Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key
Michael Jones <michael_b_jones@hotmail.com> Fri, 09 November 2012 18:55 UTC
Return-Path: <michael_b_jones@hotmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 057E621F8447 for <jose@ietfa.amsl.com>; Fri, 9 Nov 2012 10:55:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.598
X-Spam-Level:
X-Spam-Status: No, score=-4.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mmlq70sKZABz for <jose@ietfa.amsl.com>; Fri, 9 Nov 2012 10:55:46 -0800 (PST)
Received: from bay0-omc4-s9.bay0.hotmail.com (bay0-omc4-s9.bay0.hotmail.com [65.54.190.211]) by ietfa.amsl.com (Postfix) with ESMTP id 3CA8321F8445 for <jose@ietf.org>; Fri, 9 Nov 2012 10:55:46 -0800 (PST)
Received: from BAY171-W106 ([65.54.190.200]) by bay0-omc4-s9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 9 Nov 2012 10:55:45 -0800
Message-ID: <BAY171-W106A1E3AB91F00EDF3A267EB7680@phx.gbl>
Content-Type: multipart/alternative; boundary="_0cad2995-e29e-49af-9ff1-3769a7f3d1a0_"
X-Originating-IP: [107.17.123.153]
From: Michael Jones <michael_b_jones@hotmail.com>
To: ignisvulpis@gmail.com
Date: Fri, 09 Nov 2012 10:55:45 -0800
Importance: Normal
In-Reply-To: <CAHcDwFyY+onxMKuz+e=K9kg5WTjo4QkL8n1sekFfa5aHwJioVA@mail.gmail.com>
References: <BAY171-W32DD53461B3DF4235F053DB7680@phx.gbl>, <CAHcDwFyY+onxMKuz+e=K9kg5WTjo4QkL8n1sekFfa5aHwJioVA@mail.gmail.com>
MIME-Version: 1.0
X-OriginalArrivalTime: 09 Nov 2012 18:55:45.0850 (UTC) FILETIME=[D35EC1A0:01CDBEAB]
Cc: jose@ietf.org
Subject: Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Nov 2012 18:55:47 -0000
So it sounds to me like you're in favor of (2) Continue to use a KDF to generate the CEK and CIK from a shorter CMK. --Mike Date: Fri, 9 Nov 2012 19:48:32 +0100 From: ignisvulpis@gmail.com To: michael_b_jones@hotmail.com CC: jose@ietf.org Subject: Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key My suggestion did not change the CMK size. I think it can stay as is. I think that the concat-kdf is hard to implement in Firefox/NSS in Javascript if more than one iteration is needed. For the examples in the spec there is no iteration and so there is no problem. There is a problem when NIST compliance is really required because CEK and CIK should be computed in one go. I could live with a NIST-like concat-KDF. I think openid connect even does not need the optional sender/receiver-ids. Most important is the randomness of the CMK. I don't understand the choices you provided. I think the CMK can stay a defined. // cmk size matters. more bytes give better cik and cek. // cmk size does not change encodedEncryptedKeySegment if alg = RSA1_5 or RSA-OAEP cmk = generateRandomKey(size, enc); // cik and cek have as many bytes as required by enc (cik,cek) = some-kdf(cmk, otherInfoInput); Axel 2012/11/9 Michael Jones <michael_b_jones@hotmail.com> Some working group members, including Axel, James, Matt, and Richard have expressed dissatisfaction with the use of the Concat KDF to generate the CEK and CIK when AES CBC is the block encryption algorithm. Reasons stated are implementation complexity and possible issues with following the letter of the law of the NIST spec. Axel and Richard had both written suggesting an alternative – let the CMK be simply the concatenation of the CEK and the CIK values. This is the same approach used in draft-mcgrew-aead-aes-cbc-hmac-sha2. I and others had argued against this for size reasons. For A128CBC+HS256 this would increase the CMK size from 256 bits to 384 bits and for A256CBC+HS512 this would increase the CMK size from 512 bits to 768 bits. In the first case, after base64url encoding, one would expect the extra 128 bits to require about an extra 21 bytes in the JWE. The interesting fact though, is that when an RSA algorithm is used to encrypt the CMK, the output size is same as the RSA key size – in our case, a minimum of 2048 bits. Thus, for any combination of “alg”:”RSA1_5” or “RSA-OAEP” and “enc”:”A128CBC+HS256” or “A256CBC+HS512” there is no actual size difference in the JWE. (However when “alg”:”A128KW” or “A256KW” are used, there would be a size increase of about 21 or 43 bytes, respectively.) So I’d like to explicitly ask the working group. Do you want us to: (1) Use the concatenation of random CEK and CIK values as the CMK for AES CBC, resulting in a longer CMK? (2) Continue to use a KDF to generate the CEK and CIK from a shorter CMK? Thanks all, -- Mike P.S. A KDF will still be required for ECDH-ES key agreement. I’ll address James’ concerns about our use of Concat in a separate note. _______________________________________________ jose mailing list jose@ietf.org https://www.ietf.org/mailman/listinfo/jose _______________________________________________ jose mailing list jose@ietf.org https://www.ietf.org/mailman/listinfo/jose
- [jose] Choice for WG: Use a KDF with AES CBC or u… Michael Jones
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Axel Nennker
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Michael Jones
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Manger, James H
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Manger, James H
- Re: [jose] Choice for WG: Use a KDF with AES CBC … John Bradley
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Manger, James H
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Michael Jones
- Re: [jose] Choice for WG: Use a KDF with AES CBC … John Bradley
- Re: [jose] Choice for WG: Use a KDF with AES CBC … John Bradley
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Michael Jones
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Stephen Farrell
- [jose] Choice for WG: Use a KDF with AES CBC or u… David McGrew (mcgrew)
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Michael Jones
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Richard L. Barnes
- Re: [jose] Choice for WG: Use a KDF with AES CBC … Mike Jones