diff --git a/draft-ietf-lamps-rfc4210bis.html b/draft-ietf-lamps-rfc4210bis.html index 6f41aac..e6f75d0 100644 --- a/draft-ietf-lamps-rfc4210bis.html +++ b/draft-ietf-lamps-rfc4210bis.html @@ -3517,33 +3517,45 @@
staticString MUST be "CMP-KEM".¶
-transactionID, senderNonce, and recipNonce MUST be the values from the message containing the ciphertext ct in KemCiphertextInfo, if present.¶
+transactionID MUST be the values from the message containing the ciphertext ct in KemCiphertextInfo, if present.¶-len MUST be the value from KemBMParameter.¶
--mac MUST be the MAC algorithm identifier used for MAC-based protection of the message and MUST be the value from KemBMParameter.¶
--ct MUST be the ciphertext from KemCiphertextInfo.¶
+For all PKI management operations with more than one exchange the transactionID MUST be set, see Section 5.1.1. This is the typical situation when KEM-based message protection is used. Figure 4 of Appendix E describes the exceptional case where only one message exchange may be sufficient. In this case, the transactionID SHOULD be used by Bob to ensure domain-separation between different PKI management operations.¶ -OKM is the output keying material of the KDF used for MAC-based message protection of length len and is called ssk in this document.¶
+ +[ToDo: The fields senderNonce, ReciepNonce, len, mac, and ct were removed from the KemOtherInfo sequence. The authors are waiting for experts reviews providing guidance if theses fields are necessary for the security of the KEM-bases message protection.¶
+Text from -V07¶
+~~~~ asn.1 + KemOtherInfo ::= SEQUENCE { + staticString PKIFreeText, + transactionID [0] OCTET STRING OPTIONAL, + senderNonce [1] OCTET STRING OPTIONAL, + recipNonce [2] OCTET STRING OPTIONAL, + len INTEGER (1..MAX), + mac AlgorithmIdentifier{MAC-ALGORITHM, {...}} + ct OCTET STRING + } + ~~~~¶
+staticString MUST be "CMP-KEM".¶
+transactionID, senderNonce, and recipNonce MUST be the values from the message containing the ciphertext ct in KemCiphertextInfo, if present.¶
+len MUST be the value from KemBMParameter.¶
+mac MUST be the MAC algorithm identifier used for MAC-based protection of the message and MUST be the value from KemBMParameter.¶
+ct MUST be the ciphertext from KemCiphertextInfo.¶
+End of ToDo]¶
+OKM is the output keying material of the KDF used for MAC-based message protection of length len and is called ssk in this document.¶
There are various ways how Alice can request and Bob can provide the KEM ciphertext, see Appendix E for details. The KemCiphertextInfo can be requested using a genm message with an InfoTypeAndValue structure of type id-it-KemCiphertextInfo where the value is absent and can be provided in the following genp message with an InfoTypeAndValue structure of the same type. +
There are various ways how Alice can request and Bob can provide the KEM ciphertext, see Appendix E for details. The KemCiphertextInfo can be requested using a genm message with an InfoTypeAndValue structure of type id-it-KemCiphertextInfo where the value is absent and can be provided in the following genp message with an InfoTypeAndValue structure of the same type. Alternatively, the generalInfo field of the header of a PKIMessage can be used to request and provide a KemCiphertextInfo structure, also using an InfoTypeAndValue structure of type id-it-KemCiphertextInfo in each direction. -The procedure works also without Alice explicitly requesting the KEM ciphertext, in case that Bob knows beforehand a KEM key of Alice and can expect that she is ready to use it.¶
-If both the initiator and responder in a PKI management operation have KEM key pairs, this procedure can be applied by both entities independently, establishing and using different shared secret keys on either side.¶
+The procedure works also without Alice explicitly requesting the KEM ciphertext, in case that Bob knows beforehand a KEM key of Alice and can expect that she is ready to use it.¶ +If both the initiator and responder in a PKI management operation have KEM key pairs, this procedure can be applied by both entities independently, establishing and using different shared secret keys on either side.¶
Message Flow when the PKI entity does not know that the PKI management entity uses a KEM key pair:¶
+Note: Figure 4 describes the situation where KEM-based messages protection may not require more that one message exchange. In this case, the transactionID SHOULD be used by the PKI entity to ensure domain-separation between different PKI management operations.¶
+Message Flow when the PKI entity does not know that the PKI management entity uses a KEM key pair:¶