I think a draft regestring KMAC and HopMAC [1] would be useful. In addition to 
TurboSHAKE, I see that also KangarooTwelve (KT128 and KT256) has been 
registered, which is great. I welcome more Keccak and permutation-based 
cryptography (Ascon is another example). Makes a lot of things easier. Not just 
APIs but also side-channel protection.

SHAKE128 is around twice as efficient as SHA3-256 and TurboSHAKE128 is twice as 
efficient as SHAKE128. In addition TubroSHAKE is parallizable.

cSHAKE is defined as a call to SHAKE and KMAC is defined as a call to cSHAKE
KT is defined as a call to TurboSHAKE and HopMAC is defined as a call to KT

https://datatracker.ietf.org/doc/draft-irtf-cfrg-kangarootwelve/
https://crypto.stackexchange.com/questions/95722/is-kmac-just-sha-3-256key-message

John

From: Sipos, Brian J. <brian.si...@jhuapl.edu>
Date: Thursday, 26 June 2025 at 14:31
To: Leonard Rosenthol <lrosenth=40adobe....@dmarc.ietf.org>, cose@ietf.org 
<cose@ietf.org>
Subject: [COSE] Re: Why is SHA-3 not supported in COSE?
Leonard,
I see that the purely hash algorithm family SHAKE is defined in RFC 9054 [1], 
are these what you are looking for?

I had also started, but effectively abandoned, a small draft to add KMAC to 
COSE and JOSE [2] which is a SHA-3 derived MAC algorithm family. If this is 
something you are interested in, and there is WG support, the draft of just 
KMAC could be revived.

Brian S.

[1] https://datatracker.ietf.org/doc/html/rfc9054#section-3.3
[2] https://datatracker.ietf.org/doc/draft-sipos-cose-gmac-kmac/

From: Leonard Rosenthol <lrosenth=40adobe....@dmarc.ietf.org>
Sent: Wednesday, June 25, 2025 6:07 PM
To: cose@ietf.org
Subject: [EXT] [COSE] Why is SHA-3 not supported in COSE?

APL external email warning: Verify sender 
forwardingalgori...@ietf.org<mailto:forwardingalgori...@ietf.org> before 
clicking links or attachments


Checking the current state of the COSE Algorithm Registry 
(https://www.iana.org/assignments/cose/cose.xhtml#algorithms) shows that it is 
not there.

Is there a technical reason for this?  Lack of interest by implementors?  Other?

I ask because we are getting requests to add it to the C2PA specification, but 
as we note in our spec 
(https://c2pa.org/specifications/specifications/2.2/specs/C2PA_Specification.html#_hashing)
 since the SHA-3 algorithms aren’t on the list, we don’t support it.

Thanks in advance for the info.

Leonard

_______________________________________________
COSE mailing list -- cose@ietf.org
To unsubscribe send an email to cose-le...@ietf.org

Reply via email to