> On Mar 11, 2022, at 11:11 AM, Ilari Liusvaara <[email protected]> 
> wrote:
> 
> On Fri, Mar 11, 2022 at 05:23:48AM +0100, Anders Rundgren wrote:
>> Before deciding to overload "OKP" for a new crypto system, I would discuss 
>> the matter with maintainers of cryptographic libraries and APIs.
>> 
>> In the Java platform overloading the native counterparts to OKP keys
>> [1,2] won't happen because that would break a lot.  I guess the same
>> is valid for OpenSSL.
> 
> The way it is supposed to work is to use the raw key parts as key
> material in underlying cryptographic implementation. Implementations
> where that is not possible are just broken.
> 
>> It seems to me that reusing OKP would rather create an artificial
>> "semantic gap" which doesn't exist today where "kty" indeed is
>> synonymous with key type/family (RSA, EC, Ed etc):
>> https://datatracker.ietf.org/doc/html/rfc7517#section-4.1
> 
> There are already two "subtypes" of OKP keys that are not
> interchangeable:
> 
> - Key agreement keys.
> - Signature keys.
> 
> NISTPQC signatures would fit into signature keys "subtype", but NISTPQC
> KEMs will not fit into the key agreement keys "subtype", so that would
> be a third "subtype" (all NISTPQC algorithms have OKP-style key format,
> as this was required by NIST).

Right.  It makes sense to add support for KEM.  We can figure that out without 
waiting for NIST to announce Round 3 winners.  We can do the work based on RFC 
5990.

Russ

_______________________________________________
COSE mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cose

Reply via email to