<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY I-D.ietf-core-echo-request-tag SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-echo-request-tag.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5116 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
<!ENTITY RFC5869 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
<!ENTITY RFC6090 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6090.xml">
<!ENTITY RFC6979 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6979.xml">
<!ENTITY RFC7252 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
<!ENTITY RFC7748 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7748.xml">
<!ENTITY RFC7049 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7049.xml">
<!ENTITY RFC7959 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7959.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8613 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8613.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY I-D.hartke-core-e2e-security-reqs SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.hartke-core-e2e-security-reqs.xml">
<!ENTITY I-D.ietf-6tisch-dtsecurity-zerotouch-join SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-6tisch-dtsecurity-zerotouch-join.xml">
<!ENTITY I-D.ietf-ace-oauth-authz SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oauth-authz.xml">
<!ENTITY I-D.ietf-ace-oscore-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oscore-profile.xml">
<!ENTITY I-D.ietf-core-resource-directory SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-resource-directory.xml">
<!ENTITY I-D.ietf-lwig-security-protocol-comparison SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lwig-security-protocol-comparison.xml">
<!ENTITY I-D.ietf-tls-dtls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml">
<!ENTITY I-D.selander-ace-ake-authz SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.selander-ace-ake-authz.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7258 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC7296 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-lake-edhoc-00" category="std">

  <front>
    <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>

    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>

    <date year="2020" month="July" day="06"/>

    
    
    

    <abstract>


<t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact, and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys.  EDHOC provides mutual authentication, perfect forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code footprint can be kept very low.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Security at the application layer provides an attractive option for protecting Internet of Things (IoT) deployments, for example where transport layer security is not sufficient <xref target="I-D.hartke-core-e2e-security-reqs"/> or where the protection needs to work over a variety of underlying protocols. IoT devices may be constrained in various ways, including memory, storage, processing capacity, and energy <xref target="RFC7228"/>. A method for protecting individual messages at the application layer suitable for constrained devices, is provided by CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/>), which builds on the Concise Binary Object Representation (CBOR) <xref target="RFC7049"/>. Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> is a method for application-layer protection of the Constrained Application Protocol (CoAP), using COSE.</t>

<t>In order for a communication session to provide forward secrecy, the communicating parties can run an Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol with ephemeral keys, from which shared key material can be derived. This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a lightweight key exchange protocol providing perfect forward secrecy and identity protection. Authentication is based on credentials established out of band, e.g. from a trusted third party, such as an Authorization Server as specified by <xref target="I-D.ietf-ace-oauth-authz"/>. EDHOC supports authentication using pre-shared keys (PSK), raw public keys (RPK), and public key certificates. After successful completion of the EDHOC protocol, application keys and other application specific data can be derived using the EDHOC-Exporter interface. A main use case for EDHOC is to establish an OSCORE security context. EDHOC uses COSE for cryptography, CBOR for encoding, and CoAP for transport. By reusing existing libraries, the additional code footprint can be kept very low. Note that this document focuses on authentication and key establishment: for integration with authorization of resource access, refer to <xref target="I-D.ietf-ace-oscore-profile"/>.</t>

<t>EDHOC is designed to work in highly constrained scenarios making it especially suitable for network technologies such as Cellular IoT, 6TiSCH <xref target="I-D.ietf-6tisch-dtsecurity-zerotouch-join"/>, and LoRaWAN <xref target="LoRa1"/><xref target="LoRa2"/>. These network technologies are characterized by their low throughput, low power consumption, and small frame sizes. Compared to the DTLS 1.3 handshake <xref target="I-D.ietf-tls-dtls13"/> with ECDH and connection ID, the number of bytes in EDHOC + CoAP is less than 1/4 when PSK authentication is used and less than 1/6 when RPK authentication is used, see <xref target="I-D.ietf-lwig-security-protocol-comparison"/>. Typical message sizes for EDHOC with pre-shared keys, raw public keys with static Diffie-Hellman keys, and two different ways to identify X.509 certificates with signature keys are shown in <xref target="fig-sizes"/>. Further reductions of message sizes are possible by eliding redundant length indications.</t>

<figure title="Typical message sizes in bytes" anchor="fig-sizes"><artwork align="center"><![CDATA[
=====================================================================
               PSK       RPK       x5t     x5chain                  
---------------------------------------------------------------------
message_1       38        37        37        37                     
message_2       44        46       117       110 + Certificate
message_3       10        20        91        84 + Certificate
---------------------------------------------------------------------
Total           92       103       245       231 + Certificates
=====================================================================
]]></artwork></figure>

<t>The ECDH exchange and the key derivation follow known protocol constructions such as <xref target="SIGMA"/>, NIST SP-800-56A <xref target="SP-800-56A"/>, and HKDF <xref target="RFC5869"/>. CBOR <xref target="RFC7049"/> and COSE <xref target="RFC8152"/> are used to implement these standards. The use of COSE provides crypto agility and enables use of future algorithms and headers designed for constrained IoT.</t>

<t>This document is organized as follows: <xref target="background"/> describes how EDHOC authenticated with digital signatures builds on SIGMA-I, <xref target="overview"/> specifies general properties of EDHOC, including message flow, formatting of the ephemeral public keys, and key derivation, <xref target="asym"/> specifies EDHOC with signature key and static Diffie-Hellman key authentication, <xref target="sym"/> specifies EDHOC with symmetric key authentication, <xref target="error"/> specifies the EDHOC error message, and <xref target="transfer"/> describes how EDHOC can be transferred in CoAP and used to establish an OSCORE security context.</t>

<section anchor="rationale-for-edhoc" title="Rationale for EDHOC">

<t>Many constrained IoT systems today do not use any security at all, and when they do, they often do not follow best practices. One reason is that many current security protocols are not designed with constrained IoT in mind. Constrained IoT systems often deal with personal information, valuable business data, and actuators interacting with the physical world. Not only do such systems need security and privacy, they often need end-to-end protection with source authentication and perfect forward secrecy. EDHOC and OSCORE <xref target="RFC8613"/> enables security following current best practices to devices and systems where current security protocols are impractical.</t>

<t>EDHOC is optimized for small message sizes and can therefore be sent over a small number of radio frames. The message size of a key exchange protocol may have a large impact on the performance of an IoT deployment, especially in constrained environments. For example, in a network bootstrapping setting a large number of devices turned on in a short period of time may result in large latencies caused by parallel key exchanges. Requirements on network formation time in constrained environments can be translated into key exchange overhead. In network technologies with duty cycle, each additional frame significantly increases the latency even if no other devices are transmitting.</t>

<t>Power consumption for wireless devices is highly dependent on message transmission, listening, and reception. For devices that only send a few bytes occasionally, the battery lifetime may be impacted by a heavy key exchange protocol. A key exchange may need to be executed more than once, e.g. due to a device rebooting or for security reasons such as perfect forward secrecy.</t>

<t>EDHOC is adapted to primitives and protocols designed for the Internet of Things: EDHOC is built on CBOR and COSE which enables small message overhead and efficient parsing in constrained devices. EDHOC is not bound to a particular transport layer, but it is recommended to transport the EDHOC message in CoAP payloads. EDHOC is not bound to a particular communication security protocol but works off-the-shelf with OSCORE <xref target="RFC8613"/> providing the necessary input parameters with required properties. Maximum code complexity (ROM/Flash) is often a constraint in many devices and by reusing already existing libraries, the additional code footprint for EDHOC + OSCORE can be kept very low.</t>

</section>
<section anchor="terminology-and-requirements-language" title="Terminology and Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>Readers are expected to be familiar with the terms and concepts described in CBOR <xref target="RFC7049"/>, CBOR Sequences <xref target="RFC8742"/>, COSE <xref target="RFC8152"/>, and CDDL <xref target="RFC8610"/>. The Concise Data Definition Language (CDDL) is used to express CBOR data structures <xref target="RFC7049"/>. Examples of CBOR and CDDL are provided in <xref target="CBOR"/>.</t>

</section>
</section>
<section anchor="background" title="Background">

<t>EDHOC specifies different authentication methods of the Diffie-Hellman key exchange: digital signatures, static Diffie-Hellman keys and symmetric keys. This section outlines the digital signature based method.</t>

<t>SIGMA (SIGn-and-MAc) is a family of theoretical protocols with a large number of variants <xref target="SIGMA"/>. Like IKEv2 <xref target="RFC7296"/> and (D)TLS 1.3 <xref target="RFC8446"/>, EDHOC authenticated with digital signatures is built on a variant of the SIGMA protocol which provide identity protection of the initiator (SIGMA-I), and like IKEv2 <xref target="RFC7296"/>, EDHOC implements the SIGMA-I variant as Mac-then-Sign. The SIGMA-I protocol using an authenticated encryption algorithm is shown in <xref target="fig-sigma"/>.</t>

<figure title="Authenticated encryption variant of the SIGMA-I protocol." anchor="fig-sigma"><artwork align="center"><![CDATA[
Initiator                                               Responder
   |                          G_X                            |
   +-------------------------------------------------------->|
   |                                                         |
   |  G_Y, AEAD( K_2; ID_CRED_R, Sig(R; CRED_R, G_X, G_Y) )  |
   |<--------------------------------------------------------+
   |                                                         |
   |     AEAD( K_3; ID_CRED_I, Sig(I; CRED_I, G_Y, G_X) )    |
   +-------------------------------------------------------->|
   |                                                         |
]]></artwork></figure>

<t>The parties exchanging messages are called Initiator (I) and Responder (R). They exchange ephemeral public keys, compute the shared secret, and derive symmetric application keys.</t>

<t><list style="symbols">
  <t>G_X and G_Y are the ECDH ephemeral public keys of I and R, respectively.</t>
  <t>CRED_I and CRED_R are the credentials containing the public authentication keys of I and R, respectively.</t>
  <t>ID_CRED_I and ID_CRED_R are data enabling the recipient party to retrieve the credential of I and R, respectively.</t>
  <t>Sig(I; . ) and S(R; . ) denote signatures made with the private authentication key of I and R, respectively.</t>
  <t>AEAD(K; . ) denotes authenticated encryption with additional data using a key K derived from the shared secret.</t>
</list></t>

<t>In order to create a “full-fledged” protocol some additional protocol elements are needed. EDHOC adds:</t>

<t><list style="symbols">
  <t>Explicit connection identifiers C_I, C_R chosen by I and R, respectively, enabling the recipient to find the protocol state.</t>
  <t>Transcript hashes (hashes of message data) TH_2, TH_3, TH_4 used for key derivation and as additional authenticated data.</t>
  <t>Computationally independent keys derived from the ECDH shared secret and used for authenticated encryption of different messages.</t>
  <t>Verification of a common preferred cipher suite:  <list style="symbols">
      <t>The Initiator lists supported cipher suites in order of preference</t>
      <t>The Responder verifies that the selected cipher suite is the first supported cipher suite</t>
    </list></t>
  <t>Method types and error handling.</t>
  <t>Transport of opaque auxiliary data.</t>
</list></t>

<t>EDHOC is designed to encrypt and integrity protect as much information as possible, and all symmetric keys are derived using as much previous information as possible. EDHOC is furthermore designed to be as compact and lightweight as possible, in terms of message sizes, processing, and the ability to reuse already existing CBOR, COSE, and CoAP libraries.</t>

<t>To simplify for implementors, the use of CBOR in EDHOC is summarized in <xref target="CBORandCOSE"/> and test vectors including CBOR diagnostic notation are given in <xref target="vectors"/>.</t>

</section>
<section anchor="overview" title="EDHOC Overview">

<t>EDHOC consists of three messages (message_1, message_2, message_3) that maps directly to the three messages in SIGMA-I, plus an EDHOC error message. EDHOC messages are CBOR Sequences <xref target="RFC8742"/>, where the first data item (METHOD_CORR) of message_1 is an int specifying the method and the correlation properties of the transport used, see <xref target="transport"/>. The method specifies the authentication methods used (signature, static DH, symmetric), see <xref target="method-types"/>. An implementation may support only Initiator or Responder. An implementation may support only a single method. The Initiator and the Responder need to have agreed on a single method to be used for EDHOC.</t>

<t>While EDHOC uses the COSE_Key, COSE_Sign1, and COSE_Encrypt0 structures, only a subset of the parameters is included in the EDHOC messages. The unprotected COSE header in COSE_Sign1, and COSE_Encrypt0 (not included in the EDHOC message) MAY contain parameters (e.g. ‘alg’). After creating EDHOC message_3, the Initiator can derive symmetric application keys, and application protected data can therefore be sent in parallel with EDHOC message_3. The application may protect data using the algorithms (AEAD, hash, etc.) in the selected cipher suite  and the connection identifiers (C_I, C_R). EDHOC may be used with the media type application/edhoc defined in <xref target="iana"/>.</t>

<figure title="EDHOC message flow" anchor="fig-flow"><artwork align="center"><![CDATA[
Initiator                                             Responder
   |                                                       |
   | ------------------ EDHOC message_1 -----------------> |
   |                                                       |
   | <----------------- EDHOC message_2 ------------------ |
   |                                                       |
   | ------------------ EDHOC message_3 -----------------> |
   |                                                       |
   | <----------- Application Protected Data ------------> |
   |                                                       |
]]></artwork></figure>

<section anchor="transport" title="Transport and Message Correlation">

<t>Cryptographically, EDHOC does not put requirements on the lower layers. EDHOC is not bound to a particular transport layer, and can be used in environments without IP. The transport is responsible to handle message loss, reordering, message duplication, fragmentation, and denial of service protection, where necessary. The Initiator and the Responder need to have agreed on a transport to be used for EDHOC. It is recommended to transport EDHOC in CoAP payloads, see <xref target="transfer"/>.</t>

<t>EDHOC includes connection identifiers (C_I, C_R) to correlate messages. The connection identifiers C_I and C_R do not have any cryptographic purpose in EDHOC. They contain information facilitating retrieval of the protocol state and may therefore be very short. The connection identifier MAY be used with an application protocol (e.g. OSCORE) for which EDHOC establishes keys, in which case the connection identifiers SHALL adhere to the requirements for that protocol. Each party choses a connection identifier it desires the other party to use in outgoing messages.</t>

<t>If the transport provides a mechanism for correlating messages, some of the connection identifiers may be omitted. There are four cases:</t>

<t><list style="symbols">
  <t>corr = 0, the transport does not provide a correlation mechanism.</t>
  <t>corr = 1, the transport provides a correlation mechanism that enables the Responder to correlate message_2 and message_1.</t>
  <t>corr = 2, the transport provides a correlation mechanism that enables the Initiator to correlate message_3 and message_2.</t>
  <t>corr = 3, the transport provides a correlation mechanism that enables both parties to correlate all three messages.</t>
</list></t>

<t>For example, if the key exchange is transported over CoAP, the CoAP Token can be used to correlate messages, see <xref target="coap"/>.</t>

</section>
<section anchor="authentication-keys-and-identities" title="Authentication Keys and Identities">

<t>The EDHOC message exchange may be authenticated using pre-shared keys (PSK), raw public keys (RPK), or public key certificates. The certificates and RPKs can contain signature keys or static Diffie-Hellman keys. In X.509 certificates, signature keys typically have key usage “digitalSignature” and Diffie-Hellman keys typically have key usage “keyAgreement”.
 EDHOC assumes the existence of mechanisms (certification authority, trusted third party, manual distribution, etc.) for distributing authentication keys (public or pre-shared) and identities. Policies are set based on the identity of the other party, and parties typically only allow connections from a small restricted set of identities.</t>

<t><list style="symbols">
  <t>When a Public Key Infrastructure (PKI) is used, the trust anchor is a Certification Authority (CA) certificate, and the identity is the subject whose unique name (e.g. a domain name, NAI, or EUI) is included in the other party’s certificate. Before running EDHOC each party needs at least one CA public key certificate, or just the public key, and a set of identities it is allowed to communicate with. Any validated public-key certificate with an allowed subject name is accepted. EDHOC provides proof that the other party possesses the private authentication key corresponding to the public authentication key in its certificate. The certification path provides proof that the subject of the certificate owns the public key in the certificate.</t>
  <t>When public keys are used but not with a PKI (RPK, self-signed certificate), the trust anchor is the public authentication key of the other party. In this case, the identity is typically directly associated to the public authentication key of the other party. For example, the name of the subject may be a canonical representation of the public key. Alternatively, if identities can be expressed in the form of unique subject names assigned to public keys, then a binding to identity can be achieved by including both public key and associated subject name in the protocol message computation: CRED_I or CRED_R may be a self-signed certificate or COSE_Key containing the public authentication key and the subject name, see <xref target="fig-sigma"/>. Before running EDHOC, each party need a set of public authentication keys/unique associated subject names it is allowed to communicate with.  EDHOC provides proof that the other party possesses the private authentication key corresponding to the public authentication key.</t>
  <t>When pre-shared keys are used the information about the other party is carried in the PSK identifier field of the protocol, ID_PSK. The purpose of ID_PSK is to facilitate retrieval of the pre-shared key, which is used to authenticate and assert trust. In this case no other identities or trust anchors are used.</t>
</list></t>

</section>
<section anchor="identifiers" title="Identifiers">

<t>One byte connection and credential identifiers are realistic in many scenarios as most constrained devices only have a few keys and connections. In cases where a node only has one connection or key, the identifiers may even be the empty byte string.</t>

</section>
<section anchor="cs" title="Cipher Suites">

<t>EDHOC cipher suites consist of an ordered set of COSE algorithms: an EDHOC AEAD algorithm, an EDHOC hash algorithm, an EDHOC ECDH curve, an EDHOC signature algorithm, an EDHOC signature algorithm curve, an application AEAD algorithm, and an application hash algorithm from the COSE Algorithms and Elliptic Curves registries. Each cipher suite is identified with a pre-defined int label. This document specifies four pre-defined cipher suites.</t>

<figure><artwork><![CDATA[
   0. ( 10, -16, 4, -8, 6, 10, -16 )
      (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519,
       AES-CCM-16-64-128, SHA-256)

   1. ( 30, -16, 4, -8, 6, 10, -16 )
      (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519,
       AES-CCM-16-64-128, SHA-256)

   2. ( 10, -16, 1, -7, 1, 10, -16 )
      (AES-CCM-16-64-128, SHA-256, P-256, ES256, P-256,
       AES-CCM-16-64-128, SHA-256)

   3. ( 30, -16, 1, -7, 1, 10, -16 )
      (AES-CCM-16-128-128, SHA-256, P-256, ES256, P-256,
       AES-CCM-16-64-128, SHA-256)
]]></artwork></figure>

<t>The different methods use the same cipher suites, but some algorithms are not used in some methods. The EDHOC signature algorithm and the EDHOC signature algorithm curve are not used is methods without signature authentication.</t>

<t>The Initiator need to have a list of cipher suites it supports in order of preference. The Responder need to have a list of cipher suites it supports.</t>

</section>
<section anchor="communicationnegotiation-of-protocol-features" title="Communication/Negotiation of Protocol Features">

<t>EDHOC allows the communication or negotiation of various protocol features during the execution of the protocol.</t>

<t><list style="symbols">
  <t>The Initiator proposes a cipher suite (see <xref target="cs"/>), and the Responder either accepts or rejects, and may make a counter proposal.</t>
  <t>The Initiator decides on the correlation parameter corr (see <xref target="transport"/>). This is typically given by the transport which the Initiator and the Responder have agreed on beforehand. The Responder either accepts or rejects.</t>
  <t>The Initiator decides on the method parameter, see <xref target="method-types"/>. The Responder either accepts or rejects.</t>
  <t>The Initiator and the Responder decide on the representation of the identifier of their respective credentials, ID_CRED_I and ID_CRED_R. The decision is reflected by the label used in the CBOR map, see for example <xref target="asym-overview"/>.</t>
</list></t>

</section>
<section anchor="auxiliary-data" title="Auxiliary Data">

<t>In order to reduce round trips and number of messages, and in some cases also streamline processing, certain security applications may be integrated into EDHOC by transporting auxiliary data together with the messages. One example is the transport of third-party authorization information protected outside of EDHOC <xref target="I-D.selander-ace-ake-authz"/>. Another example is the embedding of a certificate enrolment request or a newly issued certificate.</t>

<t>EDHOC allows opaque auxiliary data (AD) to be sent in the EDHOC messages. Unprotected Auxiliary Data (AD_1, AD_2) may be sent in message_1 and message_2, respectively. Protected Auxiliary Data (AD_3) may be sent in message_3.</t>

<t>Since data carried in AD1 and AD2 may not be protected, and the content of AD3 is available to both the Initiator and the Responder, special considerations need to be made such that the availability of the data a) does not violate security and privacy requirements of the service which uses this data, and b) does not violate the security properties of EDHOC.</t>

</section>
<section anchor="cose_key" title="Ephemeral Public Keys">

<t>The ECDH ephemeral public keys are formatted as a COSE_Key of type EC2 or OKP according to Sections 13.1 and 13.2 of <xref target="RFC8152"/>, but only the ‘x’ parameter is included in the EDHOC messages. For Elliptic Curve Keys of type EC2, compact representation as per <xref target="RFC6090"/> MAY be used also in the COSE_Key. If the COSE implementation requires an ‘y’ parameter, any of the possible values of the y-coordinate can be used, see Appendix C of <xref target="RFC6090"/>. COSE <xref target="RFC8152"/> always use compact output for Elliptic Curve Keys of type EC2.</t>

</section>
<section anchor="key-der" title="Key Derivation">

<t>EDHOC uses HKDF <xref target="RFC5869"/> with the EDHOC hash algorithm in the selected cipher suite to derive keys. HKDF-Extract is used to derive fixed-length uniformly pseudorandom keys (PRK) from ECDH shared secrets. HKDF-Expand is used to derive additional output keying material (OKM) from the PRKs. The PRKs are derived using HKDF-Extract <xref target="RFC5869"/>.</t>

<figure><artwork><![CDATA[
   PRK = HKDF-Extract( salt, IKM )
]]></artwork></figure>

<t>PRK_2e is used to derive key and IV to encrypt message_2. PRK_3e2m is used to derive keys and IVs produce a MAC in message_2 and to encrypt message_3. PRK_4x3m is used to derive keys and IVs produce a MAC in message_3 and to derive application specific data.</t>

<t>PRK_2e is derived with the following input:</t>

<t><list style="symbols">
  <t>The salt SHALL be the PSK when EDHOC is authenticated with symmetric keys, and the empty byte string when EDHOC is authenticated with asymmetric keys (signature or static DH). The PSK is used as ‘salt’ to simplify implementation. Note that <xref target="RFC5869"/> specifies that if the salt is not provided, it is set to a string of zeros (see Section 2.2 of <xref target="RFC5869"/>). For implementation purposes, not providing the salt is the same as setting the salt to the empty byte string.</t>
  <t>The input keying material (IKM) SHALL be the ECDH shared secret G_XY (calculated from G_X and Y or G_Y and X) as defined in Section 12.4.1 of <xref target="RFC8152"/>.</t>
</list></t>

<t>Example: Assuming the use of SHA-256 the extract phase of HKDF produces PRK_2e as follows:</t>

<figure><artwork><![CDATA[
   PRK_2e = HMAC-SHA-256( salt, G_XY )
]]></artwork></figure>

<t>where salt = 0x (the empty byte string) in the asymmetric case and salt = PSK in the symmetric case.</t>

<t>The pseudorandom keys PRK_3e2m and PRK_4x3m are defined as follow:</t>

<t><list style="symbols">
  <t>If the Reponder authenticates with a static Diffie-Hellman key, then PRK_3e2m = HKDF-Extract( PRK_2e, G_RX ), where G_RX is the ECDH shared secret calculated from G_R and X, or G_X and R, else PRK_3e2m = PRK_2e.</t>
  <t>If the Initiator authenticates with a static Diffie-Hellman key, then PRK_4x3m = HKDF-Extract( PRK_3e2m, G_IY ), where G_IY is the ECDH shared secret calculated from G_I and Y, or G_Y and I, else PRK_4x3m = PRK_3e2m.</t>
</list></t>

<t>Example: Assuming the use of curve25519, the ECDH shared secrets G_XY, G_RX, and G_IY are the outputs of the X25519 function <xref target="RFC7748"/>:</t>

<figure><artwork><![CDATA[
   G_XY = X25519( Y, G_X ) = X25519( X, G_Y )
]]></artwork></figure>

<t>The keys and IVs used in EDHOC are derived from PRK using HKDF-Expand <xref target="RFC5869"/> where the EDHOC-KDF is instantiated with the EDHOC AEAD algorithm in the selected cipher suite.</t>

<figure><artwork><![CDATA[
   OKM = EDHOC-KDF( PRK, transcript_hash, label, length )
       = HKDF-Expand( PRK, info, length )
]]></artwork></figure>

<t>where info is the CBOR encoding of</t>

<figure><artwork><![CDATA[
info = [
   edhoc_aead_id : int / tstr,
   transcript_hash : bstr,
   label : tstr,
   length : uint
]
]]></artwork></figure>

<t>where</t>

<t><list style="symbols">
  <t>edhoc_aead_id is an int or tstr containing the algorithm identifier of the EDHOC AEAD algorithm in the selected cipher suite encoded as defined in <xref target="RFC8152"/>. Note that a single fixed edhoc_aead_id is used in all invocations of EDHOC-KDF, including the derivation of K_2e and invocations of the EDHOC-Exporter.</t>
  <t>transcript_hash is a bstr set to one of the transcript hashes TH_2, TH_3, or TH_4 as defined in Sections <xref target="asym-msg2-form" format="counter"/>, <xref target="asym-msg3-form" format="counter"/>, and <xref target="exporter" format="counter"/>.</t>
  <t>label is a tstr set to the name of the derived key or IV, i.e. “K_2m”, “IV_2m”, “K_2e”, “K_2ae”, “IV_2ae”, “K_3m”, “IV_3m”, “K_3ae”, or “IV_2ae”.</t>
  <t>length is the length of output keying material (OKM) in bytes</t>
</list></t>

<t>K_2ae and IV_2ae are derived using the transcript hash TH_2 and the pseudorandom key PRK_2e. K_2m and IV_2m are derived using the transcript hash TH_2 and the pseudorandom key PRK_3e2m. K_3ae and IV_3ae are derived using the transcript hash TH_3 and the pseudorandom key PRK_3e2m. K_3m and IV_3m are derived using the transcript hash TH_3 and the pseudorandom key PRK_4x3m. IVs are only used if the EDHOC AEAD algorithm uses IVs.</t>

<section anchor="exporter" title="EDHOC-Exporter Interface">

<t>Application keys and other application specific data can be derived using the EDHOC-Exporter interface defined as:</t>

<figure><artwork><![CDATA[
   EDHOC-Exporter(label, length)
     = EDHOC-KDF(PRK_4x3m, TH_4, label, length) 
]]></artwork></figure>

<t>where label is a tstr defined by the application and length is an uint defined by the application. The label SHALL be different for each different exporter value. The transcript hash TH_4 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>

<figure><artwork><![CDATA[
   TH_4 = H( TH_3, CIPHERTEXT_3 )
]]></artwork></figure>

<t>where H() is the hash function in the selected cipher suite. Example use of the EDHOC-Exporter is given in Sections <xref target="chain" format="counter"/> and <xref target="oscore" format="counter"/>.</t>

</section>
<section anchor="chain" title="EDHOC PSK Chaining">

<t>An application using EDHOC may want to derive new PSKs to use for authentication in future EDHOC exchanges.  In this case, the new PSK and the ID_PSK ‘kid_value’ parameter SHOULD be derived as follows where length is the key length (in bytes) of the EDHOC AEAD Algorithm.</t>

<figure><artwork><![CDATA[
   PSK     = EDHOC-Exporter( "EDHOC Chaining PSK", length )
   kid_psk = EDHOC-Exporter( "EDHOC Chaining kid_psk", 4 )
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="asym" title="EDHOC Authenticated with Asymmetric Keys">

<section anchor="asym-overview" title="Overview">

<t>This section specifies authentication method = 0, 1, 2, and 3, see <xref target="method-types"/>. EDHOC supports authentication with signature or static Diffie-Hellman keys in the form of raw public keys (RPK) and public key certificates with the requirements that:</t>

<t><list style="symbols">
  <t>Only the Responder SHALL have access to the Responder’s private authentication key,</t>
  <t>Only the Initiator SHALL have access to the Initiator’s private authentication key,</t>
  <t>The Initiator is able to retrieve the Responder’s public authentication key using ID_CRED_R,</t>
  <t>The Responder is able to retrieve the Initiator’s public authentication key using ID_CRED_I,</t>
</list></t>

<t>where the identifiers ID_CRED_I and ID_CRED_R are COSE header_maps, i.e. CBOR maps containing COSE Common Header Parameters, see Section 3.1 of <xref target="RFC8152"/>). ID_CRED_I and ID_CRED_R need to contain parameters that can identify a public authentication key. In the following paragraph we give some examples of possible COSE header parameters used.</t>

<t>Raw public keys are most optimally stored as COSE_Key objects and identified with a ‘kid’ parameter:</t>

<t><list style="symbols">
  <t>ID_CRED_x = { 4 : kid_x }, where kid_x : bstr, for x = I or R.</t>
</list></t>

<t>Public key certificates can be identified in different ways. Several header parameters for identifying X.509 certificates are defined in <xref target="I-D.ietf-cose-x509"/>:</t>

<t><list style="symbols">
  <t>by a bag of certificates with the ‘x5bag’ parameter; or  <list style="symbols">
      <t>ID_CRED_x = { 32 : COSE_X509 }, for x = I or R,</t>
    </list></t>
  <t>by a certificate chain with the ‘x5chain’ parameter;  <list style="symbols">
      <t>ID_CRED_x = { 33 : COSE_X509 }, for x = I or R,</t>
    </list></t>
  <t>by a hash value with the ‘x5t’ parameter;  <list style="symbols">
      <t>ID_CRED_x = { 34 : COSE_CertHash }, for x = I or R,</t>
    </list></t>
  <t>by a URL with the ‘x5u’ parameter;  <list style="symbols">
      <t>ID_CRED_x = { 35 : uri }, for x = I or R,</t>
    </list></t>
</list></t>

<t>In the first two examples, ID_CRED_I and ID_CRED_R contain the actual credential used for authentication. The purpose of ID_CRED_I and ID_CRED_R is to facilitate retrieval of a public authentication key and when they do not contain the actual credential, they may be very short. It is RECOMMENDED that they uniquely identify the public authentication key as the recipient may otherwise have to try several keys. ID_CRED_I and ID_CRED_R are transported in the ciphertext, see <xref target="asym-msg2-proc"/> and <xref target="asym-msg3-proc"/>.</t>

<t>The authentication key MUST be a signature key or static Diffie-Hellman key. The Initiator and the Responder
 MAY use different types of authentication keys, e.g. one uses a signature key and the other uses a static Diffie-Hellman key. When using a signature key, the authentication is provided by a signature. When using a static Diffie-Hellman key the authentication is provided by a Message Authentication Code (MAC) computed from an ephemeral-static ECDH shared secret which enables significant reductions in message sizes. The MAC is implemented with an AEAD algorithm. When using a static Diffie-Hellman keys the Initiator’s and Responder’s private authentication keys are called I and R, respectively, and the public authentication keys are called G_I and G_R, respectively.</t>

<t>The actual credentials CRED_I and CRED_R are signed or MAC:ed by the Initiator and the Responder respectively, see <xref target="asym-msg3-form"/> and <xref target="asym-msg2-form"/>. The Initiator and the Responder MAY use different types of credentials, e.g. one uses RPK and the other uses certificate. When the credential is a certificate, CRED_x is end-entity certificate (i.e. not the certificate chain) encoded as a CBOR bstr. When the credential is a COSE_Key, CREX_x is a CBOR map only contains specific fields from the COSE_Key. For COSE_Keys of type OKP the CBOR map SHALL only include the parameters 1 (kty), -1 (crv), and -2 (x-coordinate). For COSE_Keys of type EC2 the CBOR map SHALL only include the parameters 1 (kty), -1 (crv), -2 (x-coordinate), and -3 (y-coordinate). If the parties have agreed on an identity besides the public key, the indentity is included in the CBOR map with the label “subject name”, otherwise the subject name is the empty text string. The parameters SHALL be encoded in decreasing order with int labels first and text string labels last. An example of CRED_x when the RPK contains a X25519 static Diffie-Hellman key and the parties have agreed on an EUI-64 identity is shown below:</t>

<figure><artwork><![CDATA[
CRED_x = {
  1:  1,
 -1:  4,
 -2:  h'b1a3e89460e88d3a8d54211dc95f0b90
        3ff205eb71912d6db8f4af980d2db83a',
 "subject name" : "42-50-31-FF-EF-37-32-39"
}
]]></artwork></figure>

<figure title="Overview of EDHOC with asymmetric key authentication." anchor="fig-asym"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|               METHOD_CORR, SUITES_I, G_X, C_I, AD_1               |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|   C_I, G_Y, C_R, Enc(K_2e; ID_CRED_R, Signature_or_MAC_2, AD_2)   |
|<------------------------------------------------------------------+
|                             message_2                             |
|                                                                   |
|       C_R, AEAD(K_3ae; ID_CRED_I, Signature_or_MAC_3, AD_3)       |
+------------------------------------------------------------------>|
|                             message_3                             |
]]></artwork></figure>

</section>
<section anchor="edhoc-message-1" title="EDHOC Message 1">

<section anchor="asym-msg1-form" title="Formatting of Message 1">

<t>message_1 SHALL be a CBOR Sequence (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_1 = (
  METHOD_CORR : int,
  SUITES_I : [ selected : suite, supported : 2* suite ] / suite,
  G_X : bstr,
  C_I : bstr_identifier,  
  ? AD_1 : bstr,
)

suite = int
bstr_identifier = bsrt / int
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>METHOD_CORR = 4 * method + corr, where method = 0, 1, 2, or 3 (see <xref target="method-types"/>) and the correlation parameter corr is chosen based on the transport and determines which connection identifiers that are omitted (see <xref target="transport"/>).</t>
  <t>SUITES_I - cipher suites which the Initiator supports in order of (decreasing) preference. The list of supported cipher suites can be truncated at the end, as is detailed in the processing steps below. One of the supported cipher suites is selected. If a single supported cipher suite is conveyed then that cipher suite is selected and the selected cipher suite is encoded as an int instead of an array.</t>
  <t>G_X - the ephemeral public key of the Initiator</t>
  <t>C_I - variable length connection identifier. An bstr_identifier is a byte string with special encoding. Byte strings of length one is encoded as the corresponding integer - 24, i.e. h’2a’ is encoded as 18.</t>
  <t>AD_1 - bstr containing unprotected opaque auxiliary data</t>
</list></t>

</section>
<section anchor="initiator-processing-of-message-1" title="Initiator Processing of Message 1">

<t>The Initiator SHALL compose message_1 as follows:</t>

<t><list style="symbols">
  <t>The supported cipher suites and the order of preference MUST NOT be changed based on previous error messages. However, the list SUITES_I sent to the Responder MAY be truncated such that cipher suites which are the least preferred are omitted. The amount of truncation MAY be changed between sessions, e.g. based on previous error messages (see next bullet), but all cipher suites which are more preferred than the least preferred cipher suite in the list MUST be included in the list.</t>
  <t>Determine the cipher suite to use with the Responder in message_1. If the Initiator previously received from the Responder an error message to a message_1 with diagnostic payload identifying a cipher suite that the Initiator supports, then the Initiator SHALL use that cipher suite. Otherwise the first supported (i.e. the most preferred) cipher suite in SUITES_I MUST be used.</t>
  <t>Generate an ephemeral ECDH key pair as specified in Section 5 of <xref target="SP-800-56A"/> using the curve in the selected cipher suite and format it as a COSE_Key. Let G_X be the ‘x’ parameter of the COSE_Key.</t>
  <t>Choose a connection identifier C_I and store it for the length of the protocol.</t>
  <t>Encode message_1 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg1-form"/></t>
</list></t>

</section>
<section anchor="responder-processing-of-message-1" title="Responder Processing of Message 1">

<t>The Responder SHALL process message_1 as follows:</t>

<t><list style="symbols">
  <t>Decode message_1 (see <xref target="CBOR"/>).</t>
  <t>Verify that the selected cipher suite is supported and that no prior cipher suites in SUITES_I are supported.</t>
  <t>Pass AD_1 to the security application.</t>
</list></t>

<t>If any verification step fails, the Initiator MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued. If V does not support the selected cipher suite, then SUITES_R MUST include one or more supported cipher suites. If the Responder does not support the selected cipher suite, but supports another cipher suite in SUITES_I, then SUITES_R MUST include the first supported cipher suite in SUITES_I.</t>

</section>
</section>
<section anchor="edhoc-message-2" title="EDHOC Message 2">

<section anchor="asym-msg2-form" title="Formatting of Message 2">

<t>message_2 and data_2 SHALL be CBOR Sequences (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_2 = (
  data_2,
  CIPHERTEXT_2 : bstr,
)
]]></artwork></figure>

<figure><artwork type="CDDL"><![CDATA[
data_2 = (
  ? C_I : bstr_identifier,
  G_Y : bstr,
  C_R : bstr_identifier,
)
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>G_Y - the ephemeral public key of the Responder</t>
  <t>C_R - variable length connection identifier</t>
</list></t>

</section>
<section anchor="asym-msg2-proc" title="Responder Processing of Message 2">

<t>The Responder SHALL compose message_2 as follows:</t>

<t><list style="symbols">
  <t>If corr (METHOD_CORR mod 4) equals 1 or 3, C_I is omitted, otherwise C_I is not omitted.</t>
  <t>Generate an ephemeral ECDH key pair as specified in Section 5 of <xref target="SP-800-56A"/> using the curve in the selected cipher suite and format it as a COSE_Key. Let G_Y be the ‘x’ parameter of the COSE_Key.</t>
  <t>Choose a connection identifier C_R and store it for the length of the protocol.</t>
  <t>Compute the transcript hash TH_2 = H(message_1, data_2) where H() is the hash function in the selected cipher suite. The transcript hash TH_2 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>
  <t>Compute an inner COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_2m, IV_2m, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_R »      <list style="symbols">
          <t>ID_CRED_R - identifier to facilitate retrieval of CRED_R, see <xref target="asym-overview"/></t>
        </list></t>
      <t>external_aad = « TH_2, CRED_R, ? AD_2 »      <list style="symbols">
          <t>CRED_R - bstr containing the credential of the Responder, see <xref target="asym-overview"/>.</t>
          <t>AD_2 = bstr containing opaque unprotected auxiliary data</t>
        </list></t>
      <t>plaintext = h’’</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_3e2m, TH_2, “K_2m”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_3e2m, TH_2, “IV_2m”, length )</t>
      <t>Plaintext P = 0x (the empty string)</t>
      <t>Associated data A =      <vspace blankLines='1'/>
[ “Encrypt0”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 » ]</t>
    </list>
MAC_2 is the ‘ciphertext’ of the inner COSE_Encrypt0.</t>
  <t>If the Reponder authenticates with a static Diffie-Hellman key (method equals 1 or 3), then Signature_or_MAC_2 is MAC_2. If the Reponder authenticates with a signature key (method equals 0 or 2), then Signature_or_MAC_2 is the ‘signature’ of a COSE_Sign1 object as defined in Section 4.4 of <xref target="RFC8152"/> using the signature algorithm in the selected cipher suite, the private authentication key of the Responder, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_R »</t>
      <t>external_aad = « TH_2, CRED_R, ? AD_2 »</t>
      <t>payload = MAC_2</t>
    </list>
COSE constructs the input to the Signature Algorithm as:  <list style="symbols">
      <t>The key is the private authentication key of the Responder.</t>
      <t>The message M to be signed =      <vspace blankLines='1'/>
[ “Signature1”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 », MAC_2 ]</t>
    </list></t>
  <t>CIPHERTEXT_2 is the ciphertext resulting from XOR encrypting a plaintext with the following common parameters:  <list style="symbols">
      <t>plaintext = ( ID_CRED_R / bstr_identifier, Signature_or_MAC_2, ? AD_2 )      <list style="symbols">
          <t>Note that if ID_CRED_R contains a single ‘kid’ parameter, i.e., ID_CRED_R = { 4 : kid_R }, only the byte string kid_R is conveyed in the plaintext encoded as an bstr_identifier, see <xref target="asym-overview"/>.</t>
        </list></t>
      <t>CIPHERTEXT_2 = plaintext XOR K_2e</t>
      <t>K_2e = EDHOC-KDF( PRK_2e, TH_2, “K_2e”, length ), where length is the length of the plaintext.</t>
    </list></t>
  <t>Encode message_2 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg2-form"/>.</t>
</list></t>

</section>
<section anchor="initiator-processing-of-message-2" title="Initiator Processing of Message 2">

<t>The Initiator SHALL process message_2 as follows:</t>

<t><list style="symbols">
  <t>Decode message_2 (see <xref target="CBOR"/>).</t>
  <t>Retrieve the protocol state using the connection identifier C_I and/or other external information such as the CoAP Token and the 5-tuple.</t>
  <t>Decrypt CIPHERTEXT_2. The decryption process depends on the method, see <xref target="asym-msg2-proc"/>.</t>
  <t>Verify that the identity of the Responder is among the allowed identities for this connection.</t>
  <t>Verify Signature_or_MAC_2 using the algorithm in the selected cipher suite. The verification process depends on the method, see <xref target="asym-msg2-proc"/>.</t>
  <t>Pass AD_2 to the security application.</t>
</list></t>

<t>If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued.</t>

</section>
</section>
<section anchor="edhoc-message-3" title="EDHOC Message 3">

<section anchor="asym-msg3-form" title="Formatting of Message 3">

<t>message_3 and data_3 SHALL be CBOR Sequences (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_3 = (
  data_3,
  CIPHERTEXT_3 : bstr,
)
]]></artwork></figure>

<figure><artwork type="CDDL"><![CDATA[
data_3 = (
  ? C_R : bstr_identifier,
)
]]></artwork></figure>

</section>
<section anchor="asym-msg3-proc" title="Initiator Processing of Message 3">

<t>The Initiator  SHALL compose message_3 as follows:</t>

<t><list style="symbols">
  <t>If corr (METHOD_CORR mod 4) equals 2 or 3, C_R is omitted, otherwise C_R is not omitted.</t>
  <t>Compute the transcript hash TH_3 = H(TH_2 , CIPHERTEXT_2, data_3) where H() is the hash function in the the selected cipher suite. The transcript hash TH_3 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>
  <t>Compute an inner COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3m, IV_3m, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_I »      <list style="symbols">
          <t>ID_CRED_I - identifier to facilitate retrieval of CRED_I, see <xref target="asym-overview"/></t>
        </list></t>
      <t>external_aad = « TH_3, CRED_I, ? AD_3 »      <list style="symbols">
          <t>CRED_I - bstr containing the credential of the Initiator, see <xref target="asym-overview"/>.</t>
          <t>AD_3 = bstr containing opaque protected auxiliary data</t>
        </list></t>
      <t>plaintext = h’’</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_4x3m, TH_3, “K_3m”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_4x3m, TH_3, “IV_3m”, length )</t>
      <t>Plaintext P = 0x (the empty string)</t>
      <t>Associated data A =      <vspace blankLines='1'/>
[ “Encrypt0”, « ID_CRED_I », « TH_3, CRED_I, ? AD_3 » ]</t>
    </list>
MAC_3 is the ‘ciphertext’ of the inner COSE_Encrypt0.</t>
  <t>If the Initiator authenticates with a static Diffie-Hellman key (method equals 2 or 3), then Signature_or_MAC_3 is MAC_3. If the Initiator authenticates with a signature key (method equals 0 or 1), then Signature_or_MAC_3 is the ‘signature’ of a COSE_Sign1 object as defined in Section 4.4 of <xref target="RFC8152"/> using the signature algorithm in the selected cipher suite, the private authentication key of the Initiator, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_I »</t>
      <t>external_aad = « TH_3, CRED_I, ? AD_3 »</t>
      <t>payload = MAC_3</t>
    </list>
COSE constructs the input to the Signature Algorithm as:  <list style="symbols">
      <t>The key is the private authentication key of the Initiator.</t>
      <t>The message M to be signed =      <vspace blankLines='1'/>
[ “Signature1”, « ID_CRED_I », « TH_3, CRED_I, ? AD_3 », MAC_3 ]</t>
    </list></t>
  <t>Compute an outer COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3ae, IV_3ae, and the following parameters. The protected header SHALL be empty.  <list style="symbols">
      <t>external_aad = TH_3</t>
      <t>plaintext = ( ID_CRED_I / bstr_identifier, Signature_or_MAC_3, ? AD_3 )      <list style="symbols">
          <t>Note that if ID_CRED_I contains a single ‘kid’ parameter, i.e., ID_CRED_I = { 4 : kid_I }, only the byte string kid_I is conveyed in the plaintext encoded as an bstr_identifier, see <xref target="asym-overview"/>.</t>
        </list></t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_3e2m, TH_3, “K_3ae”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_3e2m, TH_3, “IV_3ae”, length )</t>
      <t>Plaintext P = ( ID_CRED_I / bstr_identifier, Signature_or_MAC_3, ? AD_3 )</t>
      <t>Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>
    </list>
CIPHERTEXT_3 is the ‘ciphertext’ of the outer COSE_Encrypt0.</t>
  <t>Encode message_3 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg3-form"/>.</t>
</list></t>

<t>Pass the connection identifiers (C_I, C_R) and the application algorithms in the selected cipher suite to the application. The application can now derive application keys using the EDHOC-Exporter interface.</t>

</section>
<section anchor="responder-processing-of-message-3" title="Responder Processing of Message 3">

<t>The Responder SHALL process message_3 as follows:</t>

<t><list style="symbols">
  <t>Decode message_3 (see <xref target="CBOR"/>).</t>
  <t>Retrieve the protocol state using the connection identifier C_R and/or other external information such as the CoAP Token and the 5-tuple.</t>
  <t>Decrypt and verify the outer COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3ae, and IV_3ae.</t>
  <t>Verify that the identity of the Initiator is among the allowed identities for this connection.</t>
  <t>Verify Signature_or_MAC_3 using the algorithm in the selected cipher suite. The verification process depends on the method, see <xref target="asym-msg3-proc"/>.</t>
  <t>Pass AD_3, the connection identifiers (C_I, C_R), and the application algorithms in the selected cipher suite to the security application. The application can now derive application keys using the EDHOC-Exporter interface.</t>
</list></t>

<t>If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued.</t>

</section>
</section>
</section>
<section anchor="sym" title="EDHOC Authenticated with Symmetric Keys">

<section anchor="sym-overview" title="Overview">

<t>EDHOC supports authentication with pre-shared keys (authentication method = 4, see <xref target="method-types"/>). The Initiator and the Responder are assumed to have a pre-shared key (PSK) with a good amount of randomness and the requirement that:</t>

<t><list style="symbols">
  <t>Only the Initiator and the Responder SHALL have access to the PSK,</t>
  <t>The Responder is able to retrieve the PSK using ID_PSK.</t>
</list></t>

<t>where the identifier ID_PSK is a COSE header_map (i.e. a CBOR map containing COSE Common Header Parameters, see <xref target="RFC8152"/>) containing COSE header parameter that can identify a pre-shared key. Pre-shared keys are typically stored as COSE_Key objects and identified with a ‘kid’ parameter (see <xref target="RFC8152"/>):</t>

<t><list style="symbols">
  <t>ID_PSK = { 4 : kid_psk } , where kid_psk : bstr</t>
</list></t>

<t>The purpose of ID_PSK is to facilitate retrieval of the PSK and in the case a ‘kid’ parameter is used it may be very short. It is RECOMMENDED that it uniquely identify the PSK as the recipient may otherwise have to try several keys.</t>

<t>EDHOC with symmetric key authentication is illustrated in <xref target="fig-sym"/>.</t>

<figure title="Overview of EDHOC with symmetric key authentication." anchor="fig-sym"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|           METHOD_CORR, SUITES_I, G_X, C_I, ID_PSK, AD_1           |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|               C_I, G_Y, C_R, AEAD(K_2ae; TH_2, AD_2)              |
|<------------------------------------------------------------------+
|                             message_2                             |
|                                                                   |
|                    C_R, AEAD(K_3ae; TH_3, AD_3)                   |
+------------------------------------------------------------------>|
|                             message_3                             |
]]></artwork></figure>

<t>EDHOC with symmetric key authentication is very similar to EDHOC with asymmetric authentication. In the following subsections the differences compared to EDHOC with asymmetric authentication are described.</t>

</section>
<section anchor="edhoc-message-1-1" title="EDHOC Message 1">

<section anchor="sym-msg1-form" title="Formatting of Message 1">

<t>message_1 SHALL be a CBOR Sequence (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_1 = (
  METHOD_CORR : int,
  SUITES_I : [ selected : suite, supported : 2* suite ] / suite,
  G_X : bstr,
  C_I :  bstr_identifier,
  ID_PSK : header_map / bstr_identifier,
  ? AD_1 : bstr,
)
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>METHOD_CORR = 4 * method + corr, where method = 4 and the connection parameter corr is chosen based on the transport and determines which connection identifiers that are omitted (see <xref target="transport"/>).</t>
  <t>ID_PSK - identifier to facilitate retrieval of the pre-shared key. If ID_PSK contains a single ‘kid’ parameter, i.e., ID_PSK = { 4 : kid_psk }, only the byte string kid_psk is conveyed encoded as an bstr_identifier.</t>
</list></t>

</section>
</section>
<section anchor="edhoc-message-2-1" title="EDHOC Message 2">

<section anchor="processing-of-message-2" title="Processing of Message 2">

<t><list style="symbols">
  <t>Signature_or_MAC_2 is not used.</t>
  <t>The outer COSE_Encrypt0 is computed as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_2ae, IV_2ae, and the following parameters. The protected header SHALL be empty.  <list style="symbols">
      <t>plaintext = ? AD_2      <list style="symbols">
          <t>AD_2 = bstr containing opaque unprotected auxiliary data</t>
        </list></t>
      <t>external_aad = TH_2</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_2e, TH_2, “K_2ae”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_2e, TH_2, “IV_2ae”, length )</t>
      <t>Plaintext P = ? AD_2</t>
      <t>Associated data A = [ “Encrypt0”, h’’, TH_2 ]</t>
    </list></t>
</list></t>

</section>
</section>
<section anchor="edhoc-message-3-1" title="EDHOC Message 3">

<section anchor="processing-of-message-3" title="Processing of Message 3">

<t><list style="symbols">
  <t>Signature_or_MAC_3 is not used.</t>
  <t>COSE_Encrypt0 is computed as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3ae, IV_3ae, and the following parameters. The protected header SHALL be empty.  <list style="symbols">
      <t>plaintext = ? AD_3      <list style="symbols">
          <t>AD_3 = bstr containing opaque protected auxiliary data</t>
        </list></t>
      <t>external_aad = TH_3</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_3e2m, TH_3, “K_3ae”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_3e2m, TH_3, “IV_3ae”, length )</t>
      <t>Plaintext P = ? AD_3</t>
      <t>Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>
    </list></t>
</list></t>

</section>
</section>
</section>
<section anchor="error" title="Error Handling">

<section anchor="edhoc-error-message" title="EDHOC Error Message">

<t>This section defines a message format for the EDHOC error message, used during the protocol. An EDHOC error message can be sent by both parties as a reply to any non-error EDHOC message. After sending an error message, the protocol MUST be discontinued. Errors at the EDHOC layer are sent as normal successful messages in the lower layers (e.g. CoAP POST and 2.04 Changed). An advantage of using such a construction is to avoid issues created by usage of cross protocol proxies (e.g. UDP to TCP).</t>

<t>error SHALL be a CBOR Sequence (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
error = (
  ? C_x : bstr_identifier,
  ERR_MSG : tstr,
  ? SUITES_R : [ supported : 2* suite ] / suite,
)
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>C_x - if error is sent by the Responder and corr (METHOD_CORR mod 4) equals 0 or 2 then C_x is set to C_I, else if error is sent by the Initiator and corr (METHOD_CORR mod 4) equals 0 or 1 then C_x is set to C_R, else C_x is omitted.</t>
  <t>ERR_MSG - text string containing the diagnostic payload, defined in the same way as in Section 5.5.2 of <xref target="RFC7252"/>. ERR_MSG MAY be a 0-length text string.</t>
  <t>SUITES_R - cipher suites from SUITES_I or the EDHOC cipher suites registry that the Responder supports. SUITES_R MUST only be included in replies to message_1. If a single supported cipher suite is conveyed then the supported cipher suite is encoded as an int instead of an array.</t>
</list></t>

<section anchor="example-use-of-edhoc-error-message-with-suitesr" title="Example Use of EDHOC Error Message with SUITES_R">

<t>Assuming that the Initiator supports the five cipher suites 5, 6, 7, 8, and 9 in decreasing order of preference, Figures <xref target="fig-error1" format="counter"/> and <xref target="fig-error2" format="counter"/> show examples of how the Responder can truncate SUITES_I and how SUITES_R is used by the Responder to give the Initiator information about the cipher suites that the Responder supports. In <xref target="fig-error1"/>, the Responder supports cipher suite 6 but not the selected cipher suite 5.</t>

<figure title="Example use of error message with SUITES_R." anchor="fig-error1"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|        METHOD_CORR, SUITES_I = [5, 5, 6, 7], G_X, C_I, AD_1       |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|                     C_I, ERR_MSG, SUITES_R = 6                    |
|<------------------------------------------------------------------+
|                               error                               |
|                                                                   |
|         METHOD_CORR, SUITES_I = [6, 5, 6], G_X, C_I, AD_1         |
+------------------------------------------------------------------>|
|                             message_1                             |
]]></artwork></figure>

<t>In <xref target="fig-error2"/>, the Responder supports cipher suite 7 but not cipher suites 5 and 6.</t>

<figure title="Example use of error message with SUITES_R." anchor="fig-error2"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|         METHOD_CORR, SUITES_I = [5, 5, 6], G_X, C_I, AD_1         |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|                  C_I, ERR_MSG, SUITES_R = [7, 9]                  |
|<------------------------------------------------------------------+
|                               error                               |
|                                                                   |
|        METHOD_CORR, SUITES_I = [7, 5, 6, 7], G_X, C_I, AD_1       |
+------------------------------------------------------------------>|
|                             message_1                             |
]]></artwork></figure>

<t>As the Initiator’s list of supported cipher suites and order of preference is fixed, and the Responder only accepts message_1 if the selected cipher suite is the first cipher suite in SUITES_I that the Responder supports, the parties can verify that the selected cipher suite is the most preferred (by the Initiator) cipher suite supported by both parties. If the selected cipher suite is not the first cipher suite in SUITES_I that the Responder supports, the Responder will discontinue the protocol.</t>

</section>
</section>
</section>
<section anchor="transfer" title="Transferring EDHOC and Deriving an OSCORE Context">

<section anchor="coap" title="Transferring EDHOC in CoAP">

<t>It is recommended to transport EDHOC as an exchange of CoAP <xref target="RFC7252"/> messages. CoAP is a reliable transport that can preserve packet ordering and handle message duplication. CoAP can also perform fragmentation and protect against denial of service attacks. It is recommended to carry the EDHOC messages in Confirmable messages, especially if fragmentation is used.</t>

<t>By default, the CoAP client is the Initiator and the CoAP server is the Responder, but the roles SHOULD be chosen to protect the most sensitive identity, see <xref target="security"/>. By default, EDHOC is transferred in POST requests and 2.04 (Changed) responses to the Uri-Path: “/.well-known/edhoc”, but an application may define its own path that can be discovered e.g. using resource directory <xref target="I-D.ietf-core-resource-directory"/>.</t>

<t>By default, the message flow is as follows: EDHOC message_1 is sent in the payload of a POST request from the client to the server’s resource for EDHOC. EDHOC message_2 or the EDHOC error message is sent from the server to the client in the payload of a 2.04 (Changed) response. EDHOC message_3 or the EDHOC error message is sent from the client to the server’s resource in the payload of a POST request. If needed, an EDHOC error message is sent from the server to the client in the payload of a 2.04 (Changed) response.</t>

<t>An example of a successful EDHOC exchange using CoAP is shown in <xref target="fig-coap1"/>. In this case the CoAP Token enables the Initiator to correlate message_1 and message_2 so the correlation parameter corr = 1.</t>

<figure title="Transferring EDHOC in CoAP" anchor="fig-coap1"><artwork align="center"><![CDATA[
Client    Server
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_1
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_2
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_3
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | 
  |          |
]]></artwork></figure>

<t>The exchange in <xref target="fig-coap1"/> protects the client identity against active attackers and the server identity against passive attackers. An alternative exchange that protects the server identity against active attackers and the client identity against passive attackers is shown in <xref target="fig-coap2"/>. In this case the CoAP Token enables the Responder to correlate message_2 and message_3 so the correlation parameter corr = 2.</t>

<figure title="Transferring EDHOC in CoAP" anchor="fig-coap2"><artwork align="center"><![CDATA[
Client    Server
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_1
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_2
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_3
  |          |
]]></artwork></figure>

<t>To protect against denial-of-service attacks, the CoAP server MAY respond to the first POST request with a 4.01 (Unauthorized) containing an Echo option <xref target="I-D.ietf-core-echo-request-tag"/>. This forces the initiator to demonstrate its reachability at its apparent network address. If message fragmentation is needed, the EDHOC messages may be fragmented using the CoAP Block-Wise Transfer mechanism <xref target="RFC7959"/>.</t>

<section anchor="oscore" title="Deriving an OSCORE Context from EDHOC">

<t>When EDHOC is used to derive parameters for OSCORE <xref target="RFC8613"/>, the parties  make sure that the EDHOC connection identifiers are unique, i.e. C_R MUST NOT be equal to C_I. The CoAP client and server MUST be able to retrieve the OSCORE protocol state using its chosen connection identifier and optionally other information such as the 5-tuple. In case that the CoAP client is the Initiator and the CoAP server is the Responder:</t>

<t><list style="symbols">
  <t>The client’s OSCORE Sender ID is C_R and the server’s OSCORE Sender ID is C_I, as defined in this document</t>
  <t>The AEAD Algorithm and the hash algorithm are the application AEAD and hash algorithms in the selected cipher suite.</t>
  <t>The Master Secret and Master Salt are derived as follows where length is the key length (in bytes) of the application AEAD Algorithm.</t>
</list></t>

<figure><artwork><![CDATA[
   Master Secret = EDHOC-Exporter( "OSCORE Master Secret", length )
   Master Salt   = EDHOC-Exporter( "OSCORE Master Salt", 8 )
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="security" title="Security Considerations">

<section anchor="security-properties" title="Security Properties">

<t>EDHOC inherits its security properties from the theoretical SIGMA-I protocol <xref target="SIGMA"/>. Using the terminology from <xref target="SIGMA"/>, EDHOC provides perfect forward secrecy, mutual authentication with aliveness, consistency, peer awareness. As described in <xref target="SIGMA"/>, peer awareness is provided to the Responder, but not to the Initiator.</t>

<t>When a Public Key Infrastructure (PKI) is used, EDHOC provides identity protection of the Initiator against active attacks and identity protection of the Responder against passive attacks. When PKI is not used (kid, x5t) the identity is not sent on the wire and EDHOC with asymmetric authentication protects the credential identifier of the Initiator against active attacks and the credential identifier of the Responder against passive attacks. The roles should be assigned to protect the most sensitive identity/identifier, typically that which is not possible to infer from routing information in the lower layers. EDHOC with symmetric authentication does not offer protection of the PSK identifier ID_PSK.</t>

<t>Compared to <xref target="SIGMA"/>, EDHOC adds an explicit method type and expands the message authentication coverage to additional elements such as algorithms, auxiliary data, and previous messages. This protects against an attacker replaying messages or injecting messages from another session.</t>

<t>EDHOC also adds negotiation of connection identifiers and downgrade protected negotiation of cryptographic parameters, i.e. an attacker cannot affect the negotiated parameters. A single session of EDHOC does not include negotiation of cipher suites, but it enables the Responder to verify that the selected cipher suite is the most preferred cipher suite by the Initiator which is supported by both the Initiator and the Responder.</t>

<t>As required by <xref target="RFC7258"/>, IETF protocols need to mitigate pervasive monitoring when possible. One way to mitigate pervasive monitoring is to use a key exchange that provides perfect forward secrecy. EDHOC therefore only supports methods with perfect forward secrecy. To limit the effect of breaches, it is important to limit the use of symmetrical group keys for bootstrapping. EDHOC therefore strives to make the additional cost of using raw public keys and self-signed certificates as small as possible. Raw public keys and self-signed certificates are not a replacement for a public key infrastructure, but SHOULD be used instead of symmetrical group keys for bootstrapping.</t>

<t>Compromise of the long-term keys (PSK or private authentication keys) does not compromise the security of completed EDHOC exchanges. Compromising the private authentication keys of one party lets an active attacker impersonate that compromised party in EDHOC exchanges with other parties, but does not let the attacker impersonate other parties in EDHOC exchanges with the compromised party. Compromising the PSK lets an active attacker impersonate the Initiator in EDHOC exchanges with the Responder and impersonate the Responder in EDHOC exchanges with the Initiator. Compromise of the long-term keys does not enable a passive attacker to compromise future session keys. Compromise of the HDKF input parameters (ECDH shared secret and/or PSK) leads to compromise of all session keys derived from that compromised shared secret. Compromise of one session key does not compromise other session keys.</t>

<t>Key compromise impersonation (KCI): In EDHOC authenticated with signature keys, EDHOC provides KCI protection against an attacker having access to the long term key or the ephemeral secret key. In EDHOC authenticated with symmetric keys, EDHOC provides KCI protection against an attacker having access to the ephemeral secret key, but not against an attacker having access to the long-term PSK. With static Diffie-Hellman key authentication, KCI protection would be provided against an attacker having access to the long-term Diffie-Hellman key, but not to an attacker having access to the ephemeral secret key. Note that the term KCI has typically been used for compromise of long-term keys, and that an attacker with access to the ephemeral secret key can only attack that specific protocol run.</t>

<t>Repudiation: In EDHOC authenticated with signature keys, Party U could theoretically prove that Party V performed a run of the protocol by presenting the private ephemeral key, and vice versa. Note that storing the private ephemeral keys violates the protocol requirements. With static Diffie-Hellman key authentication or PSK authentication, both parties can always deny having participated in the protocol.</t>

</section>
<section anchor="cryptographic-considerations" title="Cryptographic Considerations">
<t>The security of the SIGMA protocol requires the MAC to be bound to the identity of the signer. Hence the message authenticating functionality of the authenticated encryption in EDHOC is critical: authenticated encryption MUST NOT be replaced by plain encryption only, even if authentication is provided at another level or through a different mechanism. EDHOC implements SIGMA-I using the same Sign-then-MAC approach as TLS 1.3.</t>

<t>To reduce message overhead EDHOC does not use explicit nonces and instead rely on the ephemeral public keys to provide randomness to each session. A good amount of randomness is important for the key generation, to provide liveness, and to protect against interleaving attacks. For this reason, the ephemeral keys MUST NOT be reused, and both parties SHALL generate fresh random ephemeral key pairs.</t>

<t>The choice of key length used in the different algorithms needs to be harmonized, so that a sufficient security level is maintained for certificates, EDHOC, and the protection of application data. The Initiator and the Responder should enforce a minimum security level.</t>

<t>The data rates in many IoT deployments are very limited. Given that the application keys are protected as well as the long-term authentication keys they can often be used for years or even decades before the cryptographic limits are reached. If the application keys established through EDHOC need to be renewed, the communicating parties can derive application keys with other labels or run EDHOC again.</t>

</section>
<section anchor="cipher-suites" title="Cipher Suites">

<t>Cipher suite number 0 (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519, AES-CCM-16-64-128, SHA-256) is mandatory to implement. Implementations only need to implement the algorithms needed for their supported methods. For many constrained IoT devices it is problematic to support more than one cipher suites, so some deployments with P-256 may not support the mandatory cipher suite. This is not a problem for local deployments.</t>

<t>The HMAC algorithm HMAC 256/64 (HMAC w/ SHA-256 truncated to 64 bits) SHALL NOT be supported for use in EDHOC.</t>

</section>
<section anchor="unprotected-data" title="Unprotected Data">

<t>The Initiator and the Responder must make sure that unprotected data and metadata do not reveal any sensitive information. This also applies for encrypted data sent to an unauthenticated party. In particular, it applies to AD_1, ID_CRED_R, AD_2, and ERR_MSG in the asymmetric case, and ID_PSK, AD_1, and ERR_MSG in the symmetric case. Using the same ID_PSK or AD_1 in several EDHOC sessions allows passive eavesdroppers to correlate the different sessions. The communicating parties may therefore anonymize ID_PSK. Another consideration is that the list of supported cipher suites may be used to identify the application.</t>

<t>The Initiator and the Responder must also make sure that unauthenticated data does not trigger any harmful actions. In particular, this applies to AD_1 and ERR_MSG in the asymmetric case, and ID_PSK, AD_1, and ERR_MSG in the symmetric case.</t>

</section>
<section anchor="denial-of-service" title="Denial-of-Service">

<t>EDHOC itself does not provide countermeasures against Denial-of-Service attacks. By sending a number of new or replayed message_1 an attacker may cause the Responder to allocate state, perform cryptographic operations, and amplify messages. To mitigate such attacks, an implementation SHOULD rely on lower layer mechanisms such as the Echo option in CoAP <xref target="I-D.ietf-core-echo-request-tag"/> that forces the initiator to demonstrate reachability at its apparent network address.</t>

</section>
<section anchor="implementation-considerations" title="Implementation Considerations">

<t>The availability of a secure pseudorandom number generator and truly random seeds are essential for the security of EDHOC. If no true random number generator is available, a truly random seed must be provided from an external source. As each pseudorandom number must only be used once, an implementation need to get a new truly random seed after reboot, or continuously store state in nonvolatile memory, see (<xref target="RFC8613"/>, Appendix B.1.1) for issues and solution approaches for writing to nonvolatile memory. If ECDSA is supported, “deterministic ECDSA” as specified in <xref target="RFC6979"/> is RECOMMENDED.</t>

<t>The referenced processing instructions in <xref target="SP-800-56A"/> must be complied with, including deleting the intermediate computed values along with any ephemeral ECDH secrets after the key derivation is completed. The ECDH shared secret, keys, and IVs MUST be secret. Implementations should provide countermeasures to side-channel attacks such as timing attacks. Depending on the selected curve, the parties should perform various validations of each other’s public keys, see e.g. Section 5 of <xref target="SP-800-56A"/>.</t>

<t>The Initiator and the Responder are responsible for verifying the integrity of certificates. The selection of trusted CAs should be done very carefully and certificate revocation should be supported. The private authentication keys and the PSK (even though it is used as salt) MUST be kept secret.</t>

<t>The Initiator and the Responder are allowed to select the connection identifiers C_I and C_R, respectively, for the other party to use in the ongoing EDHOC protocol as well as in a subsequent application protocol (e.g. OSCORE <xref target="RFC8613"/>). The choice of connection identifier is not security critical in EDHOC but intended to simplify the retrieval of the right security context in combination with using short identifiers. If the wrong connection identifier of the other party is used in a protocol message it will result in the receiving party not being able to retrieve a security context (which will terminate the protocol) or retrieve the wrong security context (which also terminates the protocol as the message cannot be verified).</t>

<t>The Responder MUST finish the verification step of message_3 before passing AD_3 to the application.</t>

<t>If two nodes unintentionally initiate two simultaneous EDHOC message exchanges with each other even if they only want to complete a single EDHOC message exchange, they MAY terminate the exchange with the lexicographically smallest G_X. If the two G_X values are equal, the received message_1 MUST be discarded to mitigate reflection attacks. Note that in the case of two simultaneous EDHOC exchanges where the nodes only complete one and where the nodes have different preferred cipher suites, an attacker can affect which of the two nodes’ preferred cipher suites will be used by blocking the other exchange.</t>

</section>
<section anchor="other-documents-referencing-edhoc" title="Other Documents Referencing EDHOC">

<t>EDHOC has been analyzed in several other documents. A formal verification of EDHOC was done in <xref target="SSR18"/>, an analysis of EDHOC for certificate enrollment was done in <xref target="Kron18"/>, the use of EDHOC in LoRaWAN is analyzed in <xref target="LoRa1"/> and <xref target="LoRa2"/>, the use of EDHOC in IoT bootstrapping is analyzed in <xref target="Perez18"/>, and the use of EDHOC in 6TiSCH is described in <xref target="I-D.ietf-6tisch-dtsecurity-zerotouch-join"/>.</t>

</section>
</section>
<section anchor="iana" title="IANA Considerations">

<section anchor="edhoc-cipher-suites-registry" title="EDHOC Cipher Suites Registry">

<t>IANA has created a new registry titled “EDHOC Cipher Suites” under the new heading “EDHOC”. The registration procedure is “Expert Review”. The columns of the registry are Value, Array, Description, and Reference, where Value is an integer and the other columns are text strings. The initial contents of the registry are:</t>

<figure><artwork><![CDATA[
Value: -24
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: -23
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 0
Array: 10, 5, 4, -8, 6, 10, 5
Desc: AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 1
Array: 30, 5, 4, -8, 6, 10, 5
Desc: AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 2
Array: 10, 5, 1, -7, 1, 10, 5
Desc: AES-CCM-16-64-128, SHA-256, P-256, ES256, P-256,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 3
Array: 30, 5, 1, -7, 1, 10, 5
Desc: AES-CCM-16-128-128, SHA-256, P-256, ES256, P-256,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

</section>
<section anchor="method-types" title="EDHOC Method Type Registry">

<t>IANA has created a new registry titled “EDHOC Method Type” under the new heading “EDHOC”. The registration procedure is “Expert Review”. The columns of the registry are Value, Description, and Reference, where Value is an integer and the other columns are text strings. The initial contents of the registry are:</t>

<figure title="Method Types" anchor="fig-method-types"><artwork align="center"><![CDATA[
+-------+-------------------+-------------------+-------------------+
| Value | Initiator         | Responder         | Reference         |
+-------+-------------------+-------------------+-------------------+
|     0 | Signature Key     | Signature Key     | [[this document]] |
|     1 | Signature Key     | Static DH Key     | [[this document]] |
|     2 | Static DH Key     | Signature Key     | [[this document]] |
|     3 | Static DH Key     | Static DH Key     | [[this document]] |
|     4 | PSK               | PSK               | [[this document]] |
+-------+-------------------+-------------------+-------------------+
]]></artwork></figure>

</section>
<section anchor="the-well-known-uri-registry" title="The Well-Known URI Registry">

<t>IANA has added the well-known URI ‘edhoc’ to the Well-Known URIs registry.</t>

<t><list style="symbols">
  <t>URI suffix: edhoc</t>
  <t>Change controller: IETF</t>
  <t>Specification document(s): [[this document]]</t>
  <t>Related information: None</t>
</list></t>

</section>
<section anchor="media-types-registry" title="Media Types Registry">

<t>IANA has added the media type ‘application/edhoc’ to the Media Types registry.</t>

<t><list style="symbols">
  <t>Type name: application</t>
  <t>Subtype name: edhoc</t>
  <t>Required parameters: N/A</t>
  <t>Optional parameters: N/A</t>
  <t>Encoding considerations: binary</t>
  <t>Security considerations: See Section 7 of this document.</t>
  <t>Interoperability considerations: N/A</t>
  <t>Published specification: [[this document]] (this document)</t>
  <t>Applications that use this media type: To be identified</t>
  <t>Fragment identifier considerations: N/A</t>
  <t>Additional information:  <list style="symbols">
      <t>Magic number(s): N/A</t>
      <t>File extension(s): N/A</t>
      <t>Macintosh file type code(s): N/A</t>
    </list></t>
  <t>Person &amp; email address to contact for further information: See “Authors’ Addresses” section.</t>
  <t>Intended usage: COMMON</t>
  <t>Restrictions on usage: N/A</t>
  <t>Author: See “Authors’ Addresses” section.</t>
  <t>Change Controller: IESG</t>
</list></t>

</section>
<section anchor="coap-content-formats-registry" title="CoAP Content-Formats Registry">

<t>IANA has added the media type ‘application/edhoc’ to the CoAP Content-Formats registry.</t>

<t><list style="symbols">
  <t>Media Type: application/edhoc</t>
  <t>Encoding:</t>
  <t>ID: TBD42</t>
  <t>Reference: [[this document]]</t>
</list></t>

</section>
<section anchor="expert-review-instructions" title="Expert Review Instructions">

<t>The IANA Registries established in this document is defined as “Expert Review”. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>

<t>Expert reviewers should take into consideration the following points:</t>

<t><list style="symbols">
  <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Expert needs to make sure the values of algorithms are taken from the right registry, when that’s required. Expert should consider requesting an opinion on the correctness of registered parameters from relevant IETF working groups. Encodings that do not meet these objective of clarity and completeness should not be registered.</t>
  <t>Experts should take into account the expected usage of fields when approving point assignment. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
  <t>Specifications are recommended. When specifications are not provided, the description provided needs to have sufficient information to verify the points above.</t>
</list></t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&I-D.ietf-cose-x509;
&I-D.ietf-core-echo-request-tag;
&RFC2119;
&RFC5116;
&RFC5869;
&RFC6090;
&RFC6979;
&RFC7252;
&RFC7748;
&RFC7049;
&RFC7959;
&RFC8152;
&RFC8174;
&RFC8610;
&RFC8613;
&RFC8742;


    </references>

    <references title='Informative References'>

<reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
  <front>
    <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
    <author initials="E." surname="Barker">
      <organization></organization>
    </author>
    <author initials="L." surname="Chen">
      <organization></organization>
    </author>
    <author initials="A." surname="Roginsky">
      <organization></organization>
    </author>
    <author initials="A." surname="Vassilev">
      <organization></organization>
    </author>
    <author initials="R." surname="Davis">
      <organization></organization>
    </author>
    <date year="2018" month="April"/>
  </front>
  <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
</reference>
<reference anchor="SIGMA" target="http://webee.technion.ac.il/~hugo/sigma-pdf.pdf">
  <front>
    <title>SIGMA - The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols (Long version)</title>
    <author initials="H." surname="Krawczyk">
      <organization></organization>
    </author>
    <date year="2003" month="June"/>
  </front>
</reference>
&I-D.hartke-core-e2e-security-reqs;
&I-D.ietf-6tisch-dtsecurity-zerotouch-join;
&I-D.ietf-ace-oauth-authz;
&I-D.ietf-ace-oscore-profile;
&I-D.ietf-core-resource-directory;
&I-D.ietf-lwig-security-protocol-comparison;
&I-D.ietf-tls-dtls13;
&I-D.selander-ace-ake-authz;
&RFC7228;
&RFC7258;
&RFC7296;
&RFC8446;
<reference anchor="LoRa1" target="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6021899/pdf/sensors-18-01833.pdf">
  <front>
    <title>Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach</title>
    <author initials="R." surname="Sanchez-Iborra">
      <organization></organization>
    </author>
    <author initials="J." surname="Sánchez-Gómez">
      <organization></organization>
    </author>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="P.J." surname="Fernández">
      <organization></organization>
    </author>
    <author initials="J." surname="Santa">
      <organization></organization>
    </author>
    <author initials="J.L." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="A.F." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="LoRa2" target="https://ants.inf.um.es/~josesanta/doc/GIoTS1.pdf">
  <front>
    <title>Internet Access for LoRaWAN Devices Considering Security Issues</title>
    <author initials="R." surname="Sanchez-Iborra">
      <organization></organization>
    </author>
    <author initials="J." surname="Sánchez-Gómez">
      <organization></organization>
    </author>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="P.J." surname="Fernández">
      <organization></organization>
    </author>
    <author initials="J." surname="Santa">
      <organization></organization>
    </author>
    <author initials="J.L." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="A.F." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="Kron18" target="https://www.nada.kth.se/~ann/exjobb/alexandros_krontiris.pdf">
  <front>
    <title>Evaluation of Certificate Enrollment over Application Layer Security</title>
    <author initials="A." surname="Krontiris">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="SSR18" target="https://www.springerprofessional.de/en/formal-verification-of-ephemeral-diffie-hellman-over-cose-edhoc/16284348">
  <front>
    <title>Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <author initials="A." surname="Bruni">
      <organization></organization>
    </author>
    <author initials="T." surname="Sahl Jørgensen">
      <organization></organization>
    </author>
    <author initials="T." surname="Grønbech Petersen">
      <organization></organization>
    </author>
    <author initials="C." surname="Schürmann">
      <organization></organization>
    </author>
    <date year="2018" month="November"/>
  </front>
</reference>
<reference anchor="Perez18" target="http://www.anastacia-h2020.eu/publications/Architecture_of_security_association_establishment_based_on_bootstrapping_technologies_for_enabling_critical_IoT_infrastructures.pdf">
  <front>
    <title>Architecture of security association establishment based on bootstrapping technologies for enabling critical IoT K</title>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="D." surname="Garcia-Carrillo">
      <organization></organization>
    </author>
    <author initials="R." surname="Marín-López">
      <organization></organization>
    </author>
    <author initials="J." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="R." surname="Marín-Pérez">
      <organization></organization>
    </author>
    <author initials="A." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="CborMe" target="http://cbor.me/">
  <front>
    <title>CBOR Playground</title>
    <author initials="C." surname="Bormann">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>


    </references>


<section anchor="CBORandCOSE" title="Use of CBOR, CDDL and COSE in EDHOC">

<t>This Appendix is intended to simplify for implementors not familiar with CBOR <xref target="RFC7049"/>, CDDL <xref target="RFC8610"/>, COSE <xref target="RFC8152"/>, and HKDF <xref target="RFC5869"/>.</t>

<section anchor="CBOR" title="CBOR and CDDL">

<t>The Concise Binary Object Representation (CBOR) <xref target="RFC7049"/> is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays []  of data items, maps {} of pairs of data items, and sequences <xref target="RFC8742"/> of data items. Some examples are given below. For a complete specification and more examples, see <xref target="RFC7049"/> and <xref target="RFC8610"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>

<figure><artwork align="center"><![CDATA[
Diagnostic          Encoded              Type
------------------------------------------------------------------
1                   0x01                 unsigned integer    
24                  0x1818               unsigned integer
-24                 0x37                 negative integer
-25                 0x3818               negative integer 
null                0xf6                 simple value 
h'12cd'             0x4212cd             byte string
'12cd'              0x4431326364         byte string
"12cd"              0x6431326364         text string
{ 4 : h'cd' }       0xa10441cd           map                 
<< 1, 2, null >>    0x430102f6           byte string
[ 1, 2, null ]      0x830102f6           array      
( 1, 2, null )      0x0102f6             sequence
1, 2, null          0x0102f6             sequence
------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="COSE" title="COSE">

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/> describes how to create and process signatures, message authentication codes, and encryption using CBOR. COSE builds on JOSE, but is adapted to allow more efficient processing in constrained devices. EDHOC makes use of COSE_Key, COSE_Encrypt0, COSE_Sign1, and COSE_KDF_Context objects.</t>

</section>
</section>
<section anchor="vectors" title="Test Vectors">

<t>This appendix provides detailed test vectors to ease implementation and ensure interoperability. In addition to hexadecimal, all CBOR data items and sequences are given in CBOR diagnostic notation. The test vectors use the default mapping to CoAP where the Initiator acts as CoAP client (this means that corr = 1).</t>

<t>A more extensive test vector suite covering more combinations of authentication method used between Initiator and Responder and related code to generate them can be found at https://github.com/EricssonResearch/EDHOC/tree/master/Test%20Vectors .</t>

<section anchor="test-vectors-for-edhoc-authenticated-with-signature-keys-x5t" title="Test Vectors for EDHOC Authenticated with Signature Keys (x5t)">

<t>EDHOC with signature authentication and X.509 certificates is used. In this test vector, the hash value ‘x5t’ is used to identify the certificate.</t>

<figure><artwork><![CDATA[
method (Signature Authentication)
0
]]></artwork></figure>

<t>CoaP is used as transport and the Initiator acts as CoAP client:</t>

<figure><artwork><![CDATA[
corr (the Initiator can correlate message_1 and message_2)
1
]]></artwork></figure>

<t>From there, METHOD_CORR has the following value:</t>

<figure><artwork><![CDATA[
METHOD_CORR (4 * method + corr) (int)
1
]]></artwork></figure>

<t>No unprotected opaque auxiliary data is sent in the message exchanges.</t>

<t>The list of supported cipher suites of the Initiator in order of preference is the following:</t>

<figure><artwork><![CDATA[
Supported Cipher Suites (4 bytes)
00 01 02 03
]]></artwork></figure>

<t>The cipher suite selected by the Initiator is the most preferred:</t>

<figure><artwork><![CDATA[
Selected Cipher Suite (int)
0
]]></artwork></figure>

<t>The mandatory-to-implement cipher suite 0 is supported by both the Initiator and the Responder, see <xref target="cipher-suites"/>.</t>

<section anchor="message1" title="Message_1">

<figure><artwork><![CDATA[
X (Initiator's ephemeral private key) (32 bytes)
8f 78 1a 09 53 72 f8 5b 6d 9f 61 09 ae 42 26 11 73 4d 7d bf a0 06 9a 2d 
f2 93 5b b2 e0 53 bf 35
]]></artwork></figure>

<figure><artwork><![CDATA[
G_X (Initiator's ephemeral public key) (32 bytes)
89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 ec 07 6b ba 
02 59 d9 04 b7 ec 8b 0c
]]></artwork></figure>

<t>The Initiator chooses a connection identifier C_I:</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Initiator (0 bytes)

]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_1 (0 bytes)
]]></artwork></figure>

<t>Since the list of supported cipher suites needs to contain the selected cipher suite, the initiator truncates the list of supported cipher suites to one cipher suite only, 00.</t>

<t>Because one single selected cipher suite is conveyed, it is encoded as an int instead of an array:</t>

<figure><artwork><![CDATA[
SUITES_I (int)
0
]]></artwork></figure>

<t>With SUITES_I = 0, message_1 is constructed, as the CBOR Sequence of the CBOR data items above.</t>

<figure><artwork><![CDATA[
message_1 =
(
  1,
  0,
  h'898ff79a02067a16ea1eccb90fa52246f5aa4dd6ec076bba0259d904b7ec8b0c',
  h''
)
]]></artwork></figure>

<figure><artwork><![CDATA[
message_1 (CBOR Sequence) (37 bytes)
01 00 58 20 89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 
ec 07 6b ba 02 59 d9 04 b7 ec 8b 0c 40 
]]></artwork></figure>

</section>
<section anchor="message2" title="Message_2">

<t>Since METHOD_CORR mod 4 equals 1, C_I is omitted from data_2.</t>

<figure><artwork><![CDATA[
Y (Responder's ephemeral private key) (32 bytes)
fd 8c d8 77 c9 ea 38 6e 6a f3 4f f7 e6 06 c4 b6 4c a8 31 c8 ba 33 13 4f 
d4 cd 71 67 ca ba ec da
]]></artwork></figure>

<figure><artwork><![CDATA[
G_Y (Responder's ephemeral public key) (32 bytes)
71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 19 52 
81 75 4c 5e bc af 30 1e 
]]></artwork></figure>

<t>From G_X and Y or from G_Y and X the ECDH shared secret is computed:</t>

<figure><artwork><![CDATA[
G_XY (ECDH shared secret) (32 bytes)
2b b7 fa 6e 13 5b c3 35 d0 22 d6 34 cb fb 14 b3 f5 82 f3 e2 e3 af b2 b3 
15 04 91 49 5c 61 78 2b 
]]></artwork></figure>

<t>The key and nonce for calculating the ciphertext are calculated as follows, as specified in <xref target="key-der"/>.</t>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>PRK_2e = HMAC-SHA-256(salt, G_XY)</t>

<t>Since this is the asymmetric case, salt is the empty byte string.</t>

<figure><artwork><![CDATA[
salt (0 bytes)
]]></artwork></figure>

<t>From there, PRK_2e is computed:</t>

<figure><artwork><![CDATA[
PRK_2e (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a
]]></artwork></figure>

<figure><artwork><![CDATA[
SK_R (Responders's private authentication key) (32 bytes)
df 69 27 4d 71 32 96 e2 46 30 63 65 37 2b 46 83 ce d5 38 1b fc ad cd 44 
0a 24 c3 91 d2 fe db 94
]]></artwork></figure>

<t>Since neither the Initiator nor the Responder authanticates with a static Diffie-Hellman key, PRK_3e2m = PRK_2e</t>

<figure><artwork><![CDATA[
PRK_3e2m (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a 
]]></artwork></figure>

<t>The Responder chooses a connection identifier C_R.</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Responder (1 bytes)
13
]]></artwork></figure>

<t>Data_2 is constructed, as the CBOR Sequence of G_Y and C_R.</t>

<figure><artwork><![CDATA[
data_2 =
(
  h'71a3d599c21da18902a1aea810b2b6382ccd8d5f9bf0195281754c5ebcaf301e',
  h'13'
)
]]></artwork></figure>

<figure><artwork><![CDATA[
data_2 (CBOR Sequence) (35 bytes)
58 20 71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 
19 52 81 75 4c 5e bc af 30 1e 13
]]></artwork></figure>

<t>From data_2 and message_1, compute the input to the transcript hash TH_2 = H( message_1, data_2 ), as a CBOR Sequence of these 2 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_2 (CBOR Sequence) (72 bytes)
01 00 58 20 89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 
ec 07 6b ba 02 59 d9 04 b7 ec 8b 0c 40 58 20 71 a3 d5 99 c2 1d a1 89 02 
a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 19 52 81 75 4c 5e bc af 30 1e 13 
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_2 = SHA-256( message_1, data_2 )</t>

<figure><artwork><![CDATA[
TH_2 (32 bytes)
b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 b9 ca fb 60 
9d e4 f6 a1 76 0d 6c f7
]]></artwork></figure>

<t>The Responder’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Responders's subject name (text string)
""
]]></artwork></figure>

<t>And because ‘x5t’ has value certificate are used, ID_CRED_R is the following:</t>

<t>ID_CRED_x = { 34 : COSE_CertHash }, for x = I or R, and since the SHA-2 256-bit Hash truncated to 64-bits is used (value -15):</t>

<figure><artwork><![CDATA[
ID_CRED_R =
{
  34: [-15, h'FC79990F2431A3F5']
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_R (14 bytes)
a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 f5 
]]></artwork></figure>

<t>CRED_R is the certificate encoded as a byte string:</t>

<figure><artwork><![CDATA[
CRED_R (112 bytes)
58 6e 47 62 4d c9 cd c6 82 4b 2a 4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 
4b f9 03 15 00 ce e6 86 99 79 c2 97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 
5c 50 db 78 97 4c 27 15 79 b0 16 33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 
18 0b 5a 6a f3 1e 80 20 9a 08 5c fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 
0f fb 8e 3f 9a 32 a5 08 59 ec d0 bf cf f2 c2 18
]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_2  (0 bytes)
]]></artwork></figure>

<t>The Plaintext is defined as the empty string:</t>

<figure><artwork><![CDATA[
P_2m (0 bytes)
]]></artwork></figure>

<t>The Enc_structure is defined as follows: [ “Encrypt0”, « ID_CRED_R », « TH_2, CRED_R » ]</t>

<figure><artwork><![CDATA[
A_2m =
[
  "Encrypt0", 
  h'A11822822E48FC79990F2431A3F5', 
  h'5820B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF
  7586E47624DC9CDC6824B2A4C52E95EC9D6B0534B71C2B49E4BF9031500CEE6869979
  C297BB5A8B381E98DB714108415E5C50DB78974C271579B01633A3EF6271BE5C225EB
  28F9CF6180B5A6AF31E80209A085CFBF95F3FDCF9B18B693D6C0E0D0FFB8E3F9A32A5
  0859ECD0BFCFF2C218'
  ]
]]></artwork></figure>

<t>Which encodes to the following byte string to be used as Additional Authenticated Data:</t>

<figure><artwork><![CDATA[
A_2m (CBOR-encoded) (173 bytes)
83 68 45 6e 63 72 79 70 74 30 4e a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 
f5 58 92 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 
47 b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 58 6e 47 62 4d c9 cd c6 82 4b 2a 
4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 4b f9 03 15 00 ce e6 86 99 79 c2 
97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 5c 50 db 78 97 4c 27 15 79 b0 16 
33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 18 0b 5a 6a f3 1e 80 20 9a 08 5c 
fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 0f fb 8e 3f 9a 32 a5 08 59 ec d0 
bf cf f2 c2 18 
]]></artwork></figure>

<t>info for K_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_2m =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7', 
  "K_2m",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2m (CBOR-encoded) (42 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 64 4b 5f 32 6d 10 
]]></artwork></figure>

<t>From these parameters, K_2m is computed. Key K_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_2m (16 bytes)
b7 48 6a 94 a3 6c f6 9e 67 3f c4 57 55 ee 6b 95
]]></artwork></figure>

<t>info for IV_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_2m =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7', 
  " "IV_2m",
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_2m (CBOR-encoded) (43 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 65 49 56 5f 32 6d 0d 
]]></artwork></figure>

<t>From these parameters, IV_2m is computed. IV_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of IV_2m, so 13 bytes.</t>

<figure><artwork><![CDATA[
IV_2m (13 bytes)
c5 b7 17 0e 65 d5 4f 1a e0 5d 10 af 56 
]]></artwork></figure>

<t>Finally, COSE_Encrypt0 is computed from the parameters above.</t>

<t><list style="symbols">
  <t>protected header = CBOR-encoded ID_CRED_R</t>
  <t>external_aad = A_2m</t>
  <t>empty plaintext = P_2m</t>
</list></t>

<figure><artwork><![CDATA[
MAC_2 (8 bytes)
cf 99 99 ae 75 9e c0 d8 
]]></artwork></figure>

<t>To compute the Signature_or_MAC_2, the key is the private authentication key of the Responder and 
the message M_2 to be signed = [ “Signature1”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 », MAC_2 ]</t>

<figure><artwork><![CDATA[
M_2 = 
[
  "Signature1",
  h'A11822822E48FC79990F2431A3F5',
  h'5820B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF
  7586E47624DC9CDC6824B2A4C52E95EC9D6B0534B71C2B49E4BF9031500CEE6869979
  C297BB5A8B381E98DB714108415E5C50DB78974C271579B01633A3EF6271BE5C225EB
  28F9CF6180B5A6AF31E80209A085CFBF95F3FDCF9B18B693D6C0E0D0FFB8E3F9A32A5
  0859ECD0BFCFF2C218', 
  h'CF9999AE759EC0D8'
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
M_2 (184 bytes)
84 6a 53 69 67 6e 61 74 75 72 65 31 4e a1 18 22 82 2e 48 fc 79 99 0f 24 
31 a3 f5 58 92 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 
31 1a 47 b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 58 6e 47 62 4d c9 cd c6 82 
4b 2a 4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 4b f9 03 15 00 ce e6 86 99 
79 c2 97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 5c 50 db 78 97 4c 27 15 79 
b0 16 33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 18 0b 5a 6a f3 1e 80 20 9a 
08 5c fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 0f fb 8e 3f 9a 32 a5 08 59 
ec d0 bf cf f2 c2 18 48 cf 99 99 ae 75 9e c0 d8
]]></artwork></figure>

<t>From there Signature_or_MAC_2 is a signature (since method = 0):</t>

<figure><artwork><![CDATA[
Signature_or_MAC_2 (64 bytes)
45 47 81 ec ef eb b4 83 e6 90 83 9d 57 83 8d fe 24 a8 cf 3f 66 42 8a a0 
16 20 4a 22 61 84 4a f8 4f 98 b8 c6 83 4f 38 7f dd 60 6a 29 41 3a dd e3 
a2 07 74 02 13 74 01 19 6f 6a 50 24 06 6f ac 0e 
]]></artwork></figure>

<t>CIPHERTEXT_2 is the ciphertext resulting from XOR encrypting a plaintext constructed from the following parameters and the key K_2e.</t>

<t><list style="symbols">
  <t>plaintext = CBOR Sequence of the items ID_CRED_R and Singature_or_MAC_2, in this order.</t>
</list></t>

<t>The plaintext is the following:</t>

<figure><artwork><![CDATA[
P_2e (CBOR Sequence) (80 bytes)
a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 f5 58 40 45 47 81 ec ef eb b4 83 
e6 90 83 9d 57 83 8d fe 24 a8 cf 3f 66 42 8a a0 16 20 4a 22 61 84 4a f8 
4f 98 b8 c6 83 4f 38 7f dd 60 6a 29 41 3a dd e3 a2 07 74 02 13 74 01 19 
6f 6a 50 24 06 6f ac 0e 
]]></artwork></figure>

<t>K_2e = HKDF-Expand( PRK, info, length ), where length is the length of the plaintext, so 80.</t>

<figure><artwork><![CDATA[
info for K_2e =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7',
  "K_2e",
  80
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2e (CBOR-encoded) (43 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 64 4b 5f 32 65 18 50
]]></artwork></figure>

<t>From there, K_2e is computed:</t>

<figure><artwork><![CDATA[
K_2e (80 bytes)
38 cd 1a 83 89 6d 43 af 3d e8 39 35 27 42 0d ac 7d 7a 76 96 7e 85 74 58 
26 bb 39 e1 76 21 8d 7e 5f e7 97 60 14 c9 ed ba c0 58 ee 18 cd 57 71 80 
a4 4d de 0b 83 00 fe 8e 09 66 9a 34 d6 3e 3a e6 10 12 26 ab f8 5c eb 28 
05 dc 00 13 d1 78 2a 20
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_2 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_2 (80 bytes)
99 d5 38 01 a7 25 bf d6 a4 e7 1d 04 84 b7 55 ec 38 3d f7 7a 91 6e c0 db 
c0 2b ba 7c 21 a2 00 80 7b 4f 58 5f 72 8b 67 1a d6 78 a4 3a ac d3 3b 78 
eb d5 66 cd 00 4f c6 f1 d4 06 f0 1d 97 04 e7 05 b2 15 52 a9 eb 28 ea 31 
6a b6 50 37 d7 17 86 2e
]]></artwork></figure>

<t>message_2 is the CBOR Sequence of data_2 and CIPHERTEXT_2, in this order:</t>

<figure><artwork><![CDATA[
message_2 =
(
 data_2,
 h'99d53801a725bfd6a4e71d0484b755ec383df77a916ec0dbc02bba7c21a200807b4f
585f728b671ad678a43aacd33b78ebd566cd004fc6f1d406f01d9704e705b21552a9eb
28ea316ab65037d717862e'
) 
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
message_2 (CBOR Sequence) (117 bytes)
58 20 71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 
19 52 81 75 4c 5e bc af 30 1e 13 58 50 99 d5 38 01 a7 25 bf d6 a4 e7 1d 
04 84 b7 55 ec 38 3d f7 7a 91 6e c0 db c0 2b ba 7c 21 a2 00 80 7b 4f 58 
5f 72 8b 67 1a d6 78 a4 3a ac d3 3b 78 eb d5 66 cd 00 4f c6 f1 d4 06 f0 
1d 97 04 e7 05 b2 15 52 a9 eb 28 ea 31 6a b6 50 37 d7 17 86 2e
]]></artwork></figure>

</section>
<section anchor="message3" title="Message_3">

<t>Since corr equals 1, C_R is not omitted from data_3.</t>

<figure><artwork><![CDATA[
SK_I (Initiator's private authentication key) (32 bytes)
2f fc e7 a0 b2 b8 25 d3 97 d0 cb 54 f7 46 e3 da 3f 27 59 6e e0 6b 53 71 
48 1d c0 e0 12 bc 34 d7
]]></artwork></figure>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>PRK_4x3m = HMAC-SHA-256 (PRK_3e2m, G_IY)</t>

<figure><artwork><![CDATA[
PRK_4x3m (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a 
]]></artwork></figure>

<t>data 3 is equal to C_R.</t>

<figure><artwork><![CDATA[
data_3 (CBOR Sequence) (1 bytes)
13 
]]></artwork></figure>

<t>From data_3, CIPHERTEXT_2, and TH_2, compute the input to the transcript hash TH_2 = H(TH_2 , CIPHERTEXT_2, data_3), as a CBOR Sequence of these 3 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_3 (CBOR Sequence) (117 bytes)
58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 b9 ca 
fb 60 9d e4 f6 a1 76 0d 6c f7 58 50 99 d5 38 01 a7 25 bf d6 a4 e7 1d 04 
84 b7 55 ec 38 3d f7 7a 91 6e c0 db c0 2b ba 7c 21 a2 00 80 7b 4f 58 5f 
72 8b 67 1a d6 78 a4 3a ac d3 3b 78 eb d5 66 cd 00 4f c6 f1 d4 06 f0 1d 
97 04 e7 05 b2 15 52 a9 eb 28 ea 31 6a b6 50 37 d7 17 86 2e 13 
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_3 = SHA-256(TH_2 , CIPHERTEXT_2, data_3)</t>

<figure><artwork><![CDATA[
TH_3 (32 bytes)
a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e f6 ee e4 dd 
b3 2e 4a 27 ce 93 58 da 
]]></artwork></figure>

<t>The initiator’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Initiator's subject name (text string)
""
]]></artwork></figure>

<t>And its credential is a certificate identified by its ‘x5t’ hash:</t>

<figure><artwork><![CDATA[
ID_CRED_R =
{
  34: [-15, h'FC79990F2431A3F5']
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_I (14 bytes)
a1 18 22 82 2e 48 5b 78 69 88 43 9e bc f2
]]></artwork></figure>

<t>CRED_I is the certificate encoded as a byte string:</t>

<figure><artwork><![CDATA[
CRED_I (103 bytes)
58 65 fa 34 b2 2a 9c a4 a1 e1 29 24 ea e1 d1 76 60 88 09 84 49 cb 84 8f 
fc 79 5f 88 af c4 9c be 8a fd d1 ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 
95 60 1f 6f 0a 08 52 97 8b d4 3d 28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 
88 37 00 16 b8 96 5b db 20 74 bf f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 
2b 87 ec 3f f2 45 b7 
]]></artwork></figure>

<t>Since no opaque auciliary data is exchanged:</t>

<figure><artwork><![CDATA[
AD_3 (0 bytes)
]]></artwork></figure>

<t>The Plaintext of the COSE_Encrypt is the empty string:</t>

<figure><artwork><![CDATA[
P_3m (0 bytes)
]]></artwork></figure>

<t>The external_aad is the CBOR Sequence od CRED_I and TH_3, in this order:</t>

<figure><artwork><![CDATA[
A_3m (CBOR-encoded) (164 bytes)
83 68 45 6e 63 72 79 70 74 30 4e a1 18 22 82 2e 48 5b 78 69 88 43 9e bc 
f2 58 89 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 
3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 58 65 fa 34 b2 2a 9c a4 a1 e1 29 
24 ea e1 d1 76 60 88 09 84 49 cb 84 8f fc 79 5f 88 af c4 9c be 8a fd d1 
ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 95 60 1f 6f 0a 08 52 97 8b d4 3d 
28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 88 37 00 16 b8 96 5b db 20 74 bf 
f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 2b 87 ec 3f f2 45 b7 
]]></artwork></figure>

<t>Info for K_3m is computed as follows:</t>

<figure><artwork><![CDATA[
info for K_3m =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "K_3m",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3m (CBOR-encoded) (42 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 64 4b 5f 33 6d 10 
]]></artwork></figure>

<t>From these parameters, K_3m is computed. Key K_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_3m (16 bytes)
3d bb f0 d6 01 03 26 e8 27 3f c6 c6 c3 b0 de cd 
]]></artwork></figure>

<t>Nonce IV_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L = 13 bytes.</t>

<t>Info for IV_3m is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3m =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "IV_3m",
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3m (CBOR-encoded) (43 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 65 49 56 5f 33 6d 0d 
]]></artwork></figure>

<t>From these parameters, IV_3m is computed:</t>

<figure><artwork><![CDATA[
IV_3m (13 bytes)
10 b6 f4 41 4a 2c 91 3c cd a1 96 42 e3 
]]></artwork></figure>

<t>MAC_3 is the ciphertext of the COSE_Encrypt0:</t>

<figure><artwork><![CDATA[
MAC_3 (8 bytes)
5e ef b8 85 98 3c 22 d9
]]></artwork></figure>

<t>Since the method = 0, Signature_or_Mac_3 is a signature:</t>

<t><list style="symbols">
  <t>The message M_3 to be signed = [ “Signature1”, « ID_CRED_I », « TH_3, CRED_I », MAC_3 ]</t>
  <t>The signing key is the private authentication key of the Initiator.</t>
</list></t>

<figure><artwork><![CDATA[
M_3 =
[
  "Signature1", 
  h'A11822822E485B786988439EBCF2', 
  h'5820A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358D
  A5865FA34B22A9CA4A1E12924EAE1D1766088098449CB848FFC795F88AFC49CBE8AFD
  D1BA009F21675E8F6C77A4A2C30195601F6F0A0852978BD43D28207D44486502FF7BD
  DA632C788370016B8965BDB2074BFF82E5A20E09BEC21F8406E86442B87EC3FF245
  B7',
  h'5EEFB885983C22D9']
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
M_3 (175 bytes)
84 6a 53 69 67 6e 61 74 75 72 65 31 4e a1 18 22 82 2e 48 5b 78 69 88 43 
9e bc f2 58 89 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 
6d 39 3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 58 65 fa 34 b2 2a 9c a4 a1 
e1 29 24 ea e1 d1 76 60 88 09 84 49 cb 84 8f fc 79 5f 88 af c4 9c be 8a 
fd d1 ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 95 60 1f 6f 0a 08 52 97 8b 
d4 3d 28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 88 37 00 16 b8 96 5b db 20 
74 bf f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 2b 87 ec 3f f2 45 b7 48 5e 
ef b8 85 98 3c 22 d9 
]]></artwork></figure>

<t>From there, the signature can be computed:</t>

<figure><artwork><![CDATA[
Signature_or_MAC_3 (64 bytes)
b3 31 76 33 fa eb c7 f4 24 9c f3 ab 95 96 fd ae 2b eb c8 e7 27 5d 39 9f 
42 00 04 f3 76 7b 88 d6 0f fe 37 dc f3 90 a0 00 d8 5a b0 ad b0 d7 24 e3 
a5 7c 4d fe 24 14 a4 1e 79 78 91 b9 55 35 89 06
]]></artwork></figure>

<t>Finally, the outer COSE_Encrypt0 is computed.</t>

<t>The Plaintext is the following CBOR Sequence: 
plaintext = ( ID_CRED_I , Signature_or_MAC_3 )</t>

<figure><artwork><![CDATA[
P_3ae (CBOR Sequence) (80 bytes)
a1 18 22 82 2e 48 5b 78 69 88 43 9e bc f2 58 40 b3 31 76 33 fa eb c7 f4 
24 9c f3 ab 95 96 fd ae 2b eb c8 e7 27 5d 39 9f 42 00 04 f3 76 7b 88 d6 
0f fe 37 dc f3 90 a0 00 d8 5a b0 ad b0 d7 24 e3 a5 7c 4d fe 24 14 a4 1e 
79 78 91 b9 55 35 89 06 
]]></artwork></figure>

<t>The Associated data A is the following:
Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>

<figure><artwork><![CDATA[
A_3ae (CBOR-encoded) (45 bytes)
83 68 45 6e 63 72 79 70 74 30 40 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 
1e c3 92 bf eb 92 6d 39 3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 
]]></artwork></figure>

<t>Key K_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_3ae = 
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "K_3ae",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3ae (CBOR-encoded) (43 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 65 4b 5f 33 61 65 10 
]]></artwork></figure>

<t>L is the length of K_3ae, so 16 bytes.</t>

<t>From these parameters, K_3ae is computed:</t>

<figure><artwork><![CDATA[
K_3ae (16 bytes)
58 b5 2f 94 5b 30 9d 85 4c a7 36 cd 06 a9 62 95 
]]></artwork></figure>

<t>Nonce IV_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3ae =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "IV_3ae", 
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3ae (CBOR-encoded) (44 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 66 49 56 5f 33 61 65 0d 
]]></artwork></figure>

<t>L is the length of IV_3ae, so 13 bytes.</t>

<t>From these parameters, IV_3ae is computed:</t>

<figure><artwork><![CDATA[
IV_3ae (13 bytes)
cf a9 a5 85 58 10 d6 dc e9 74 3c 3b c3 
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_3 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_3 (88 bytes)
2d 88 ff 86 da 47 48 2c 0d fa 55 9a c8 24 a4 a7 83 d8 70 c9 db a4 78 05 
e8 aa fb ad 69 74 c4 96 46 58 65 03 fa 9b bf 3e 00 01 2c 03 7e af 56 e4 
5e 30 19 20 83 9b 81 3a 53 f6 d4 c5 57 48 0f 6c 79 7d 5b 76 f0 e4 62 f5 
f5 7a 3d b6 d2 b5 0c 32 31 9f 34 0f 4a c5 af 9a 
]]></artwork></figure>

<t>From the parameter above, message_3 is computed, as the CBOR Sequence of the following items: (C_R, CIPHERTEXT_3).</t>

<figure><artwork><![CDATA[
message_3 =
(
  h'13',
  h''
)
]]></artwork></figure>

<t>Which encodes to the following byte string:</t>

<figure><artwork><![CDATA[
message_3 (CBOR Sequence) (91 bytes)
13 58 58 2d 88 ff 86 da 47 48 2c 0d fa 55 9a c8 24 a4 a7 83 d8 70 c9 db 
a4 78 05 e8 aa fb ad 69 74 c4 96 46 58 65 03 fa 9b bf 3e 00 01 2c 03 7e 
af 56 e4 5e 30 19 20 83 9b 81 3a 53 f6 d4 c5 57 48 0f 6c 79 7d 5b 76 f0 
e4 62 f5 f5 7a 3d b6 d2 b5 0c 32 31 9f 34 0f 4a c5 af 9a 
]]></artwork></figure>

</section>
</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Alessandro Bruni, Karthikeyan Bhargavan, Martin Disch, Theis Grønbech Petersen, Dan Harkins, Klaus Hartke, Russ Housley, Alexandros Krontiris, Ilari Liusvaara, Karl Norrman, Salvador Pérez, Eric Rescorla, Michael Richardson, Thorvald Sahl Jørgensen, Jim Schaad, Carsten Schürmann, Ludwig Seitz, Stanislav Smyshlyaev, Valery Smyslov, Rene Struik, Erik Thormarker, and Michel Veillette for reviewing and commenting on intermediate versions of the draft. We are especially indebted to Jim Schaad for his continuous reviewing and implementation of different versions of the draft.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

