On Mon, Jul 07, 2025 at 12:44:47PM +0530, tirumal reddy wrote:
> On Fri, 4 Jul 2025 at 21:13, Ilari Liusvaara <ilariliusva...@welho.com>
> wrote:
> 
> Got it, "OKP" won't work either, since RFC8037 mandates that "crv" must
> come from the "JSON Web Elliptic Curve" registry. Since ML-KEM is not an
> elliptic curve, it seems defining a new "kty" is necessary.

RFC8037 explicitly allows things that are not elliptic curves — and
technically neither x25519 nor x448 is an elliptic curve. Then COSE
explicitly inherits that.

OKP was designed to support stuff other than elliptic curves from the
very beginning — There even was early version that had different name
for what is now "crv".


(It might be useful to fix the fixable — pretty much all except the
"crv" name in JOSE — issues with OKP.)


> > JOSE/COSE HPKE has absolutely nothing to do with how key agreement
> > works in JOSE/COSE. There is no "similar", only is or is not.
> >
> > And COSE-HPKE does explicitly use protected via the structures passed as
> > HPKE aad.
> >
> > Then RFC 9052 explicitly requires protected in context info for Key
> > Agreement with Key Wrap, and impiles that protected is required for
> > Direct Key Agreement.
> >
> > Then Direct Key Agreement is a privileged mode in both JOSE and COSE
> > with properties no other mode can have. Thus using KEM for deriving
> > CEK has to be Direct Key Agreement, it can not be anything else.
> >
> > Key Agreement with Key Wrapping is also privileged mode in JOSE.
> > However, Key Agreement with Key Wrap is not privileged in COSE, but
> > what KEM followed by Key Wrap does fits perfectly in that mode.
> >
> 
> Thanks for the clarification. What would be the security justification for
> excluding PartyUInfo and PartyVInfo in both COSE and JOSE ?

Lack of sender keys — building authenticated post-quantum KEM is an
open problem — renders PartyUInfo/PartyVInfo moot:

- Sender/receiver symmetry inherently can not exist.
- The ephemeral key inherently provides per-kex entropy.
- There is nothing to prevent attacker from putting whatever that causes
  the most damage into PartyUInfo/PartyVInfo.

These do apply to ECDH-ES as well — I think the reason why JOSE has
PartyUInfo/PartyVInfo at all is that it copied the NIST spec without
thinking why the stuff is there.

COSE has ECDH-SS, which has sender keys, and thus needs a
mechanism to break the symmetry and inject per-kex entropy —
PartyUInfo/PartyVInfo can be used for this purpose.




-Ilari

_______________________________________________
jose mailing list -- jose@ietf.org
To unsubscribe send an email to jose-le...@ietf.org

Reply via email to