polymorphic, because they do not
> include the algorithm to be used for the ephemeral key:
>
>
>
> ECDH-ES
>
> ECDH-ES using Concat KDF
>
> ECDH-ES+A128KW
>
> ECDH-ES using Concat KDF and "A128KW" wrapping
>
> ECDH-ES+A192KW
>
> ECDH-ES using Concat KDF and "A192KW" wrapping
>
> ECDH-ES+A256KW
>
> ECDH-ES using Concat KDF and "A256KW" wrapping
>
>
>
> Fully-specified versions of these algorithms using combinations that “make
> sense”, per Brian Campbell’s suggestion
> <https://mailarchive.ietf.org/arch/msg/jose/LGqdnxk-ziF2Odm6CuxTUYnaKnc/>,
> would be:
>
>
>
> ECDH-ES-P-256
>
> ECDH-ES using Concat KDF and P-256
>
> ECDH-ES-P-384
>
> ECDH-ES using Concat KDF and P-384
>
> ECDH-ES-P-521
>
> ECDH-ES using Concat KDF and P-521
>
> ECDH-ES-X25519
>
> ECDH-ES using Concat KDF and X25519
>
> ECDH-ES-X448
>
> ECDH-ES using Concat KDF and X448
>
> ECDH-ES-P-256+A128KW
>
> ECDH-ES using Concat KDF and P-256 and "A128KW" wrapping
>
> ECDH-ES-X25519+A128KW
>
> ECDH-ES using Concat KDF and X25519 and "A128KW" wrapping
>
> ECDH-ES-P-384+A192KW
>
> ECDH-ES using Concat KDF and P-384 and "A192KW" wrapping
>
> ECDH-ES-P-521+A256KW
>
> ECDH-ES using Concat KDF and P-521 and "A256KW" wrapping
>
> ECDH-ES-X448+A256KW
>
> ECDH-ES using Concat KDF and X448 and "A256KW" wrapping
>
>
>
> These registered COSE algorithms are likewise polymorphic, because they do
> not include the algorithm to be used with the ephemeral key or the static
> key:
>
>
>
> ECDH-ES + HKDF-256
>
> ECDH ES w/ HKDF -- generate key directly
>
> ECDH-ES + HKDF-512
>
> ECDH ES w/ HKDF -- generate key directly
>
> ECDH-SS + HKDF-256
>
> ECDH SS w/ HKDF -- generate key directly
>
> ECDH-SS + HKDF-512
>
> ECDH SS w/ HKDF -- generate key directly
>
> ECDH-ES + A128KW
>
> ECDH ES w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-ES + A192KW
>
> ECDH ES w/ HKDF and AES Key Wrap w/ 192-bit key
>
> ECDH-ES + A256KW
>
> ECDH ES w/ HKDF and AES Key Wrap w/ 256-bit key
>
> ECDH-SS + A128KW
>
> ECDH SS w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-SS + A192KW
>
> ECDH SS w/ HKDF and AES Key Wrap w/ 192-bit key
>
> ECDH-SS + A256KW
>
> ECDH SS w/ HKDF and AES Key Wrap w/ 256-bit key
>
>
>
> Fully-specified versions of these algorithms, again using combinations
> that make sense, would be:
>
>
>
> ECDH-ES-P-256 + HKDF-256
>
> ECDH ES using P-256 w/ HKDF -- generate key directly
>
> ECDH-ES-X25519 + HKDF-256
>
> ECDH ES using X25519 w/ HKDF -- generate key directly
>
> ECDH-ES-P-521 + HKDF-512
>
> ECDH ES using P-521 w/ HKDF -- generate key directly
>
> ECDH-ES-X448 + HKDF-512
>
> ECDH ES using X448 w/ HKDF -- generate key directly
>
> ECDH-SS-P-256 + HKDF-256
>
> ECDH SS using P-256 w/ HKDF -- generate key directly
>
> ECDH-SS-X25519 + HKDF-256
>
> ECDH SS using X25519 w/ HKDF -- generate key directly
>
> ECDH-SS-P-521 + HKDF-512
>
> ECDH SS using P-521 w/ HKDF -- generate key directly
>
> ECDH-SS-X448 + HKDF-512
>
> ECDH SS using X448 w/ HKDF -- generate key directly
>
> ECDH-ES-P-256 + A128KW
>
> ECDH ES using P-256 w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-ES-X25519 + A128KW
>
> ECDH ES using X25519 w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-ES-P-384 + A192KW
>
> ECDH ES using P-384 w/ HKDF and AES Key Wrap w/ 192-bit key
>
> ECDH-ES-P-521 + A256KW
>
> ECDH ES using P-521 w/ HKDF and AES Key Wrap w/ 256-bit key
>
> ECDH-ES-X448 + A256KW
>
> ECDH ES using X448 w/ HKDF and AES Key Wrap w/ 256-bit key
>
> ECDH-SS-P-256 + A128KW
>
> ECDH SS using P-256 w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-SS-X25519 + A128KW
>
> ECDH SS using X25519 w/ HKDF and AES Key Wrap w/ 128-bit key
>
> ECDH-SS-P-384 + A192KW
>
> ECDH SS using P-384 w/ HKDF and AES Key Wrap w/ 192-bit key
>
> ECDH-SS-P-521 + A256KW
>
> ECDH SS using P-521 w/ HKDF and AES Key Wrap w/ 256-bit key
>
> ECDH-SS-X448 + A256KW
>
> ECDH SS using X448 w/ HKDF and AES Key Wrap w/ 256-bit key
>
>
>
>                                                                 Thanks all,
>
>                                                                 -- Mike &
> Orie
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose
>