Hello Hybrid Public Key Encryption Enthusiasts, I updated hpke.dev to support the latest compact serialization JWE format from:
https://datatracker.ietf.org/doc/html/draft-rha-jose-hpke-encrypt#name-integrated-encryption Here is a JWE (note the empty periods for integrated encryption mode). https://hpke.dev/decrypt#jwe:eyJhbGciOiJIUEtFLUJhc2UtUDI1Ni1TSEEyNTYtQUVTMTI4R0NNIiwiZXBrIjp7Imt0eSI6IkVLIiwiZWsiOiJCRkRZdHIxMVdCQlg4RUlaUk5KbXhwR1Y1cFF4MGowNm5xcTJqbnJHU1JpRFBGODF5QlVZWUl5MVBjWUZmUk12ZV9qSXo3bXE4czZhMnA3ZkRGazN3cW8ifX0...5c5PYUlc8E_Gm2F7PyCrkSnj8Wb7Th5xit09iw4Nt0YskV6Z6QTcpb1cmfIufDfmhi8fzCPNMT5t6l8pHDuxR3DknJaCRSAEGx-YP5g1cFQ0i6Dq_nxt8X0_zV9e76cV5ysypgI. I have attached a private key in JWK format (obviously don't use this for anything other than decrypting the example message above). If there are any other HPKE JWE implementations out there, I would very much like to confirm interoperability against the latest draft. I feel JOSE HPKE is getting very close to stable, we have demonstrated compact and json serialization, including key encryption with both HPKE and normal ECDH-ES. Before we generate an extensive list of test vectors for all the algorithms, it would be nice to get some confirmations on interoperability for the two modes we have currently tested. Regards, OS -- ORIE STEELE Chief Technology Officer www.transmute.industries <https://transmute.industries>
Ik5NSeVzMIoEZRGlaacmZKqtlKwi9RiW-og4xFO60oo.json
Description: application/json
_______________________________________________ jose mailing list [email protected] https://www.ietf.org/mailman/listinfo/jose
