Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key

Michael Jones <michael_b_jones@hotmail.com> Fri, 09 November 2012 18:55 UTC

Return-Path: <michael_b_jones@hotmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 057E621F8447 for <jose@ietfa.amsl.com>; Fri, 9 Nov 2012 10:55:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.598
X-Spam-Level:
X-Spam-Status: No, score=-4.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mmlq70sKZABz for <jose@ietfa.amsl.com>; Fri, 9 Nov 2012 10:55:46 -0800 (PST)
Received: from bay0-omc4-s9.bay0.hotmail.com (bay0-omc4-s9.bay0.hotmail.com [65.54.190.211]) by ietfa.amsl.com (Postfix) with ESMTP id 3CA8321F8445 for <jose@ietf.org>; Fri, 9 Nov 2012 10:55:46 -0800 (PST)
Received: from BAY171-W106 ([65.54.190.200]) by bay0-omc4-s9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 9 Nov 2012 10:55:45 -0800
Message-ID: <BAY171-W106A1E3AB91F00EDF3A267EB7680@phx.gbl>
Content-Type: multipart/alternative; boundary="_0cad2995-e29e-49af-9ff1-3769a7f3d1a0_"
X-Originating-IP: [107.17.123.153]
From: Michael Jones <michael_b_jones@hotmail.com>
To: ignisvulpis@gmail.com
Date: Fri, 09 Nov 2012 10:55:45 -0800
Importance: Normal
In-Reply-To: <CAHcDwFyY+onxMKuz+e=K9kg5WTjo4QkL8n1sekFfa5aHwJioVA@mail.gmail.com>
References: <BAY171-W32DD53461B3DF4235F053DB7680@phx.gbl>, <CAHcDwFyY+onxMKuz+e=K9kg5WTjo4QkL8n1sekFfa5aHwJioVA@mail.gmail.com>
MIME-Version: 1.0
X-OriginalArrivalTime: 09 Nov 2012 18:55:45.0850 (UTC) FILETIME=[D35EC1A0:01CDBEAB]
Cc: jose@ietf.org
Subject: Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Nov 2012 18:55:47 -0000

So it sounds to me like you're in favor of (2) Continue to use a KDF to generate the CEK and CIK from a shorter CMK.                                                             --Mike
 Date: Fri, 9 Nov 2012 19:48:32 +0100
From: ignisvulpis@gmail.com
To: michael_b_jones@hotmail.com
CC: jose@ietf.org
Subject: Re: [jose] Choice for WG: Use a KDF with AES CBC or use a longer key

My suggestion did not change the CMK size. I think it can stay as is.
I think that the concat-kdf is hard to  implement in Firefox/NSS in Javascript if more than one iteration is needed. For the examples in the spec there is no iteration and so there  is no problem.

There is a problem when NIST compliance is really required because CEK and CIK should be computed in one go.
I could live with a NIST-like concat-KDF. I think openid connect even does not need the  optional sender/receiver-ids.

Most important is the randomness of the CMK.

I don't understand the choices you provided. I think the CMK can stay a defined.

// cmk size matters. more bytes give better cik and cek. 
// cmk size does not change encodedEncryptedKeySegment if alg = RSA1_5 or RSA-OAEP

cmk = generateRandomKey(size, enc); 
 // cik and cek have as many bytes as required by enc
(cik,cek) = some-kdf(cmk, otherInfoInput);

Axel



2012/11/9 Michael Jones <michael_b_jones@hotmail.com>










Some working group members, including Axel, James, Matt, and
Richard have expressed dissatisfaction with the use of the Concat KDF to
generate the CEK and CIK when AES CBC is the block encryption algorithm.  Reasons stated are implementation complexity
and possible issues with following the letter of the law of the NIST spec.  Axel and Richard had both written suggesting an
alternative – let the CMK be simply the concatenation of the CEK and the CIK
values.  This is the same approach used
in draft-mcgrew-aead-aes-cbc-hmac-sha2.

 

I and others had argued against this for size
reasons.  For A128CBC+HS256 this would
increase the CMK size from 256 bits to 384 bits and for A256CBC+HS512 this
would increase the CMK size from 512 bits to 768 bits.  In the first case, after base64url encoding, one
would expect the extra 128 bits to require about an extra 21 bytes in the JWE.  The interesting fact though, is that when an
RSA algorithm is used to encrypt the CMK, the output size is same as the RSA key
size – in our case, a minimum of 2048 bits. 
Thus, for any combination of “alg”:”RSA1_5” or “RSA-OAEP” and “enc”:”A128CBC+HS256”
or “A256CBC+HS512” there is no actual
size difference in the JWE.  (However
when “alg”:”A128KW” or “A256KW” are used, there would be a size increase of
about 21 or 43 bytes, respectively.)

 

So I’d like to explicitly ask the working group.  Do you want us to:

 

(1) Use the concatenation of random CEK and CIK values as
the CMK for AES CBC, resulting in a longer CMK?

(2) Continue to use a KDF to generate the CEK and CIK
from a shorter CMK?

 

                                                            Thanks all,

                                                            --
Mike

 

P.S.  A KDF will
still be required for ECDH-ES key agreement. 
I’ll address James’ concerns about our use of Concat in a separate note.

 		 	   		  

_______________________________________________

jose mailing list

jose@ietf.org

https://www.ietf.org/mailman/listinfo/jose





_______________________________________________
jose mailing list
jose@ietf.org
https://www.ietf.org/mailman/listinfo/jose