On Wed, 2013-05-29 at 16:34 -0700, Jim Schaad wrote:
> <chair>
> 

> Method #1
> 
> Key Agreement Secret --(KDF)--> Key Encryption Key --(Key Wrap)--> Content
> Encryption Key
> 
> Method #2
> 
> Key Agreement Secret --(KDF)--> Content Encryption Key.
> 
> [...] question:
> 
> I have a use case where doing Method #2 is the correct method or a much
> better method.  If this is a true statement, please provide the use case to
> use.  

I think I have a use case where method #2 is better. I'm working on
processing JWE objects on constrained devices and transferring them over
low capacity networks. If my understanding of method #2 is correct, it
would leave the JWE Encrypted Key empty, thus reducing the size of the
JWE message.
I therefore think method #2 is preferable for this use case, since it
saves both bandwidth and RAM on the constrained device.

Regards,

Ludwig Seitz


-- 
Ludwig Seitz, PhD
SICS Swedish ICT AB
Ideon Science Park
Building Beta 2 
Scheelevägen 17 
SE-223 70 Lund

Phone +46(0)70-349 92 51
http://www.sics.se

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to