Re: [jose] #14: Support longer wrapped keys than OAEP allows

"Manger, James H" <James.H.Manger@team.telstra.com> Tue, 19 March 2013 00:16 UTC

Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09C7921F85EE for <jose@ietfa.amsl.com>; Mon, 18 Mar 2013 17:16:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.901
X-Spam-Level:
X-Spam-Status: No, score=-0.901 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FT2B1RInD-F3 for <jose@ietfa.amsl.com>; Mon, 18 Mar 2013 17:16:58 -0700 (PDT)
Received: from ipxavo.tcif.telstra.com.au (ipxavo.tcif.telstra.com.au [203.35.135.200]) by ietfa.amsl.com (Postfix) with ESMTP id 2877621F85EB for <jose@ietf.org>; Mon, 18 Mar 2013 17:16:57 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.84,868,1355058000"; d="scan'208";a="123974600"
Received: from unknown (HELO ipccvi.tcif.telstra.com.au) ([10.97.217.208]) by ipoavi.tcif.telstra.com.au with ESMTP; 19 Mar 2013 11:16:44 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,7018"; a="119708181"
Received: from wsmsg3757.srv.dir.telstra.com ([172.49.40.85]) by ipccvi.tcif.telstra.com.au with ESMTP; 19 Mar 2013 11:16:44 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3757.srv.dir.telstra.com ([172.49.40.85]) with mapi; Tue, 19 Mar 2013 11:16:43 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "rlb@ipv.sx" <rlb@ipv.sx>, "jose@ietf.org" <jose@ietf.org>
Date: Tue, 19 Mar 2013 11:16:42 +1100
Thread-Topic: [jose] #14: Support longer wrapped keys than OAEP allows
Thread-Index: Ac4kL5uMQGd5kYeuRj6XiWhLNdMq4gABCvjA
Message-ID: <255B9BB34FB7D647A506DC292726F6E1150BAAC4D8@WSMSG3153V.srv.dir.telstra.com>
References: <049.a881241698112408b4f26b7cfb4b9103@trac.tools.ietf.org>
In-Reply-To: <049.a881241698112408b4f26b7cfb4b9103@trac.tools.ietf.org>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [jose] #14: Support longer wrapped keys than OAEP allows
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2013 00:16:59 -0000

Richard,

How do you get a 788-bit key length?

draft-mcgrew-aead-aes-cbc-hmac-sha2 defines 5 combinations of AES-128/192/256 and SHA-1/256/384/512. The total key lengths range from 256 bits to 512 bits.

Keys for two of the algorithms (AEAD_AES_128_CBC_HMAC_SHA_256 and AEAD_AES_128_CBC_HMAC_SHA1) fit within OAEP with a 1024-bit RSA key.

Keys for all of the algorithms fit within OAEP with a 2048-bit RSA key. JWA already says RSA key sizes MUST be at least 2048 bits.

This already looks sufficient.
 
--
James Manger


> From: jose-bounces@ietf.org [mailto:jose-bounces@ietf.org] On Behalf Of Richard Barnes
> Sent: Tuesday, 19 March 2013 10:25 AM
> Subject: [jose] WebCrypto feedback on key wrapping
>
> 2. Mark Watson (Netflix) noted that if we use RSA directly to encrypt wrapped key objects, then we would need something other than OAEP in order to carry arbitrary-length payloads.  I agreed, and suggested that something like RSA-KEM would be necessary.  Ryan Sleevi (Google) and Vijay observed that KEM is troublesome due to the lack of support by native crypto libraries.
>
> Point number 2 likely applies for some scenarios of JWE, especially if we adopt the McGrew approach.  For example, if using HMAC-SHA1 and AES with a 256-bit key, the total key length is 788 bits, which is too long to be encrypted with OAEP under a 1,024-bit RSA key.  I'm not sure how to resolve it.  The best idea I've got is to allow wrapped keys to nest, so that you can wrap a key inside of another wrapped key.
>
> --Richard


>> ----------
>> Sent: Tuesday, 19 March 2013 10:23 AM
>> Subject: [jose] #14: Support longer wrapped keys than OAEP allows
>> 
>> #14: Support longer wrapped keys than OAEP allows
>> 
>>  The use of RSA-OAEP for key wrapping imposes a limit on the length of
>>  the key package being wrapped. With SHA1, this length is N-320, where
>>  N is the length of the RSA modulus.  Especially with larger hash
>>  functions, and especially for wrapping private keys, the size of key
>>  packages will be larger than this bound.  We should incorporate a
>>  mechanism to accommodate these situations.
>> 
>> 
>> Ticket URL: <http://trac.tools.ietf.org/wg/jose/trac/ticket/14>