<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY I-D.ietf-core-echo-request-tag SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-echo-request-tag.xml">
<!ENTITY I-D.ietf-lake-reqs SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-reqs.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5116 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
<!ENTITY RFC5869 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
<!ENTITY RFC6090 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6090.xml">
<!ENTITY RFC6979 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6979.xml">
<!ENTITY RFC7252 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
<!ENTITY RFC7748 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7748.xml">
<!ENTITY RFC8949 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY RFC7959 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7959.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8376 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8376.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8613 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8613.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY I-D.ietf-6tisch-dtsecurity-zerotouch-join SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-6tisch-dtsecurity-zerotouch-join.xml">
<!ENTITY I-D.ietf-ace-oauth-authz SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oauth-authz.xml">
<!ENTITY I-D.ietf-core-resource-directory SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-resource-directory.xml">
<!ENTITY I-D.ietf-lwig-security-protocol-comparison SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lwig-security-protocol-comparison.xml">
<!ENTITY I-D.ietf-tls-dtls13 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-dtls13.xml">
<!ENTITY I-D.selander-ace-ake-authz SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.selander-ace-ake-authz.xml">
<!ENTITY I-D.palombini-core-oscore-edhoc SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.palombini-core-oscore-edhoc.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7258 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC7296 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-lake-edhoc-03" category="std">

  <front>
    <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>

    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>

    <date year="2020" month="December" day="18"/>

    
    
    

    <abstract>


<t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact, and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys.  EDHOC provides mutual authentication, perfect forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Security at the application layer provides an attractive option for protecting Internet of Things (IoT) deployments, for example where protection needs to work over a variety of underlying protocols. IoT devices may be constrained in various ways, including memory, storage, processing capacity, and energy <xref target="RFC7228"/>. A method for protecting individual messages at the application layer suitable for constrained devices, is provided by CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/>), which builds on the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>. Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> is a method for application-layer protection of the Constrained Application Protocol (CoAP), using COSE.</t>

<t>In order for a communication session to provide forward secrecy, the communicating parties can run an Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol with ephemeral keys, from which shared key material can be derived. This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a lightweight key exchange protocol providing perfect forward secrecy and identity protection. Authentication is based on credentials established out of band, e.g. from a trusted third party, such as an Authorization Server as specified by <xref target="I-D.ietf-ace-oauth-authz"/>. The construction provided by EDHOC can be applied to authenticate raw public keys (RPK) and public key certificates. This version of the protocol is focusing on RPK and certificates by reference which is the initial focus for the LAKE WG (see Section 2.2 of <xref target="I-D.ietf-lake-reqs"/>).</t>

<t>After successful completion of the EDHOC protocol, application keys and other application specific data can be derived using the EDHOC-Exporter interface. A main use case for EDHOC is to establish an OSCORE security context. EDHOC uses COSE for cryptography, CBOR for encoding, and CoAP for transport. By reusing existing libraries, the additional code footprint can be kept very low.</t>

<t>EDHOC is designed for highly constrained settings making it especially suitable for low-power wide area networks <xref target="RFC8376"/> such as Cellular IoT, 6TiSCH, and LoRaWAN. Compared to the DTLS 1.3 handshake <xref target="I-D.ietf-tls-dtls13"/> with ECDH and connection ID, the number of bytes in EDHOC + CoAP can be less than 1/6 when RPK authentication is used, see <xref target="I-D.ietf-lwig-security-protocol-comparison"/>. <xref target="fig-sizes"/> shows two examples of message sizes for EDHOC with different kinds of authentication keys and different COSE header parameters for identification: static Diffie-Hellman keys identified by ‘kid’ <xref target="RFC8152"/>, and X.509 signature certificates identified by a hash value using ‘x5t’ <xref target="I-D.ietf-cose-x509"/>. Further reductions of message sizes are possible, for example by eliding redundant length indications.</t>

<figure title="Example of message sizes in bytes." anchor="fig-sizes"><artwork align="center"><![CDATA[
=================================
                    kid       x5t                     
---------------------------------
message_1            37        37                     
message_2            46       117       
message_3            20        91        
----------------------------------
Total               103       245      
=================================
]]></artwork></figure>

<t>The ECDH exchange and the key derivation follow known protocol constructions such as <xref target="SIGMA"/>, NIST SP-800-56A <xref target="SP-800-56A"/>, and Extract-and-Expand <xref target="RFC5869"/>. CBOR <xref target="RFC8949"/> and COSE <xref target="RFC8152"/> are used to implement these standards. The use of COSE provides crypto agility and enables use of future algorithms and headers designed for constrained IoT.</t>

<t>This document is organized as follows: <xref target="background"/> describes how EDHOC authenticated with digital signatures builds on SIGMA-I, <xref target="overview"/> specifies general properties of EDHOC, including message flow and formatting of the ephemeral public keys, <xref target="key-der"/> specifies the key derivation, <xref target="asym"/> specifies EDHOC with signature key and static Diffie-Hellman key authentication, <xref target="error"/> specifies the EDHOC error message, and <xref target="transfer"/> describes how EDHOC can be transferred in CoAP and used to establish an OSCORE security context.</t>

<section anchor="rationale-for-edhoc" title="Rationale for EDHOC">

<t>Many constrained IoT systems today do not use any security at all, and when they do, they often do not follow best practices. One reason is that many current security protocols are not designed with constrained IoT in mind. Constrained IoT systems often deal with personal information, valuable business data, and actuators interacting with the physical world. Not only do such systems need security and privacy, they often need end-to-end protection with source authentication and perfect forward secrecy. EDHOC and OSCORE <xref target="RFC8613"/> enables security following current best practices to devices and systems where current security protocols are impractical.</t>

<t>EDHOC is optimized for small message sizes and can therefore be sent over a small number of radio frames. The message size of a key exchange protocol may have a large impact on the performance of an IoT deployment, especially in constrained environments. For example, in a network bootstrapping setting a large number of devices turned on in a short period of time may result in large latencies caused by parallel key exchanges. Requirements on network formation time in constrained environments can be translated into key exchange overhead. In network technologies with duty cycle, each additional frame significantly increases the latency even if no other devices are transmitting.</t>

<t>Power consumption for wireless devices is highly dependent on message transmission, listening, and reception. For devices that only send a few bytes occasionally, the battery lifetime may be impacted by a heavy key exchange protocol. A key exchange may need to be executed more than once, e.g. due to a device rebooting or for security reasons such as perfect forward secrecy.</t>

<t>EDHOC is adapted to primitives and protocols designed for the Internet of Things: EDHOC is built on CBOR and COSE which enables small message overhead and efficient parsing in constrained devices. EDHOC is not bound to a particular transport layer, but it is recommended to transport the EDHOC message in CoAP payloads. EDHOC is not bound to a particular communication security protocol but works off-the-shelf with OSCORE <xref target="RFC8613"/> providing the necessary input parameters with required properties. Maximum code complexity (ROM/Flash) is often a constraint in many devices and by reusing already existing libraries, the additional code footprint for EDHOC + OSCORE can be kept very low.</t>

</section>
<section anchor="use-of-edhoc" title="Use of EDHOC">

<t>EDHOC is designed as a lightweight AKE for OSCORE, i.e. to provide authentication and session key establishment for IoT use cases such as those built on CoAP <xref target="RFC7252"/>. CoAP is a specialized web transfer protocol for use with constrained nodes and networks, providing a request/response interaction model between application endpoints. As such, EDHOC is targeting a large variety of use cases involving ‘things’ with embedded microcontrollers, sensors and actuators.</t>

<t>A typical setting is when one of the endpoints is constrained or in a constrained network, and the other endpoint is a node on the Internet (such as a mobile phone) or at the edge of the constrained network (such as a gateway). Thing-to-thing interactions over constrained networks are also relevant since both endpoints would then benefit from the lightweight properties of the protocol. EDHOC could e.g. be run when a device/device(s) connect(s) for the first time, or to establish fresh keys which are not compromised by a later compromise of the long-term keys. (Further security properties are described in <xref target="sec-prop"/>.)</t>

</section>
<section anchor="terminology-and-requirements-language" title="Terminology and Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>Readers are expected to be familiar with the terms and concepts described in CBOR <xref target="RFC8949"/>, CBOR Sequences <xref target="RFC8742"/>, COSE <xref target="RFC8152"/>, and CDDL <xref target="RFC8610"/>. The Concise Data Definition Language (CDDL) is used to express CBOR data structures <xref target="RFC8949"/>. Examples of CBOR and CDDL are provided in <xref target="CBOR"/>.</t>

</section>
</section>
<section anchor="background" title="EDHOC Outline">

<t>EDHOC specifies different authentication methods of the Diffie-Hellman key exchange: digital signatures and static Diffie-Hellman keys. This section outlines the digital signature based method. Further details of protocol elements and other authentication methods are provided in the remainder of this document.</t>

<t>SIGMA (SIGn-and-MAc) is a family of theoretical protocols with a large number of variants <xref target="SIGMA"/>. Like IKEv2 <xref target="RFC7296"/> and (D)TLS 1.3 <xref target="RFC8446"/>, EDHOC authenticated with digital signatures is built on a variant of the SIGMA protocol which provide identity protection of the initiator (SIGMA-I), and like IKEv2 <xref target="RFC7296"/>, EDHOC implements the SIGMA-I variant as MAC-then-Sign. The SIGMA-I protocol using an authenticated encryption algorithm is shown in <xref target="fig-sigma"/>.</t>

<figure title="Authenticated encryption variant of the SIGMA-I protocol." anchor="fig-sigma"><artwork align="center"><![CDATA[
Initiator                                               Responder
   |                          G_X                            |
   +-------------------------------------------------------->|
   |                                                         |
   |  G_Y, AEAD( K_2; ID_CRED_R, Sig(R; CRED_R, G_X, G_Y) )  |
   |<--------------------------------------------------------+
   |                                                         |
   |     AEAD( K_3; ID_CRED_I, Sig(I; CRED_I, G_Y, G_X) )    |
   +-------------------------------------------------------->|
   |                                                         |
]]></artwork></figure>

<t>The parties exchanging messages are called Initiator (I) and Responder (R). They exchange ephemeral public keys, compute the shared secret, and derive symmetric application keys.</t>

<t><list style="symbols">
  <t>G_X and G_Y are the ECDH ephemeral public keys of I and R, respectively.</t>
  <t>CRED_I and CRED_R are the credentials containing the public authentication keys of I and R, respectively.</t>
  <t>ID_CRED_I and ID_CRED_R are data enabling the recipient party to retrieve the credential of I and R, respectively.</t>
  <t>Sig(I; . ) and S(R; . ) denote signatures made with the private authentication key of I and R, respectively.</t>
  <t>AEAD(K; . ) denotes authenticated encryption with additional data using a key K derived from the shared secret.</t>
</list></t>

<t>In order to create a “full-fledged” protocol some additional protocol elements are needed. EDHOC adds:</t>

<t><list style="symbols">
  <t>Explicit connection identifiers C_I, C_R chosen by I and R, respectively, enabling the recipient to find the protocol state.</t>
  <t>Transcript hashes (hashes of message data) TH_2, TH_3, TH_4 used for key derivation and as additional authenticated data.</t>
  <t>Computationally independent keys derived from the ECDH shared secret and used for authenticated encryption of different messages.</t>
  <t>Verification of a common preferred cipher suite:  <list style="symbols">
      <t>The Initiator lists supported cipher suites in order of preference</t>
      <t>The Responder verifies that the selected cipher suite is the first supported cipher suite</t>
    </list></t>
  <t>Method types and error handling.</t>
  <t>Transport of opaque auxiliary data.</t>
</list></t>

<t>EDHOC is designed to encrypt and integrity protect as much information as possible, and all symmetric keys are derived using as much previous information as possible. EDHOC is furthermore designed to be as compact and lightweight as possible, in terms of message sizes, processing, and the ability to reuse already existing CBOR, COSE, and CoAP libraries.</t>

<t>To simplify for implementors, the use of CBOR and COSE in EDHOC is summarized in <xref target="CBORandCOSE"/> and test vectors including CBOR diagnostic notation are given in <xref target="vectors"/>.</t>

</section>
<section anchor="overview" title="Protocol Elements">

<section anchor="general" title="General">

<t>EDHOC consists of three messages (message_1, message_2, message_3) between Initiator and Responder, plus an EDHOC error message. EDHOC messages are CBOR Sequences <xref target="RFC8742"/>, see <xref target="fig-flow"/>. The protocol elements in the figure are introduced in the following sections. Message formatting and processing is specified in <xref target="asym"/> and <xref target="error"/>. An implementation may support only Initiator or only Responder.</t>

<t>Application data is protected using the agreed application algorithms (AEAD, hash) in the selected cipher suite (see <xref target="cs"/>) and the application can make use of the established connection identifiers C_I and C_R (see <xref target="corr"/>). EDHOC may be used with the media type application/edhoc defined in <xref target="iana"/>.</t>

<t>The Initiator can derive symmetric application keys after creating EDHOC message_3, see <xref target="exporter"/>. Application protected data can therefore be sent in parallel with EDHOC message_3, optionally in the same CoAP message <xref target="I-D.palombini-core-oscore-edhoc"/>.</t>

<figure title="EDHOC Message Flow" anchor="fig-flow"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|               METHOD_CORR, SUITES_I, G_X, C_I, AD_1               |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|   C_I, G_Y, C_R, Enc(K_2e; ID_CRED_R, Signature_or_MAC_2, AD_2)   |
|<------------------------------------------------------------------+
|                             message_2                             |
|                                                                   |
|       C_R, AEAD(K_3ae; ID_CRED_I, Signature_or_MAC_3, AD_3)       |
+------------------------------------------------------------------>|
|                             message_3                             |
]]></artwork></figure>

</section>
<section anchor="method-and-correlation" title="Method and Correlation">

<t>The first data item of message_1, METHOD_CORR (see <xref target="asym-msg1-form"/>), is an integer specifying the method and the correlation properties of the transport, which are described in this section.</t>

<section anchor="method" title="Method">

<t>EDHOC supports authentication with signature or static Diffie-Hellman keys, as defined in the four authentication methods: 0, 1, 2, and 3, see <xref target="fig-method-types"/>. (Method 0 corresponds to the case outlined in <xref target="background"/> where both Initiator and Responder authenticate with signature keys.)</t>

<t>An implementation may support only a single method. The Initiator and the Responder need to have agreed on a single method to be used for EDHOC, see <xref target="applicability"/>.</t>

<figure title="Method Types" anchor="fig-method-types"><artwork align="center"><![CDATA[
+-------+-------------------+-------------------+-------------------+
| Value | Initiator         | Responder         | Reference         |
+-------+-------------------+-------------------+-------------------+
|     0 | Signature Key     | Signature Key     | [[this document]] |
|     1 | Signature Key     | Static DH Key     | [[this document]] |
|     2 | Static DH Key     | Signature Key     | [[this document]] |
|     3 | Static DH Key     | Static DH Key     | [[this document]] |
+-------+-------------------+-------------------+-------------------+
]]></artwork></figure>

</section>
<section anchor="ci" title="Connection Identifiers">

<t>EDHOC includes connection identifiers (C_I, C_R) to correlate messages. The connection identifiers C_I and C_R do not have any cryptographic purpose in EDHOC. They contain information facilitating retrieval of the protocol state and may therefore be very short. One byte connection identifiers are realistic in many scenarios as most constrained devices only have a few connections. In cases where a node only has one connection, the identifiers may even be the empty byte string.</t>

<t>The connection identifier MAY be used with an application protocol (e.g. OSCORE) for which EDHOC establishes keys, in which case the connection identifiers SHALL adhere to the requirements for that protocol. Each party choses a connection identifier it desires the other party to use in outgoing messages. (For OSCORE this results in the endpoint selecting its Recipient ID, see Section 3.1 of <xref target="RFC8613"/>).</t>

</section>
<section anchor="transport" title="Transport">

<t>Cryptographically, EDHOC does not put requirements on the lower layers. EDHOC is not bound to a particular transport layer, and can be used in environments without IP. The transport is responsible to handle message loss, reordering, message duplication, fragmentation, and denial of service protection, where necessary.</t>

<t>The Initiator and the Responder need to have agreed on a transport to be used for EDHOC, see <xref target="applicability"/>. It is recommended to transport EDHOC in CoAP payloads, see <xref target="transfer"/>.</t>

</section>
<section anchor="corr" title="Message Correlation">

<t>If the transport provides a mechanism for correlating messages, some of the connection identifiers may be omitted. There are four cases:</t>

<t><list style="symbols">
  <t>corr = 0, the transport does not provide a correlation mechanism.</t>
  <t>corr = 1, the transport provides a correlation mechanism that enables the Responder to correlate message_2 and message_1.</t>
  <t>corr = 2, the transport provides a correlation mechanism that enables the Initiator to correlate message_3 and message_2.</t>
  <t>corr = 3, the transport provides a correlation mechanism that enables both parties to correlate all three messages.</t>
</list></t>

<t>For example, if the key exchange is transported over CoAP, the CoAP Token can be used to correlate messages, see <xref target="coap"/>.</t>

</section>
</section>
<section anchor="auth-key-id" title="Authentication Parameters">

<section anchor="authentication-keys" title="Authentication Keys">

<t>The authentication key MUST be a signature key or static Diffie-Hellman key. The Initiator and the Responder
 MAY use different types of authentication keys, e.g. one uses a signature key and the other uses a static Diffie-Hellman key. When using a signature key, the authentication is provided by a signature. When using a static Diffie-Hellman key the authentication is provided by a Message Authentication Code (MAC) computed from an ephemeral-static ECDH shared secret which enables significant reductions in message sizes. The MAC is implemented with an AEAD algorithm. When using a static Diffie-Hellman keys the Initiator’s and Responder’s private authentication keys are called I and R, respectively, and the public authentication keys are called G_I and G_R, respectively.</t>

<t><list style="symbols">
  <t>Only the Responder SHALL have access to the Responder’s private authentication key.</t>
  <t>Only the Initiator SHALL have access to the Initiator’s private authentication key.</t>
</list></t>

</section>
<section anchor="identities" title="Identities">

<t>EDHOC assumes the existence of mechanisms (certification authority, trusted third party, manual distribution, etc.) for specifying and distributing authentication keys and identities. Policies are set based on the identity of the other party, and parties typically only allow connections from a specific identity or a small restricted set of identities. For example, in the case of a device connecting to a network, the network may only allow connections from devices which authenticate with certificates having a particular range of serial numbers in the subject field and signed by a particular CA. On the other side, the device may only be allowed to connect to a network which authenticate with a particular public key (information of which may be provisioned, e.g., out of band or in the Auxiliary Data, see <xref target="AD"/>).</t>

<t>The EDHOC implementation must be able to receive and enforce information from the application about what is the intended peer endpoint, and in particular whether it is a specific identity or a set of identities.</t>

<t><list style="symbols">
  <t>When a Public Key Infrastructure (PKI) is used, the trust anchor is a Certification Authority (CA) certificate, and the identity is the subject whose unique name (e.g. a domain name, NAI, or EUI) is included in the endpoint’s certificate. Before running EDHOC each party needs at least one CA public key certificate, or just the public key, and a specific identity or set of identities it is allowed to communicate with. Only validated public-key certificates with an allowed subject name, as specified by the application, are to be accepted. EDHOC provides proof that the other party possesses the private authentication key corresponding to the public authentication key in its certificate. The certification path provides proof that the subject of the certificate owns the public key in the certificate.</t>
  <t>When public keys are used but not with a PKI (RPK, self-signed certificate), the trust anchor is the public authentication key of the other party. In this case, the identity is typically directly associated to the public authentication key of the other party. For example, the name of the subject may be a canonical representation of the public key. Alternatively, if identities can be expressed in the form of unique subject names assigned to public keys, then a binding to identity can be achieved by including both public key and associated subject name in the protocol message computation: CRED_I or CRED_R may be a self-signed certificate or COSE_Key containing the public authentication key and the subject name, see <xref target="auth-cred"/>. Before running EDHOC, each endpoint needs a specific public authentication key/unique associated subject name, or a set of public authentication keys/unique associated subject names, which it is allowed to communicate with. EDHOC provides proof that the other party possesses the private authentication key corresponding to the public authentication key.</t>
</list></t>

</section>
<section anchor="auth-cred" title="Authentication Credentials">

<t>The authentication credentials, CRED_I and CRED_R, contain the public authentication key of the Initiator and the Responder, respectively.
The Initiator and the Responder MAY use different types of credentials, e.g. one uses an RPK and the other uses a public key certificate.</t>

<t>The credentials CRED_I and CRED_R are signed or MAC:ed (depending on method) by the Initiator and the Responder, respectively, see <xref target="m3"/> and <xref target="m2"/>.</t>

<t>When the credential is a certificate, CRED_x is an end-entity certificate (i.e. not the certificate chain) encoded as a CBOR bstr.
In X.509 certificates, signature keys typically have key usage “digitalSignature” and Diffie-Hellman keys typically have key usage “keyAgreement”</t>

<t>When the credential is a COSE_Key, CRED_x is a CBOR map only containing specific fields from the COSE_Key:</t>

<t><list style="symbols">
  <t>For COSE_Keys of type OKP the CBOR map SHALL only include the parameters 1 (kty), -1 (crv), and -2 (x-coordinate).</t>
  <t>For COSE_Keys of type EC2 the CBOR map SHALL only include the parameters 1 (kty), -1 (crv), -2 (x-coordinate), and -3 (y-coordinate).</t>
</list></t>

<t>To prevent misbinding attacks in systems where an attacker can register public keys without proving knowledge of the private key, SIGMA <xref target="SIGMA"/> enforces a MAC to be calculated over the “Identity”, which in case of a X.509 certificate would be the ‘subject’ and ‘subjectAltName’ fields. EDHOC follows SIGMA by calculating a MAC over the whole certificate. While SIGMA paper only focuses on the identity, the same principle is true for any information such as policies connected to the public key.</t>

<t>If the parties have agreed on an identity besides the public key, the identity is included in the CBOR map with the label “subject name”, otherwise the subject name is the empty text string.
The parameters SHALL be encoded in decreasing order with int labels first and text string labels last.
An example of CRED_x when the RPK contains an X25519 static Diffie-Hellman key and the parties have agreed on an EUI-64 identity is shown below:</t>

<figure><artwork><![CDATA[
CRED_x = {
  1:  1,
 -1:  4,
 -2:  h'b1a3e89460e88d3a8d54211dc95f0b90
        3ff205eb71912d6db8f4af980d2db83a',
 "subject name" : "42-50-31-FF-EF-37-32-39"
}
]]></artwork></figure>

</section>
<section anchor="id_cred" title="Identification of Credentials">

<t>ID_CRED_I and ID_CRED_R are identifiers of the public authentication keys of the Initiator and the Responder, respectively. 
ID_CRED_I and ID_CRED_R do not have any cryptographic purpose in EDHOC.</t>

<t><list style="symbols">
  <t>ID_CRED_R is intended to facilitate for the Initiator to retrieve the Responder’s public authentication key.</t>
  <t>ID_CRED_I is intended to facilitate for the Responder to retrieve the Initiator’s public authentication key.</t>
</list></t>

<t>The identifiers ID_CRED_I and ID_CRED_R are COSE header_maps, i.e. CBOR maps containing COSE Common Header Parameters, see Section 3.1 of <xref target="RFC8152"/>).
In the following we give some examples of COSE header_maps.</t>

<t>Raw public keys are most optimally stored as COSE_Key objects and identified with a ‘kid’ parameter:</t>

<t><list style="symbols">
  <t>ID_CRED_x = { 4 : kid_x }, where kid_x : bstr, for x = I or R.</t>
</list></t>

<t>Public key certificates can be identified in different ways. Header parameters for identifying X.509 certificates are defined in <xref target="I-D.ietf-cose-x509"/>, for example:</t>

<t><list style="symbols">
  <t>by a hash value with the ‘x5t’ parameter;  <list style="symbols">
      <t>ID_CRED_x = { 34 : COSE_CertHash }, for x = I or R,</t>
    </list></t>
  <t>by a URL with the ‘x5u’ parameter;  <list style="symbols">
      <t>ID_CRED_x = { 35 : uri }, for x = I or R,</t>
    </list></t>
</list></t>

<t>ID_CRED_x MAY contain the actual credential used for authentication, CRED_x.
It is RECOMMENDED that they uniquely identify the public authentication key as the recipient may otherwise have to try several keys.
ID_CRED_I and ID_CRED_R are transported in the ciphertext, see <xref target="m3"/> and <xref target="m2"/>.</t>

<t>When ID_CRED_x does not contain the actual credential it may be very short.
One byte credential identifiers are realistic in many scenarios as most constrained devices only have a few keys. In cases where a node only has one key, the identifier may even be the empty byte string.</t>

</section>
</section>
<section anchor="cs" title="Cipher Suites">

<t>An EDHOC cipher suite consists of an ordered set of COSE code points from the “COSE Algorithms” and “COSE Elliptic Curves” registries:</t>

<t><list style="symbols">
  <t>EDHOC AEAD algorithm</t>
  <t>EDHOC hash algorithm</t>
  <t>EDHOC ECDH curve</t>
  <t>EDHOC signature algorithm</t>
  <t>EDHOC signature algorithm curve</t>
  <t>Application AEAD algorithm</t>
  <t>Application hash algorithm</t>
</list></t>

<t>Each cipher suite is identified with a pre-defined int label.</t>

<t>EDHOC can be used with all algorithms and curves defined for COSE. Implementation can either use one of the pre-defined cipher suites (<xref target="suites-registry"/>) or use any combination of COSE algorithms to define their own private cipher suite. Private cipher suites can be identified with any of the four values -24, -23, -22, -21.</t>

<t>The following cipher suites are for constrained IoT where message overhead is a very important factor:</t>

<figure><artwork><![CDATA[
   0. ( 10, -16, 4, -8, 6, 10, -16 )
      (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519,
       AES-CCM-16-64-128, SHA-256)

   1. ( 30, -16, 4, -8, 6, 10, -16 )
      (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519,
       AES-CCM-16-64-128, SHA-256)

   2. ( 10, -16, 1, -7, 1, 10, -16 )
      (AES-CCM-16-64-128, SHA-256, P-256, ES256, P-256,
       AES-CCM-16-64-128, SHA-256)

   3. ( 30, -16, 1, -7, 1, 10, -16 )
      (AES-CCM-16-128-128, SHA-256, P-256, ES256, P-256,
       AES-CCM-16-64-128, SHA-256)
]]></artwork></figure>

<t>The following cipher suite is for general non-constrained applications. It uses very high performance algorithms that also are widely supported:</t>

<figure><artwork><![CDATA[
   4. ( 1, -16, 4, -7, 1, 1, -16 )
      (A128GCM, SHA-256, X25519, ES256, P-256,
       A128GCM, SHA-256)
]]></artwork></figure>

<t>The following cipher suite is for high security application such as government use and financial applications. It is compatible with the CNSA suite <xref target="CNSA"/>.</t>

<figure><artwork><![CDATA[
   5. ( 3, -43, 2, -35, 2, 3, -43 )
      (A256GCM, SHA-384, P-384, ES384, P-384,
       A256GCM, SHA-384)
]]></artwork></figure>

<t>The different methods use the same cipher suites, but some algorithms are not used in some methods. The EDHOC signature algorithm and the EDHOC signature algorithm curve are not used in methods without signature authentication.</t>

<t>The Initiator needs to have a list of cipher suites it supports in order of preference. The Responder needs to have a list of cipher suites it supports. SUITES_I is a CBOR array containing cipher suites that the Initiator supports. SUITES_I is formatted and processed as detailed in <xref target="asym-msg1-form"/> to secure the cipher suite negotation.</t>

</section>
<section anchor="cose_key" title="Ephemeral Public Keys">

<t>The ECDH ephemeral public keys are formatted as a COSE_Key of type EC2 or OKP according to Sections 13.1 and 13.2 of <xref target="RFC8152"/>, but only the ‘x’ parameter is included G_X and G_Y. For Elliptic Curve Keys of type EC2, compact representation as per <xref target="RFC6090"/> MAY be used also in the COSE_Key. If the COSE implementation requires an ‘y’ parameter, any of the possible values of the y-coordinate can be used, see Appendix C of <xref target="RFC6090"/>. COSE <xref target="RFC8152"/> always use compact output for Elliptic Curve Keys of type EC2.</t>

</section>
<section anchor="AD" title="Auxiliary Data">

<t>In order to reduce round trips and number of messages, and in some cases also streamline processing, certain security applications may be integrated into EDHOC by transporting auxiliary data together with the messages. One example is the transport of third-party authorization information protected outside of EDHOC <xref target="I-D.selander-ace-ake-authz"/>. Another example is the embedding of a certificate enrolment request or a newly issued certificate.</t>

<t>EDHOC allows opaque auxiliary data (AD) to be sent in the EDHOC messages. Unprotected Auxiliary Data (AD_1, AD_2) may be sent in message_1 and message_2, respectively. Protected Auxiliary Data (AD_3) may be sent in message_3.</t>

<t>Since data carried in AD_1 and AD_2 may not be protected, and the content of AD_3 is available to both the Initiator and the Responder, special considerations need to be made such that the availability of the data a) does not violate security and privacy requirements of the service which uses this data, and b) does not violate the security properties of EDHOC.</t>

</section>
<section anchor="communication-of-protocol-features" title="Communication of Protocol Features">

<t>EDHOC allows the communication or negotiation of various protocol features during the execution of the protocol.</t>

<t><list style="symbols">
  <t>The Initiator proposes a cipher suite (see <xref target="cs"/>), and the Responder either accepts or rejects, and may make a counter proposal.</t>
  <t>The Initiator decides on the correlation parameter corr (see <xref target="corr"/>). This is typically given by the transport which the Initiator and the Responder have agreed on beforehand. The Responder either accepts or rejects.</t>
  <t>The Initiator decides on the method parameter, see <xref target="fig-method-types"/>. The Responder either accepts or rejects.</t>
  <t>The Initiator and the Responder decide on the representation of the identifier of their respective credentials, ID_CRED_I and ID_CRED_R. The decision is reflected by the label used in the CBOR map, see for example <xref target="id_cred"/>.</t>
</list></t>

<t>Editor’s note: This section needs to be aligned with <xref target="applicability"/>.</t>

</section>
</section>
<section anchor="key-der" title="Key Derivation">

<t>EDHOC uses Extract-and-Expand <xref target="RFC5869"/> with the EDHOC hash algorithm in the selected cipher suite to derive keys. Extract is used to derive fixed-length uniformly pseudorandom keys (PRK) from ECDH shared secrets. Expand is used to derive additional output keying material (OKM) from the PRKs. The PRKs are derived using Extract.</t>

<figure><artwork><![CDATA[
   PRK = Extract( salt, IKM )
]]></artwork></figure>

<t>If the EDHOC hash algorithm is SHA-2, then Extract( salt, IKM ) = HKDF-Extract( salt, IKM ) <xref target="RFC5869"/>. If the EDHOC hash algorithm is SHAKE128, then Extract( salt, IKM ) = KMAC128( salt, IKM, 256, “” ). If the EDHOC hash algorithm is SHAKE256, then Extract( salt, IKM ) = KMAC256( salt, IKM, 512, “” ).</t>

<t>PRK_2e is used to derive key and IV to encrypt message_2. PRK_3e2m is used to derive keys and IVs produce a MAC in message_2 and to encrypt message_3. PRK_4x3m is used to derive keys and IVs produce a MAC in message_3 and to derive application specific data.</t>

<t>PRK_2e is derived with the following input:</t>

<t><list style="symbols">
  <t>The salt SHALL be the empty byte string. Note that <xref target="RFC5869"/> specifies that if the salt is not provided, it is set to a string of zeros (see Section 2.2 of <xref target="RFC5869"/>). For implementation purposes, not providing the salt is the same as setting the salt to the empty byte string.</t>
  <t>The input keying material (IKM) SHALL be the ECDH shared secret G_XY (calculated from G_X and Y or G_Y and X) as defined in Section 12.4.1 of <xref target="RFC8152"/>.</t>
</list></t>

<t>Example: Assuming the use of SHA-256 the extract phase of HKDF produces PRK_2e as follows:</t>

<figure><artwork><![CDATA[
   PRK_2e = HMAC-SHA-256( salt, G_XY )
]]></artwork></figure>

<t>where salt = 0x (the empty byte string).</t>

<t>The pseudorandom keys PRK_3e2m and PRK_4x3m are defined as follow:</t>

<t><list style="symbols">
  <t>If the Responder authenticates with a static Diffie-Hellman key, then PRK_3e2m = Extract( PRK_2e, G_RX ), where G_RX is the ECDH shared secret calculated from G_R and X, or G_X and R, else PRK_3e2m = PRK_2e.</t>
  <t>If the Initiator authenticates with a static Diffie-Hellman key, then PRK_4x3m = Extract( PRK_3e2m, G_IY ), where G_IY is the ECDH shared secret calculated from G_I and Y, or G_Y and I, else PRK_4x3m = PRK_3e2m.</t>
</list></t>

<t>Example: Assuming the use of curve25519, the ECDH shared secrets G_XY, G_RX, and G_IY are the outputs of the X25519 function <xref target="RFC7748"/>:</t>

<figure><artwork><![CDATA[
   G_XY = X25519( Y, G_X ) = X25519( X, G_Y )
]]></artwork></figure>

<t>The keys and IVs used in EDHOC are derived from PRK using Expand <xref target="RFC5869"/> where the EDHOC-KDF is instantiated with the EDHOC AEAD algorithm in the selected cipher suite.</t>

<figure><artwork><![CDATA[
   OKM = EDHOC-KDF( PRK, transcript_hash, label, length )
       = Expand( PRK, info, length )
]]></artwork></figure>

<t>where info is the CBOR encoding of</t>

<figure><artwork><![CDATA[
info = [
   edhoc_aead_id : int / tstr,
   transcript_hash : bstr,
   label : tstr,
   length : uint
]
]]></artwork></figure>

<t>where</t>

<t><list style="symbols">
  <t>edhoc_aead_id is an int or tstr containing the algorithm identifier of the EDHOC AEAD algorithm in the selected cipher suite encoded as defined in <xref target="RFC8152"/>. Note that a single fixed edhoc_aead_id is used in all invocations of EDHOC-KDF, including the derivation of K_2e and invocations of the EDHOC-Exporter.</t>
  <t>transcript_hash is a bstr set to one of the transcript hashes TH_2, TH_3, or TH_4 as defined in Sections <xref target="asym-msg2-form" format="counter"/>, <xref target="asym-msg3-form" format="counter"/>, and <xref target="exporter" format="counter"/>.</t>
  <t>label is a tstr set to the name of the derived key or IV, i.e. “K_2m”, “IV_2m”, “K_2e”, “IV_2e”, “K_3m”, “IV_3m”, “K_3ae”, or “IV_3ae”.</t>
  <t>length is the length of output keying material (OKM) in bytes</t>
</list></t>

<t>If the EDHOC hash algorithm is SHA-2, then Expand( PRK, info, length ) = HKDF-Expand( PRK, info, length ) <xref target="RFC5869"/>. If the EDHOC hash algorithm is SHAKE128, then Expand( PRK, info, length ) = KMAC128( PRK, info, L, “” ). If the EDHOC hash algorithm is SHAKE256, then Expand( PRK, info, length ) = KMAC256( PRK, info, L, “” ).</t>

<t>K_2e and IV_2e are derived using the transcript hash TH_2 and the pseudorandom key PRK_2e. K_2m and IV_2m are derived using the transcript hash TH_2 and the pseudorandom key PRK_3e2m. K_3ae and IV_3ae are derived using the transcript hash TH_3 and the pseudorandom key PRK_3e2m. K_3m and IV_3m are derived using the transcript hash TH_3 and the pseudorandom key PRK_4x3m. IVs are only used if the EDHOC AEAD algorithm uses IVs.</t>

<section anchor="exporter" title="EDHOC-Exporter Interface">

<t>Application keys and other application specific data can be derived using the EDHOC-Exporter interface defined as:</t>

<figure><artwork><![CDATA[
   EDHOC-Exporter(label, length)
     = EDHOC-KDF(PRK_4x3m, TH_4, label, length) 
]]></artwork></figure>

<t>where label is a tstr defined by the application and length is a uint defined by the application. The label SHALL be different for each different exporter value. The transcript hash TH_4 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>

<figure><artwork><![CDATA[
   TH_4 = H( TH_3, CIPHERTEXT_3 )
]]></artwork></figure>

<t>where H() is the hash function in the selected cipher suite. Example use of the EDHOC-Exporter is given in Sections <xref target="oscore" format="counter"/>.</t>

<t>To provide forward secrecy in an even more efficient way than re-running EDHOC, EDHOC provides the function EDHOC-Exporter-FS. When EHDOC-Exporter-FS is called the old PRK_4x3m is deleted and the new PRk_4x3m is calculated as a “hash” of the old key using the Extract function as illustrated by the following pseudocode:</t>

<figure><artwork><![CDATA[
   EHDOC-Exporter-FS( nonce ):
      PRK_4x3m = Extract( [ "TH_4", nonce ], PRK_4x3m )
]]></artwork></figure>

</section>
</section>
<section anchor="asym" title="Message Formatting and Processing">

<t>This section specifies formatting of the messages and processing steps. Error messages are specified in <xref target="error"/>.</t>

<t>An EDHOC message is encoded as a sequence of CBOR data (CBOR Sequence, <xref target="RFC8742"/>).
Additional optimizations are made to reduce message overhead.</t>

<t>While EDHOC uses the COSE_Key, COSE_Sign1, and COSE_Encrypt0 structures, only a subset of the parameters is included in the EDHOC messages. The unprotected COSE header in COSE_Sign1, and COSE_Encrypt0 (not included in the EDHOC message) MAY contain parameters (e.g. ‘alg’).</t>

<section anchor="bstr_id" title="Encoding of bstr_identifier">

<t>Byte strings are encoded in CBOR as two or more bytes, whereas integers in the interval -24 to 23 are encoded in CBOR as one byte.</t>

<t>bstr_identifier is a special encoding of byte strings, used throughout the protocol to enable the encoding of the shortest byte strings as integers that only require one byte of CBOR encoding.</t>

<t>The bstr_identifier encoding is defined as follows: Byte strings in the interval h’00’ to h’2f’ are encoded as the corresponding integer minus 24, which are all represented by one byte CBOR ints. Other byte strings are encoded as CBOR byte strings.</t>

<t>For example, the byte string h’59e9’ encoded as a bstr_identifier is equal to h’59e9’, while the byte string h’2a’ is encoded as the integer 18.</t>

<t>The CDDL definition of the bstr_identifier is given below:</t>

<figure><artwork type="CDDL"><![CDATA[
bstr_identifier = bstr / int
]]></artwork></figure>

<t>Note that, despite what could be interpreted by the CDDL definition only, bstr_identifier once decoded are always byte strings.</t>

</section>
<section anchor="edhoc-message-1" title="EDHOC Message 1">

<section anchor="asym-msg1-form" title="Formatting of Message 1">

<t>message_1 SHALL be a CBOR Sequence (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_1 = (
  METHOD_CORR : int,
  SUITES_I : [ selected : suite, supported : 2* suite ] / suite,
  G_X : bstr,
  C_I : bstr_identifier,  
  ? AD_1 : bstr,
)

suite = int
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>METHOD_CORR = 4 * method + corr, where method = 0, 1, 2, or 3 (see <xref target="fig-method-types"/>) and the correlation parameter corr is chosen based on the transport and determines which connection identifiers that are omitted (see <xref target="corr"/>).</t>
  <t>SUITES_I - cipher suites which the Initiator supports in order of (decreasing) preference. The list of supported cipher suites can be truncated at the end, as is detailed in the processing steps below. One of the supported cipher suites is selected. The selected suite is the first suite in the SUITES_I CBOR array. If a single supported cipher suite is conveyed then that cipher suite is selected and the selected cipher suite is encoded as an int instead of an array.</t>
  <t>G_X - the ephemeral public key of the Initiator</t>
  <t>C_I - variable length connection identifier, encoded as a bstr_identifier (see <xref target="bstr_id"/>).</t>
  <t>AD_1 - bstr containing unprotected opaque auxiliary data</t>
</list></t>

</section>
<section anchor="init-proc-msg1" title="Initiator Processing of Message 1">

<t>The Initiator SHALL compose message_1 as follows:</t>

<t><list style="symbols">
  <t>The supported cipher suites and the order of preference MUST NOT be changed based on previous error messages. However, the list SUITES_I sent to the Responder MAY be truncated such that cipher suites which are the least preferred are omitted. The amount of truncation MAY be changed between sessions, e.g. based on previous error messages (see next bullet), but all cipher suites which are more preferred than the least preferred cipher suite in the list MUST be included in the list.</t>
  <t>Determine the cipher suite to use with the Responder in message_1. If the Initiator previously received from the Responder an error message to a message_1 with diagnostic payload identifying a cipher suite that the Initiator supports, then the Initiator SHALL use that cipher suite. Otherwise the first supported (i.e. the most preferred) cipher suite in SUITES_I MUST be used.</t>
  <t>Generate an ephemeral ECDH key pair as specified in Section 5 of <xref target="SP-800-56A"/> using the curve in the selected cipher suite and format it as a COSE_Key. Let G_X be the ‘x’ parameter of the COSE_Key.</t>
  <t>Choose a connection identifier C_I and store it for the length of the protocol.</t>
  <t>Encode message_1 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg1-form"/></t>
</list></t>

</section>
<section anchor="resp-proc-msg1" title="Responder Processing of Message 1">

<t>The Responder SHALL process message_1 as follows:</t>

<t><list style="symbols">
  <t>Decode message_1 (see <xref target="CBOR"/>).</t>
  <t>Verify that the selected cipher suite is supported and that no prior cipher suite in SUITES_I is supported.</t>
  <t>Pass AD_1 to the security application.</t>
</list></t>

<t>If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued. If the Responder does not support the selected cipher suite, then SUITES_R MUST include one or more supported cipher suites. If the Responder does not support the selected cipher suite, but supports another cipher suite in SUITES_I, then SUITES_R MUST include the first supported cipher suite in SUITES_I.</t>

</section>
</section>
<section anchor="m2" title="EDHOC Message 2">

<section anchor="asym-msg2-form" title="Formatting of Message 2">

<t>message_2 and data_2 SHALL be CBOR Sequences (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_2 = (
  data_2,
  CIPHERTEXT_2 : bstr,
)
]]></artwork></figure>

<figure><artwork type="CDDL"><![CDATA[
data_2 = (
  ? C_I : bstr_identifier,
  G_Y : bstr,
  C_R : bstr_identifier,
)
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>G_Y - the ephemeral public key of the Responder</t>
  <t>C_R - variable length connection identifier, encoded as a bstr_identifier (see <xref target="bstr_id"/>).</t>
</list></t>

</section>
<section anchor="asym-msg2-proc" title="Responder Processing of Message 2">

<t>The Responder SHALL compose message_2 as follows:</t>

<t><list style="symbols">
  <t>If corr (METHOD_CORR mod 4) equals 1 or 3, C_I is omitted, otherwise C_I is not omitted.</t>
  <t>Generate an ephemeral ECDH key pair as specified in Section 5 of <xref target="SP-800-56A"/> using the curve in the selected cipher suite and format it as a COSE_Key. Let G_Y be the ‘x’ parameter of the COSE_Key.</t>
  <t>Choose a connection identifier C_R and store it for the length of the protocol.</t>
  <t>Compute the transcript hash TH_2 = H(message_1, data_2) where H() is the hash function in the selected cipher suite. The transcript hash TH_2 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>
  <t>Compute an inner COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_2m, IV_2m, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_R »      <list style="symbols">
          <t>ID_CRED_R - identifier to facilitate retrieval of CRED_R, see <xref target="id_cred"/></t>
        </list></t>
      <t>external_aad = « TH_2, CRED_R, ? AD_2 »      <list style="symbols">
          <t>CRED_R - bstr containing the credential of the Responder, see <xref target="id_cred"/>.</t>
          <t>AD_2 = bstr containing opaque unprotected auxiliary data</t>
        </list></t>
      <t>plaintext = h’’</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_3e2m, TH_2, “K_2m”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_3e2m, TH_2, “IV_2m”, length )</t>
      <t>Plaintext P = 0x (the empty string)</t>
      <t>Associated data A =      <vspace blankLines='1'/>
[ “Encrypt0”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 » ]</t>
    </list>
MAC_2 is the ‘ciphertext’ of the inner COSE_Encrypt0.</t>
  <t>If the Responder authenticates with a static Diffie-Hellman key (method equals 1 or 3), then Signature_or_MAC_2 is MAC_2. If the Responder authenticates with a signature key (method equals 0 or 2), then Signature_or_MAC_2 is the ‘signature’ of a COSE_Sign1 object as defined in Section 4.4 of <xref target="RFC8152"/> using the signature algorithm in the selected cipher suite, the private authentication key of the Responder, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_R »</t>
      <t>external_aad = « TH_2, CRED_R, ? AD_2 »</t>
      <t>payload = MAC_2</t>
    </list>
COSE constructs the input to the Signature Algorithm as:  <list style="symbols">
      <t>The key is the private authentication key of the Responder.</t>
      <t>The message M to be signed =      <vspace blankLines='1'/>
[ “Signature1”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 », MAC_2 ]</t>
    </list></t>
  <t>Compute an outer COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_2e, IV_2e, and the following parameters. The protected header SHALL be empty.  <list style="symbols">
      <t>plaintext = ( ID_CRED_R / bstr_identifier, Signature_or_MAC_2, ? AD_2 )      <list style="symbols">
          <t>Note that if ID_CRED_R contains a single ‘kid’ parameter, i.e., ID_CRED_R = { 4 : kid_R }, only the byte string kid_R is conveyed in the plaintext encoded as a bstr_identifier, see <xref target="id_cred"/> and <xref target="bstr_id"/>.</t>
        </list></t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_2e, TH_2, “K_2e”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_2e, TH_2, “IV_2e”, length )</t>
      <t>Plaintext P = ( ID_CRED_R / bstr_identifier, Signature_or_MAC_2, ? AD_2 )</t>
      <t>Associated data A = [ “Encrypt0”, h’’, TH_2 ]</t>
    </list>
CIPHERTEXT_2 is the ‘ciphertext’ of the outer COSE_Encrypt0 with the tag removed.</t>
  <t>Encode message_2 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg2-form"/>.</t>
</list></t>

</section>
<section anchor="initiator-processing-of-message-2" title="Initiator Processing of Message 2">

<t>The Initiator SHALL process message_2 as follows:</t>

<t><list style="symbols">
  <t>Decode message_2 (see <xref target="CBOR"/>).</t>
  <t>Retrieve the protocol state using the connection identifier C_I and/or other external information such as the CoAP Token and the 5-tuple.</t>
  <t>Decrypt CIPHERTEXT_2 by computing an outer COSE_Encrypt0 as defined in see <xref target="asym-msg2-proc"/> and XORing CIPHERTEXT_2 with the ‘ciphertext’ of the outer COSE_Encrypt0 with the tag removed.</t>
  <t>Verify that the identity of the Responder is an allowed identity for this connection, see <xref target="auth-key-id"/>.</t>
  <t>Verify Signature_or_MAC_2 using the algorithm in the selected cipher suite. The verification process depends on the method, see <xref target="asym-msg2-proc"/>.</t>
  <t>Pass AD_2 to the security application.</t>
</list></t>

<t>If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued.</t>

</section>
</section>
<section anchor="m3" title="EDHOC Message 3">

<section anchor="asym-msg3-form" title="Formatting of Message 3">

<t>message_3 and data_3 SHALL be CBOR Sequences (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
message_3 = (
  data_3,
  CIPHERTEXT_3 : bstr,
)
]]></artwork></figure>

<figure><artwork type="CDDL"><![CDATA[
data_3 = (
  ? C_R : bstr_identifier,
)
]]></artwork></figure>

</section>
<section anchor="asym-msg3-proc" title="Initiator Processing of Message 3">

<t>The Initiator  SHALL compose message_3 as follows:</t>

<t><list style="symbols">
  <t>If corr (METHOD_CORR mod 4) equals 2 or 3, C_R is omitted, otherwise C_R is not omitted.</t>
  <t>Compute the transcript hash TH_3 = H(TH_2 , CIPHERTEXT_2, data_3) where H() is the hash function in the the selected cipher suite. The transcript hash TH_3 is a CBOR encoded bstr and the input to the hash function is a CBOR Sequence.</t>
  <t>Compute an inner COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3m, IV_3m, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_I »      <list style="symbols">
          <t>ID_CRED_I - identifier to facilitate retrieval of CRED_I, see <xref target="id_cred"/></t>
        </list></t>
      <t>external_aad = « TH_3, CRED_I, ? AD_3 »      <list style="symbols">
          <t>CRED_I - bstr containing the credential of the Initiator, see <xref target="id_cred"/>.</t>
          <t>AD_3 = bstr containing opaque protected auxiliary data</t>
        </list></t>
      <t>plaintext = h’’</t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_4x3m, TH_3, “K_3m”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_4x3m, TH_3, “IV_3m”, length )</t>
      <t>Plaintext P = 0x (the empty string)</t>
      <t>Associated data A =      <vspace blankLines='1'/>
[ “Encrypt0”, « ID_CRED_I », « TH_3, CRED_I, ? AD_3 » ]</t>
    </list>
MAC_3 is the ‘ciphertext’ of the inner COSE_Encrypt0.</t>
  <t>If the Initiator authenticates with a static Diffie-Hellman key (method equals 2 or 3), then Signature_or_MAC_3 is MAC_3. If the Initiator authenticates with a signature key (method equals 0 or 1), then Signature_or_MAC_3 is the ‘signature’ of a COSE_Sign1 object as defined in Section 4.4 of <xref target="RFC8152"/> using the signature algorithm in the selected cipher suite, the private authentication key of the Initiator, and the following parameters:  <list style="symbols">
      <t>protected =  « ID_CRED_I »</t>
      <t>external_aad = « TH_3, CRED_I, ? AD_3 »</t>
      <t>payload = MAC_3</t>
    </list>
COSE constructs the input to the Signature Algorithm as:  <list style="symbols">
      <t>The key is the private authentication key of the Initiator.</t>
      <t>The message M to be signed =      <vspace blankLines='1'/>
[ “Signature1”, « ID_CRED_I », « TH_3, CRED_I, ? AD_3 », MAC_3 ]</t>
    </list></t>
  <t>Compute an outer COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3ae, IV_3ae, and the following parameters. The protected header SHALL be empty.  <list style="symbols">
      <t>external_aad = TH_3</t>
      <t>plaintext = ( ID_CRED_I / bstr_identifier, Signature_or_MAC_3, ? AD_3 )      <list style="symbols">
          <t>Note that if ID_CRED_I contains a single ‘kid’ parameter, i.e., ID_CRED_I = { 4 : kid_I }, only the byte string kid_I is conveyed in the plaintext encoded as a bstr_identifier, see <xref target="id_cred"/> and <xref target="bstr_id"/>.</t>
        </list></t>
    </list>
COSE constructs the input to the AEAD <xref target="RFC5116"/> as follows:  <list style="symbols">
      <t>Key K = EDHOC-KDF( PRK_3e2m, TH_3, “K_3ae”, length )</t>
      <t>Nonce N = EDHOC-KDF( PRK_3e2m, TH_3, “IV_3ae”, length )</t>
      <t>Plaintext P = ( ID_CRED_I / bstr_identifier, Signature_or_MAC_3, ? AD_3 )</t>
      <t>Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>
    </list>
CIPHERTEXT_3 is the ‘ciphertext’ of the outer COSE_Encrypt0.</t>
  <t>Encode message_3 as a sequence of CBOR encoded data items as specified in <xref target="asym-msg3-form"/>.</t>
</list></t>

<t>Pass the connection identifiers (C_I, C_R) and the application algorithms in the selected cipher suite to the application. The application can now derive application keys using the EDHOC-Exporter interface.</t>

<t>After sending message_3, the Initiator is assured that no other party than the Responder can compute the key PRK_4x3m (implicit key authentication). The Initiator does however not know that the Responder has actually computed the key PRK_4x3m. While the Initiator can securely send protected application data, the Initiator SHOULD NOT store the keying material PRK_4x3m and TH_4 until the Initiator is assured that the Responder has actually computed the key PRK_4x3m (explicit key confirmation). Explicit key confirmation is e.g. assured when the Initiator has verified an OSCORE message from the Responder.</t>

</section>
<section anchor="responder-processing-of-message-3" title="Responder Processing of Message 3">

<t>The Responder SHALL process message_3 as follows:</t>

<t><list style="symbols">
  <t>Decode message_3 (see <xref target="CBOR"/>).</t>
  <t>Retrieve the protocol state using the connection identifier C_R and/or other external information such as the CoAP Token and the 5-tuple.</t>
  <t>Decrypt and verify the outer COSE_Encrypt0 as defined in Section 5.3 of <xref target="RFC8152"/>, with the EDHOC AEAD algorithm in the selected cipher suite, K_3ae, and IV_3ae.</t>
  <t>Verify that the identity of the Initiator is an allowed identity for this connection, see <xref target="auth-key-id"/>.</t>
  <t>Verify Signature_or_MAC_3 using the algorithm in the selected cipher suite. The verification process depends on the method, see <xref target="asym-msg3-proc"/>.</t>
  <t>Pass AD_3, the connection identifiers (C_I, C_R), and the application algorithms in the selected cipher suite to the security application. The application can now derive application keys using the EDHOC-Exporter interface.</t>
</list></t>

<t>If any verification step fails, the Responder MUST send an EDHOC error message back, formatted as defined in <xref target="error"/>, and the protocol MUST be discontinued.</t>

<t>After verifying message_3, the Responder is assured that the Initiator has calculated the key PRK_4x3m (explicit key confirmation) and that no other party than the Responder can compute the key. The Responder can securely send protected application data and store the keying material PRK_4x3m and TH_4.</t>

</section>
</section>
</section>
<section anchor="error" title="Error Handling">

<section anchor="edhoc-error-message" title="EDHOC Error Message">

<t>This section defines a message format for the EDHOC error message, used during the protocol. An EDHOC error message can be sent by both parties as a reply to any non-error EDHOC message. After sending an error message, the protocol MUST be discontinued. Errors at the EDHOC layer are sent as normal successful messages in the lower layers (e.g. CoAP POST and 2.04 Changed). An advantage of using such a construction is to avoid issues created by usage of cross protocol proxies (e.g. UDP to TCP).</t>

<t>error SHALL be a CBOR Sequence (see <xref target="CBOR"/>) as defined below</t>

<figure><artwork type="CDDL"><![CDATA[
error = (
  ? C_x : bstr_identifier,
  ERR_MSG : tstr,
  ? SUITES_R : [ supported : 2* suite ] / suite,
)
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>C_x - (optional) variable length connection identifier, encoded as a bstr_identifier (see <xref target="bstr_id"/>). If error is sent by the Responder and corr (METHOD_CORR mod 4) equals 0 or 2 then C_x is set to C_I, else if error is sent by the Initiator and corr (METHOD_CORR mod 4) equals 0 or 1 then C_x is set to C_R, else C_x is omitted.</t>
  <t>ERR_MSG - text string containing the diagnostic payload, defined in the same way as in Section 5.5.2 of <xref target="RFC7252"/>. ERR_MSG MAY be a 0-length text string. This text string is mandatory and characteristic for error messages, which enables the receiver to distinguish between a normal message and an error message of the protocol.</t>
  <t>SUITES_R - (optional) cipher suites from SUITES_I or the EDHOC cipher suites registry that the Responder supports. SUITES_R MUST only be included in replies to message_1. If a single supported cipher suite is conveyed then the supported cipher suite is encoded as an int instead of an array.</t>
</list></t>

<t>After receiving SUITES_R, the Initiator can determine which selected cipher suite to use for the next EDHOC run with the Responder. If the Initiator intends to contact the Responder in the future, the Initiator SHOULD remember which selected cipher suite to use until the next message_1 has been sent, otherwise the Initiator and Responder will likely run into an infinite loop. After a successful run of EDHOC, the Initiator MAY remember the selected cipher suite to use in future EDHOC runs. Note that if the Initiator or Responder is updated with new cipher suite policies, any cached information may be outdated.</t>

<section anchor="example-use-of-edhoc-error-message-with-suitesr" title="Example Use of EDHOC Error Message with SUITES_R">

<t>Assuming that the Initiator supports the five cipher suites 5, 6, 7, 8, and 9 in decreasing order of preference, Figures <xref target="fig-error1" format="counter"/> and <xref target="fig-error2" format="counter"/> show examples of how the Initiator can truncate SUITES_I and how SUITES_R is used by the Responder to give the Initiator information about the cipher suites that the Responder supports.</t>

<t>In <xref target="fig-error1"/>, the Responder supports cipher suite 6 but not the initially selected cipher suite 5.</t>

<figure title="Example use of error message with SUITES_R." anchor="fig-error1"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|            METHOD_CORR, SUITES_I = 5, G_X, C_I, AD_1             |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|                     C_I, ERR_MSG, SUITES_R = 6                    |
|<------------------------------------------------------------------+
|                               error                               |
|                                                                   |
|         METHOD_CORR, SUITES_I = [6, 5, 6], G_X, C_I, AD_1         |
+------------------------------------------------------------------>|
|                             message_1                             |
]]></artwork></figure>

<t>In <xref target="fig-error2"/>, the Responder supports cipher suite 7 and 9 but not the more preferred (by the Initiator) cipher suites 5 and 6. The order of cipher suites in SUITES_R does not matter.</t>

<figure title="Example use of error message with SUITES_R." anchor="fig-error2"><artwork align="center"><![CDATA[
Initiator                                                   Responder
|            METHOD_CORR, SUITES_I = 5, G_X, C_I, AD_1              |
+------------------------------------------------------------------>|
|                             message_1                             |
|                                                                   |
|                  C_I, ERR_MSG, SUITES_R = [9, 7]                  |
|<------------------------------------------------------------------+
|                               error                               |
|                                                                   |
|        METHOD_CORR, SUITES_I = [7, 5, 6, 7], G_X, C_I, AD_1       |
+------------------------------------------------------------------>|
|                             message_1                             |
]]></artwork></figure>

<t>Note that the Initiator’s list of supported cipher suites and order of preference is fixed (see <xref target="asym-msg1-form"/> and <xref target="init-proc-msg1"/>). Furthermore, the Responder shall only accept message_1 if the selected cipher suite is the first cipher suite in SUITES_I that the Responder supports (see <xref target="resp-proc-msg1"/>). Following this procedure ensures that the selected cipher suite is the most preferred (by the Initiator) cipher suite supported by both parties.</t>

<t>If the selected cipher suite is not the first cipher suite which the Responder supports in SUITES_I received in message_1, then Responder MUST discontinue the protocol, see <xref target="resp-proc-msg1"/>. If SUITES_I in message_1 is manipulated then the integrity verification of message_2 containing the transcript hash TH_2 = H( message_1, data_2 ) will fail and the Initiator will discontinue the protocol.</t>

</section>
</section>
</section>
<section anchor="transfer" title="Transferring EDHOC and Deriving an OSCORE Context">

<section anchor="coap" title="Transferring EDHOC in CoAP">

<t>It is recommended to transport EDHOC as an exchange of CoAP <xref target="RFC7252"/> messages. CoAP is a reliable transport that can preserve packet ordering and handle message duplication. CoAP can also perform fragmentation and protect against denial of service attacks. It is recommended to carry the EDHOC messages in Confirmable messages, especially if fragmentation is used.</t>

<t>By default, the CoAP client is the Initiator and the CoAP server is the Responder, but the roles SHOULD be chosen to protect the most sensitive identity, see <xref target="security"/>. By default, EDHOC is transferred in POST requests and 2.04 (Changed) responses to the Uri-Path: “/.well-known/edhoc”, but an application may define its own path that can be discovered e.g. using resource directory <xref target="I-D.ietf-core-resource-directory"/>.</t>

<t>By default, the message flow is as follows: EDHOC message_1 is sent in the payload of a POST request from the client to the server’s resource for EDHOC. EDHOC message_2 or the EDHOC error message is sent from the server to the client in the payload of a 2.04 (Changed) response. EDHOC message_3 or the EDHOC error message is sent from the client to the server’s resource in the payload of a POST request. If needed, an EDHOC error message is sent from the server to the client in the payload of a 2.04 (Changed) response.</t>

<t>An example of a successful EDHOC exchange using CoAP is shown in <xref target="fig-coap1"/>. In this case the CoAP Token enables the Initiator to correlate message_1 and message_2 so the correlation parameter corr = 1.</t>

<figure title="Transferring EDHOC in CoAP when the Initiator is CoAP Client" anchor="fig-coap1"><artwork align="center"><![CDATA[
Client    Server
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_1
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_2
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_3
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | 
  |          |
]]></artwork></figure>

<t>The exchange in <xref target="fig-coap1"/> protects the client identity against active attackers and the server identity against passive attackers. An alternative exchange that protects the server identity against active attackers and the client identity against passive attackers is shown in <xref target="fig-coap2"/>. In this case the CoAP Token enables the Responder to correlate message_2 and message_3 so the correlation parameter corr = 2.</t>

<figure title="Transferring EDHOC in CoAP when the Initiator is CoAP Server" anchor="fig-coap2"><artwork align="center"><![CDATA[
Client    Server
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_1
  |          |
  +--------->| Header: POST (Code=0.02)
  |   POST   | Uri-Path: "/.well-known/edhoc"
  |          | Content-Format: application/edhoc
  |          | Payload: EDHOC message_2
  |          |
  |<---------+ Header: 2.04 Changed
  |   2.04   | Content-Format: application/edhoc
  |          | Payload: EDHOC message_3
  |          |
]]></artwork></figure>

<t>To protect against denial-of-service attacks, the CoAP server MAY respond to the first POST request with a 4.01 (Unauthorized) containing an Echo option <xref target="I-D.ietf-core-echo-request-tag"/>. This forces the initiator to demonstrate its reachability at its apparent network address. If message fragmentation is needed, the EDHOC messages may be fragmented using the CoAP Block-Wise Transfer mechanism <xref target="RFC7959"/>.</t>

<section anchor="oscore" title="Deriving an OSCORE Context from EDHOC">

<t>When EDHOC is used to derive parameters for OSCORE <xref target="RFC8613"/>, the parties  make sure that the EDHOC connection identifiers are unique, i.e. C_R MUST NOT be equal to C_I. The CoAP client and server MUST be able to retrieve the OSCORE protocol state using its chosen connection identifier and optionally other information such as the 5-tuple. In case that the CoAP client is the Initiator and the CoAP server is the Responder:</t>

<t><list style="symbols">
  <t>The client’s OSCORE Sender ID is C_R and the server’s OSCORE Sender ID is C_I, as defined in this document</t>
  <t>The AEAD Algorithm and the hash algorithm are the application AEAD and hash algorithms in the selected cipher suite.</t>
  <t>The Master Secret and Master Salt are derived as follows where length is the key length (in bytes) of the application AEAD Algorithm.</t>
</list></t>

<figure><artwork><![CDATA[
   Master Secret = EDHOC-Exporter( "OSCORE Master Secret", length )
   Master Salt   = EDHOC-Exporter( "OSCORE Master Salt", 8 )
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="security" title="Security Considerations">

<section anchor="sec-prop" title="Security Properties">

<t>EDHOC inherits its security properties from the theoretical SIGMA-I protocol <xref target="SIGMA"/>. Using the terminology from <xref target="SIGMA"/>, EDHOC provides perfect forward secrecy, mutual authentication with aliveness, consistency, peer awareness. As described in <xref target="SIGMA"/>, peer awareness is provided to the Responder, but not to the Initiator.</t>

<t>EDHOC protects the credential identifier of the Initiator against active attacks and the credential identifier of the Responder against passive attacks. The roles should be assigned to protect the most sensitive identity/identifier, typically that which is not possible to infer from routing information in the lower layers.</t>

<t>Compared to <xref target="SIGMA"/>, EDHOC adds an explicit method type and expands the message authentication coverage to additional elements such as algorithms, auxiliary data, and previous messages. This protects against an attacker replaying messages or injecting messages from another session.</t>

<t>EDHOC also adds negotiation of connection identifiers and downgrade protected negotiation of cryptographic parameters, i.e. an attacker cannot affect the negotiated parameters. A single session of EDHOC does not include negotiation of cipher suites, but it enables the Responder to verify that the selected cipher suite is the most preferred cipher suite by the Initiator which is supported by both the Initiator and the Responder.</t>

<t>As required by <xref target="RFC7258"/>, IETF protocols need to mitigate pervasive monitoring when possible. One way to mitigate pervasive monitoring is to use a key exchange that provides perfect forward secrecy. EDHOC therefore only supports methods with perfect forward secrecy. To limit the effect of breaches, it is important to limit the use of symmetrical group keys for bootstrapping. EDHOC therefore strives to make the additional cost of using raw public keys and self-signed certificates as small as possible. Raw public keys and self-signed certificates are not a replacement for a public key infrastructure, but SHOULD be used instead of symmetrical group keys for bootstrapping.</t>

<t>Compromise of the long-term keys (private signature or static DH keys) does not compromise the security of completed EDHOC exchanges. Compromising the private authentication keys of one party lets an active attacker impersonate that compromised party in EDHOC exchanges with other parties, but does not let the attacker impersonate other parties in EDHOC exchanges with the compromised party. Compromise of the long-term keys does not enable a passive attacker to compromise future session keys. Compromise of the HDKF input parameters (ECDH shared secret) leads to compromise of all session keys derived from that compromised shared secret. Compromise of one session key does not compromise other session keys.</t>

<t>If supported by the device, it is RECOMMENDED that at least the long-term private keys is stored in a Trusted Execution Environment (TEE) and that sensitive operations using these keys are performed inside the TEE. To achieve even higher security additional operation such as ephemeral key generation, all computations of shared secrets, and storage of the PRK keys can be done inside the TEE. Optimally, the whole EDHOC protocol can be implemented inside the TEE. Typically an adversary with physical access to a device can be assumed to gain access to all information outside of the TEE, but none of the information inside the TEE.</t>

<t>Key compromise impersonation (KCI): In EDHOC authenticated with signature keys, EDHOC provides KCI protection against an attacker having access to the long term key or the ephemeral secret key. With static Diffie-Hellman key authentication, KCI protection would be provided against an attacker having access to the long-term Diffie-Hellman key, but not to an attacker having access to the ephemeral secret key. Note that the term KCI has typically been used for compromise of long-term keys, and that an attacker with access to the ephemeral secret key can only attack that specific protocol run.</t>

<t>Repudiation: In EDHOC authenticated with signature keys, the Initiator could theoretically prove that the Responder performed a run of the protocol by presenting the private ephemeral key, and vice versa. Note that storing the private ephemeral keys violates the protocol requirements. With static Diffie-Hellman key authentication, both parties can always deny having participated in the protocol.</t>

</section>
<section anchor="cryptographic-considerations" title="Cryptographic Considerations">
<t>The security of the SIGMA protocol requires the MAC to be bound to the identity of the signer. Hence the message authenticating functionality of the authenticated encryption in EDHOC is critical: authenticated encryption MUST NOT be replaced by plain encryption only, even if authentication is provided at another level or through a different mechanism. EDHOC implements SIGMA-I using the same Sign-then-MAC approach as TLS 1.3.</t>

<t>To reduce message overhead EDHOC does not use explicit nonces and instead rely on the ephemeral public keys to provide randomness to each session. A good amount of randomness is important for the key generation, to provide liveness, and to protect against interleaving attacks. For this reason, the ephemeral keys MUST NOT be reused, and both parties SHALL generate fresh random ephemeral key pairs.</t>

<t>The choice of key length used in the different algorithms needs to be harmonized, so that a sufficient security level is maintained for certificates, EDHOC, and the protection of application data. The Initiator and the Responder should enforce a minimum security level.</t>

<t>The data rates in many IoT deployments are very limited. Given that the application keys are protected as well as the long-term authentication keys they can often be used for years or even decades before the cryptographic limits are reached. If the application keys established through EDHOC need to be renewed, the communicating parties can derive application keys with other labels or run EDHOC again.</t>

</section>
<section anchor="cipher-suites" title="Cipher Suites">

<t>Cipher suite number 0 (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519, AES-CCM-16-64-128, SHA-256) is mandatory to implement. Implementations only need to implement the algorithms needed for their supported methods. For many constrained IoT devices it is problematic to support more than one cipher suites, so some deployments with P-256 may not support the mandatory cipher suite. This is not a problem for local deployments.</t>

<t>The HMAC algorithm HMAC 256/64 (HMAC w/ SHA-256 truncated to 64 bits) SHALL NOT be supported for use in EDHOC.</t>

</section>
<section anchor="unprotected-data" title="Unprotected Data">

<t>The Initiator and the Responder must make sure that unprotected data and metadata do not reveal any sensitive information. This also applies for encrypted data sent to an unauthenticated party. In particular, it applies to AD_1, ID_CRED_R, AD_2, and ERR_MSG. Using the same AD_1 in several EDHOC sessions allows passive eavesdroppers to correlate the different sessions. Another consideration is that the list of supported cipher suites may potentially be used to identify the application.</t>

<t>The Initiator and the Responder must also make sure that unauthenticated data does not trigger any harmful actions. In particular, this applies to AD_1 and ERR_MSG.</t>

</section>
<section anchor="denial-of-service" title="Denial-of-Service">

<t>EDHOC itself does not provide countermeasures against Denial-of-Service attacks. By sending a number of new or replayed message_1 an attacker may cause the Responder to allocate state, perform cryptographic operations, and amplify messages. To mitigate such attacks, an implementation SHOULD rely on lower layer mechanisms such as the Echo option in CoAP <xref target="I-D.ietf-core-echo-request-tag"/> that forces the initiator to demonstrate reachability at its apparent network address.</t>

</section>
<section anchor="implementation-considerations" title="Implementation Considerations">

<t>The availability of a secure pseudorandom number generator and truly random seeds are essential for the security of EDHOC. If no true random number generator is available, a truly random seed must be provided from an external source. As each pseudorandom number must only be used once, an implementation need to get a new truly random seed after reboot, or continuously store state in nonvolatile memory, see (<xref target="RFC8613"/>, Appendix B.1.1) for issues and solution approaches for writing to nonvolatile memory. If ECDSA is supported, “deterministic ECDSA” as specified in <xref target="RFC6979"/> is RECOMMENDED.</t>

<t>The referenced processing instructions in <xref target="SP-800-56A"/> must be complied with, including deleting the intermediate computed values along with any ephemeral ECDH secrets after the key derivation is completed. The ECDH shared secret, keys, and IVs MUST be secret. Implementations should provide countermeasures to side-channel attacks such as timing attacks. Depending on the selected curve, the parties should perform various validations of each other’s public keys, see e.g. Section 5 of <xref target="SP-800-56A"/>.</t>

<t>The Initiator and the Responder are responsible for verifying the integrity of certificates. The selection of trusted CAs should be done very carefully and certificate revocation should be supported. The private authentication keys MUST be kept secret.</t>

<t>The Initiator and the Responder are allowed to select the connection identifiers C_I and C_R, respectively, for the other party to use in the ongoing EDHOC protocol as well as in a subsequent application protocol (e.g. OSCORE <xref target="RFC8613"/>). The choice of connection identifier is not security critical in EDHOC but intended to simplify the retrieval of the right security context in combination with using short identifiers. If the wrong connection identifier of the other party is used in a protocol message it will result in the receiving party not being able to retrieve a security context (which will terminate the protocol) or retrieve the wrong security context (which also terminates the protocol as the message cannot be verified).</t>

<t>The Responder MUST finish the verification step of message_3 before passing AD_3 to the application.</t>

<t>If two nodes unintentionally initiate two simultaneous EDHOC message exchanges with each other even if they only want to complete a single EDHOC message exchange, they MAY terminate the exchange with the lexicographically smallest G_X. If the two G_X values are equal, the received message_1 MUST be discarded to mitigate reflection attacks. Note that in the case of two simultaneous EDHOC exchanges where the nodes only complete one and where the nodes have different preferred cipher suites, an attacker can affect which of the two nodes’ preferred cipher suites will be used by blocking the other exchange.</t>

</section>
<section anchor="other-documents-referencing-edhoc" title="Other Documents Referencing EDHOC">

<t>EDHOC has been analyzed in several other documents. A formal verification of EDHOC was done in <xref target="SSR18"/>, an analysis of EDHOC for certificate enrollment was done in <xref target="Kron18"/>, the use of EDHOC in LoRaWAN is analyzed in <xref target="LoRa1"/> and <xref target="LoRa2"/>, the use of EDHOC in IoT bootstrapping is analyzed in <xref target="Perez18"/>, and the use of EDHOC in 6TiSCH is described in <xref target="I-D.ietf-6tisch-dtsecurity-zerotouch-join"/>.</t>

</section>
</section>
<section anchor="iana" title="IANA Considerations">

<section anchor="suites-registry" title="EDHOC Cipher Suites Registry">

<t>IANA has created a new registry titled “EDHOC Cipher Suites” under the new heading “EDHOC”. The registration procedure is “Expert Review”. The columns of the registry are Value, Array, Description, and Reference, where Value is an integer and the other columns are text strings. The initial contents of the registry are:</t>

<figure><artwork><![CDATA[
Value: -24
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: -23
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: -22
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: -21
Algorithms: N/A
Desc: Reserved for Private Use
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 0
Array: 10, 5, 4, -8, 6, 10, 5
Desc: AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 1
Array: 30, 5, 4, -8, 6, 10, 5
Desc: AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 2
Array: 10, 5, 1, -7, 1, 10, 5
Desc: AES-CCM-16-64-128, SHA-256, P-256, ES256, P-256,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 3
Array: 30, 5, 1, -7, 1, 10, 5
Desc: AES-CCM-16-128-128, SHA-256, P-256, ES256, P-256,
      AES-CCM-16-64-128, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 4
Array: 1, -16, 4, -7, 1, 1, -16
Desc: A128GCM, SHA-256, X25519, ES256, P-256,
      A128GCM, SHA-256
Reference: [[this document]]
]]></artwork></figure>

<figure><artwork><![CDATA[
Value: 5
Array: 3, -43, 2, -35, 2, 3, -43 
Desc: A256GCM, SHA-384, P-384, ES384, P-384,
      A256GCM, SHA-384
Reference: [[this document]]
]]></artwork></figure>

</section>
<section anchor="method-types" title="EDHOC Method Type Registry">

<t>IANA has created a new registry titled “EDHOC Method Type” under the new heading “EDHOC”. The registration procedure is “Expert Review”. The columns of the registry are Value, Description, and Reference, where Value is an integer and the other columns are text strings. The initial contents of the registry is shown in <xref target="fig-method-types"/>.</t>

</section>
<section anchor="the-well-known-uri-registry" title="The Well-Known URI Registry">

<t>IANA has added the well-known URI ‘edhoc’ to the Well-Known URIs registry.</t>

<t><list style="symbols">
  <t>URI suffix: edhoc</t>
  <t>Change controller: IETF</t>
  <t>Specification document(s): [[this document]]</t>
  <t>Related information: None</t>
</list></t>

</section>
<section anchor="media-types-registry" title="Media Types Registry">

<t>IANA has added the media type ‘application/edhoc’ to the Media Types registry.</t>

<t><list style="symbols">
  <t>Type name: application</t>
  <t>Subtype name: edhoc</t>
  <t>Required parameters: N/A</t>
  <t>Optional parameters: N/A</t>
  <t>Encoding considerations: binary</t>
  <t>Security considerations: See Section 7 of this document.</t>
  <t>Interoperability considerations: N/A</t>
  <t>Published specification: [[this document]] (this document)</t>
  <t>Applications that use this media type: To be identified</t>
  <t>Fragment identifier considerations: N/A</t>
  <t>Additional information:  <list style="symbols">
      <t>Magic number(s): N/A</t>
      <t>File extension(s): N/A</t>
      <t>Macintosh file type code(s): N/A</t>
    </list></t>
  <t>Person &amp; email address to contact for further information: See “Authors’ Addresses” section.</t>
  <t>Intended usage: COMMON</t>
  <t>Restrictions on usage: N/A</t>
  <t>Author: See “Authors’ Addresses” section.</t>
  <t>Change Controller: IESG</t>
</list></t>

</section>
<section anchor="coap-content-formats-registry" title="CoAP Content-Formats Registry">

<t>IANA has added the media type ‘application/edhoc’ to the CoAP Content-Formats registry.</t>

<t><list style="symbols">
  <t>Media Type: application/edhoc</t>
  <t>Encoding:</t>
  <t>ID: TBD42</t>
  <t>Reference: [[this document]]</t>
</list></t>

</section>
<section anchor="expert-review-instructions" title="Expert Review Instructions">

<t>The IANA Registries established in this document is defined as “Expert Review”. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>

<t>Expert reviewers should take into consideration the following points:</t>

<t><list style="symbols">
  <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Expert needs to make sure the values of algorithms are taken from the right registry, when that’s required. Expert should consider requesting an opinion on the correctness of registered parameters from relevant IETF working groups. Encodings that do not meet these objective of clarity and completeness should not be registered.</t>
  <t>Experts should take into account the expected usage of fields when approving point assignment. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
  <t>Specifications are recommended. When specifications are not provided, the description provided needs to have sufficient information to verify the points above.</t>
</list></t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&I-D.ietf-cose-x509;
&I-D.ietf-core-echo-request-tag;
&I-D.ietf-lake-reqs;
&RFC2119;
&RFC5116;
&RFC5869;
&RFC6090;
&RFC6979;
&RFC7252;
&RFC7748;
&RFC8949;
&RFC7959;
&RFC8152;
&RFC8174;
&RFC8376;
&RFC8610;
&RFC8613;
&RFC8742;


    </references>

    <references title='Informative References'>

<reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
  <front>
    <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
    <author initials="E." surname="Barker">
      <organization></organization>
    </author>
    <author initials="L." surname="Chen">
      <organization></organization>
    </author>
    <author initials="A." surname="Roginsky">
      <organization></organization>
    </author>
    <author initials="A." surname="Vassilev">
      <organization></organization>
    </author>
    <author initials="R." surname="Davis">
      <organization></organization>
    </author>
    <date year="2018" month="April"/>
  </front>
  <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
</reference>
<reference anchor="SIGMA" target="http://webee.technion.ac.il/~hugo/sigma-pdf.pdf">
  <front>
    <title>SIGMA - The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols (Long version)</title>
    <author initials="H." surname="Krawczyk">
      <organization></organization>
    </author>
    <date year="2003" month="June"/>
  </front>
</reference>
<reference anchor="CNSA" target="https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm">
  <front>
    <title>Commercial National Security Algorithm Suite</title>
    <author initials="." surname="(Placeholder)">
      <organization></organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
&I-D.ietf-6tisch-dtsecurity-zerotouch-join;
&I-D.ietf-ace-oauth-authz;
&I-D.ietf-core-resource-directory;
&I-D.ietf-lwig-security-protocol-comparison;
&I-D.ietf-tls-dtls13;
&I-D.selander-ace-ake-authz;
&I-D.palombini-core-oscore-edhoc;
&RFC7228;
&RFC7258;
&RFC7296;
&RFC8446;
<reference anchor="LoRa1" target="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6021899/pdf/sensors-18-01833.pdf">
  <front>
    <title>Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach</title>
    <author initials="R." surname="Sanchez-Iborra">
      <organization></organization>
    </author>
    <author initials="J." surname="Sánchez-Gómez">
      <organization></organization>
    </author>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="P.J." surname="Fernández">
      <organization></organization>
    </author>
    <author initials="J." surname="Santa">
      <organization></organization>
    </author>
    <author initials="J.L." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="A.F." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="LoRa2" target="https://ants.inf.um.es/~josesanta/doc/GIoTS1.pdf">
  <front>
    <title>Internet Access for LoRaWAN Devices Considering Security Issues</title>
    <author initials="R." surname="Sanchez-Iborra">
      <organization></organization>
    </author>
    <author initials="J." surname="Sánchez-Gómez">
      <organization></organization>
    </author>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="P.J." surname="Fernández">
      <organization></organization>
    </author>
    <author initials="J." surname="Santa">
      <organization></organization>
    </author>
    <author initials="J.L." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="A.F." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="Kron18" target="https://www.nada.kth.se/~ann/exjobb/alexandros_krontiris.pdf">
  <front>
    <title>Evaluation of Certificate Enrollment over Application Layer Security</title>
    <author initials="A." surname="Krontiris">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="SSR18" target="https://www.springerprofessional.de/en/formal-verification-of-ephemeral-diffie-hellman-over-cose-edhoc/16284348">
  <front>
    <title>Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <author initials="A." surname="Bruni">
      <organization></organization>
    </author>
    <author initials="T." surname="Sahl Jørgensen">
      <organization></organization>
    </author>
    <author initials="T." surname="Grønbech Petersen">
      <organization></organization>
    </author>
    <author initials="C." surname="Schürmann">
      <organization></organization>
    </author>
    <date year="2018" month="November"/>
  </front>
</reference>
<reference anchor="Perez18" target="http://www.anastacia-h2020.eu/publications/Architecture_of_security_association_establishment_based_on_bootstrapping_technologies_for_enabling_critical_IoT_infrastructures.pdf">
  <front>
    <title>Architecture of security association establishment based on bootstrapping technologies for enabling critical IoT K</title>
    <author initials="S." surname="Pérez">
      <organization></organization>
    </author>
    <author initials="D." surname="Garcia-Carrillo">
      <organization></organization>
    </author>
    <author initials="R." surname="Marín-López">
      <organization></organization>
    </author>
    <author initials="J." surname="Hernández-Ramos">
      <organization></organization>
    </author>
    <author initials="R." surname="Marín-Pérez">
      <organization></organization>
    </author>
    <author initials="A." surname="Skarmeta">
      <organization></organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="CborMe" target="http://cbor.me/">
  <front>
    <title>CBOR Playground</title>
    <author initials="C." surname="Bormann">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>


    </references>


<section anchor="CBORandCOSE" title="Use of CBOR, CDDL and COSE in EDHOC">

<t>This Appendix is intended to simplify for implementors not familiar with CBOR <xref target="RFC8949"/>, CDDL <xref target="RFC8610"/>, COSE <xref target="RFC8152"/>, and HKDF <xref target="RFC5869"/>.</t>

<section anchor="CBOR" title="CBOR and CDDL">

<t>The Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays []  of data items, maps {} of pairs of data items, and sequences <xref target="RFC8742"/> of data items. Some examples are given below. For a complete specification and more examples, see <xref target="RFC8949"/> and <xref target="RFC8610"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>

<figure><artwork align="center"><![CDATA[
Diagnostic          Encoded              Type
------------------------------------------------------------------
1                   0x01                 unsigned integer    
24                  0x1818               unsigned integer
-24                 0x37                 negative integer
-25                 0x3818               negative integer 
null                0xf6                 simple value 
h'12cd'             0x4212cd             byte string
'12cd'              0x4431326364         byte string
"12cd"              0x6431326364         text string
{ 4 : h'cd' }       0xa10441cd           map                 
<< 1, 2, null >>    0x430102f6           byte string
[ 1, 2, null ]      0x830102f6           array      
( 1, 2, null )      0x0102f6             sequence
1, 2, null          0x0102f6             sequence
------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="COSE" title="COSE">

<t>CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/> describes how to create and process signatures, message authentication codes, and encryption using CBOR. COSE builds on JOSE, but is adapted to allow more efficient processing in constrained devices. EDHOC makes use of COSE_Key, COSE_Encrypt0, and COSE_Sign1 objects.</t>

</section>
</section>
<section anchor="vectors" title="Test Vectors">

<t>This appendix provides detailed test vectors to ease implementation and ensure interoperability. In addition to hexadecimal, all CBOR data items and sequences are given in CBOR diagnostic notation. The test vectors use the default mapping to CoAP where the Initiator acts as CoAP client (this means that corr = 1).</t>

<t>A more extensive test vector suite covering more combinations of authentication method used between Initiator and Responder and related code to generate them can be found at https://github.com/lake-wg/edhoc/tree/master/test-vectors .</t>

<section anchor="test-vectors-for-edhoc-authenticated-with-signature-keys-x5t" title="Test Vectors for EDHOC Authenticated with Signature Keys (x5t)">

<t>EDHOC with signature authentication and X.509 certificates is used. In this test vector, the hash value ‘x5t’ is used to identify the certificate.</t>

<figure><artwork><![CDATA[
method (Signature Authentication)
0
]]></artwork></figure>

<t>CoAP is used as transport and the Initiator acts as CoAP client:</t>

<figure><artwork><![CDATA[
corr (the Initiator can correlate message_1 and message_2)
1
]]></artwork></figure>

<t>From there, METHOD_CORR has the following value:</t>

<figure><artwork><![CDATA[
METHOD_CORR (4 * method + corr) (int)
1
]]></artwork></figure>

<t>No unprotected opaque auxiliary data is sent in the message exchanges.</t>

<t>The list of supported cipher suites of the Initiator in order of preference is the following:</t>

<figure><artwork><![CDATA[
Supported Cipher Suites (4 bytes)
00 01 02 03
]]></artwork></figure>

<t>The cipher suite selected by the Initiator is the most preferred:</t>

<figure><artwork><![CDATA[
Selected Cipher Suite (int)
0
]]></artwork></figure>

<t>The mandatory-to-implement cipher suite 0 is supported by both the Initiator and the Responder, see <xref target="cipher-suites"/>.</t>

<section anchor="message1" title="Message_1">

<figure><artwork><![CDATA[
X (Initiator's ephemeral private key) (32 bytes)
8f 78 1a 09 53 72 f8 5b 6d 9f 61 09 ae 42 26 11 73 4d 7d bf a0 06 9a 2d 
f2 93 5b b2 e0 53 bf 35
]]></artwork></figure>

<figure><artwork><![CDATA[
G_X (Initiator's ephemeral public key) (32 bytes)
89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 ec 07 6b ba 
02 59 d9 04 b7 ec 8b 0c
]]></artwork></figure>

<t>The Initiator chooses a connection identifier C_I:</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Initiator (0 bytes)

]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_1 (0 bytes)
]]></artwork></figure>

<t>Since the list of supported cipher suites needs to contain the selected cipher suite, the initiator truncates the list of supported cipher suites to one cipher suite only, 00.</t>

<t>Because one single selected cipher suite is conveyed, it is encoded as an int instead of an array:</t>

<figure><artwork><![CDATA[
SUITES_I (int)
0
]]></artwork></figure>

<t>With SUITES_I = 0, message_1 is constructed, as the CBOR Sequence of the CBOR data items above.</t>

<figure><artwork><![CDATA[
message_1 =
(
  1,
  0,
  h'898ff79a02067a16ea1eccb90fa52246f5aa4dd6ec076bba0259d904b7ec8b0c',
  h''
)
]]></artwork></figure>

<figure><artwork><![CDATA[
message_1 (CBOR Sequence) (37 bytes)
01 00 58 20 89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 
ec 07 6b ba 02 59 d9 04 b7 ec 8b 0c 40 
]]></artwork></figure>

</section>
<section anchor="message2" title="Message_2">

<t>Since METHOD_CORR mod 4 equals 1, C_I is omitted from data_2.</t>

<figure><artwork><![CDATA[
Y (Responder's ephemeral private key) (32 bytes)
fd 8c d8 77 c9 ea 38 6e 6a f3 4f f7 e6 06 c4 b6 4c a8 31 c8 ba 33 13 4f 
d4 cd 71 67 ca ba ec da
]]></artwork></figure>

<figure><artwork><![CDATA[
G_Y (Responder's ephemeral public key) (32 bytes)
71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 19 52 
81 75 4c 5e bc af 30 1e 
]]></artwork></figure>

<t>From G_X and Y or from G_Y and X the ECDH shared secret is computed:</t>

<figure><artwork><![CDATA[
G_XY (ECDH shared secret) (32 bytes)
2b b7 fa 6e 13 5b c3 35 d0 22 d6 34 cb fb 14 b3 f5 82 f3 e2 e3 af b2 b3 
15 04 91 49 5c 61 78 2b 
]]></artwork></figure>

<t>The key and nonce for calculating the ciphertext are calculated as follows, as specified in <xref target="key-der"/>.</t>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>PRK_2e = HMAC-SHA-256(salt, G_XY)</t>

<t>Salt is the empty byte string.</t>

<figure><artwork><![CDATA[
salt (0 bytes)
]]></artwork></figure>

<t>From there, PRK_2e is computed:</t>

<figure><artwork><![CDATA[
PRK_2e (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a
]]></artwork></figure>

<figure><artwork><![CDATA[
SK_R (Responders's private authentication key) (32 bytes)
df 69 27 4d 71 32 96 e2 46 30 63 65 37 2b 46 83 ce d5 38 1b fc ad cd 44 
0a 24 c3 91 d2 fe db 94
]]></artwork></figure>

<t>Since neither the Initiator nor the Responder authenticates with a static Diffie-Hellman key, PRK_3e2m = PRK_2e</t>

<figure><artwork><![CDATA[
PRK_3e2m (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a 
]]></artwork></figure>

<t>The Responder chooses a connection identifier C_R.</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Responder (1 byte)
2b
]]></artwork></figure>

<t>Note that since C_R is a byte string of length one, it is encoded as the corresponding integer subtracted by 24 (see bstr_identifier in <xref target="bstr_id"/>). Thus 0x2b = 43, 43 - 24 = 19, and 19 in CBOR encoding is equal to 0x13.</t>

<figure><artwork><![CDATA[
C_R (1 byte)
13
]]></artwork></figure>

<t>Data_2 is constructed, as the CBOR Sequence of G_Y and C_R.</t>

<figure><artwork><![CDATA[
data_2 =
(
  h'71a3d599c21da18902a1aea810b2b6382ccd8d5f9bf0195281754c5ebcaf301e',
  h'13'
)
]]></artwork></figure>

<figure><artwork><![CDATA[
data_2 (CBOR Sequence) (35 bytes)
58 20 71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 
19 52 81 75 4c 5e bc af 30 1e 13
]]></artwork></figure>

<t>From data_2 and message_1, compute the input to the transcript hash TH_2 = H( message_1, data_2 ), as a CBOR Sequence of these 2 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_2 (CBOR Sequence) (72 bytes)
01 00 58 20 89 8f f7 9a 02 06 7a 16 ea 1e cc b9 0f a5 22 46 f5 aa 4d d6 
ec 07 6b ba 02 59 d9 04 b7 ec 8b 0c 40 58 20 71 a3 d5 99 c2 1d a1 89 02 
a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 19 52 81 75 4c 5e bc af 30 1e 13 
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_2 = SHA-256( message_1, data_2 )</t>

<figure><artwork><![CDATA[
TH_2 (32 bytes)
b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 b9 ca fb 60 
9d e4 f6 a1 76 0d 6c f7
]]></artwork></figure>

<t>The Responder’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Responders's subject name (text string)
""
]]></artwork></figure>

<t>CRED_R is the certificate (X509_R) encoded as a CBOR byte string:</t>

<figure><artwork><![CDATA[
X509_R (110 bytes)
47 62 4d c9 cd c6 82 4b 2a 4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 4b f9
03 15 00 ce e6 86 99 79 c2 97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 5c 50
db 78 97 4c 27 15 79 b0 16 33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 18 0b
5a 6a f3 1e 80 20 9a 08 5c fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 0f fb 
8e 3f 9a 32 a5 08 59 ec d0 bf cf f2 c2 18
]]></artwork></figure>

<figure><artwork><![CDATA[
CRED_R (112 bytes)
58 6e 47 62 4d c9 cd c6 82 4b 2a 4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 
4b f9 03 15 00 ce e6 86 99 79 c2 97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 
5c 50 db 78 97 4c 27 15 79 b0 16 33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 
18 0b 5a 6a f3 1e 80 20 9a 08 5c fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 
0f fb 8e 3f 9a 32 a5 08 59 ec d0 bf cf f2 c2 18
]]></artwork></figure>

<t>And because certificates are identified by a hash value with the ‘x5t’ parameter, ID_CRED_R is the following:</t>

<t>ID_CRED_R = { 34 : COSE_CertHash }. In this example, the hash algorithm used is SHA-2 256-bit with hash truncated to 64-bits (value -15). The hash value is calculated over the certificate X509_R.</t>

<figure><artwork><![CDATA[
ID_CRED_R =
{
  34: [-15, h'FC79990F2431A3F5']
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_R (14 bytes)
a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 f5 
]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_2  (0 bytes)
]]></artwork></figure>

<t>The Plaintext is defined as the empty string:</t>

<figure><artwork><![CDATA[
P_2m (0 bytes)
]]></artwork></figure>

<t>The Enc_structure is defined as follows: [ “Encrypt0”, « ID_CRED_R », « TH_2, CRED_R » ]</t>

<figure><artwork><![CDATA[
A_2m =
[
  "Encrypt0", 
  h'A11822822E48FC79990F2431A3F5', 
  h'5820B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF
  7586E47624DC9CDC6824B2A4C52E95EC9D6B0534B71C2B49E4BF9031500CEE6869979
  C297BB5A8B381E98DB714108415E5C50DB78974C271579B01633A3EF6271BE5C225EB
  28F9CF6180B5A6AF31E80209A085CFBF95F3FDCF9B18B693D6C0E0D0FFB8E3F9A32A5
  0859ECD0BFCFF2C218'
  ]
]]></artwork></figure>

<t>Which encodes to the following byte string to be used as Additional Authenticated Data:</t>

<figure><artwork><![CDATA[
A_2m (CBOR-encoded) (173 bytes)
83 68 45 6e 63 72 79 70 74 30 4e a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 
f5 58 92 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 
47 b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 58 6e 47 62 4d c9 cd c6 82 4b 2a 
4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 4b f9 03 15 00 ce e6 86 99 79 c2 
97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 5c 50 db 78 97 4c 27 15 79 b0 16 
33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 18 0b 5a 6a f3 1e 80 20 9a 08 5c 
fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 0f fb 8e 3f 9a 32 a5 08 59 ec d0 
bf cf f2 c2 18 
]]></artwork></figure>

<t>info for K_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_2m =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7', 
  "K_2m",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2m (CBOR-encoded) (42 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 64 4b 5f 32 6d 10 
]]></artwork></figure>

<t>From these parameters, K_2m is computed. Key K_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_2m (16 bytes)
b7 48 6a 94 a3 6c f6 9e 67 3f c4 57 55 ee 6b 95
]]></artwork></figure>

<t>info for IV_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_2m =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7', 
  "IV_2m",
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_2m (CBOR-encoded) (43 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 65 49 56 5f 32 6d 0d 
]]></artwork></figure>

<t>From these parameters, IV_2m is computed. IV_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of IV_2m, so 13 bytes.</t>

<figure><artwork><![CDATA[
IV_2m (13 bytes)
c5 b7 17 0e 65 d5 4f 1a e0 5d 10 af 56 
]]></artwork></figure>

<t>Finally, COSE_Encrypt0 is computed from the parameters above.</t>

<t><list style="symbols">
  <t>protected header = CBOR-encoded ID_CRED_R</t>
  <t>external_aad = A_2m</t>
  <t>empty plaintext = P_2m</t>
</list></t>

<figure><artwork><![CDATA[
MAC_2 (8 bytes)
cf 99 99 ae 75 9e c0 d8 
]]></artwork></figure>

<t>To compute the Signature_or_MAC_2, the key is the private authentication key of the Responder and 
the message M_2 to be signed = [ “Signature1”, « ID_CRED_R », « TH_2, CRED_R, ? AD_2 », MAC_2 ]</t>

<figure><artwork><![CDATA[
M_2 = 
[
  "Signature1",
  h'A11822822E48FC79990F2431A3F5',
  h'5820B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF
  7586E47624DC9CDC6824B2A4C52E95EC9D6B0534B71C2B49E4BF9031500CEE6869979
  C297BB5A8B381E98DB714108415E5C50DB78974C271579B01633A3EF6271BE5C225EB
  28F9CF6180B5A6AF31E80209A085CFBF95F3FDCF9B18B693D6C0E0D0FFB8E3F9A32A5
  0859ECD0BFCFF2C218', 
  h'CF9999AE759EC0D8'
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
M_2 (184 bytes)
84 6a 53 69 67 6e 61 74 75 72 65 31 4e a1 18 22 82 2e 48 fc 79 99 0f 24 
31 a3 f5 58 92 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 
31 1a 47 b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 58 6e 47 62 4d c9 cd c6 82 
4b 2a 4c 52 e9 5e c9 d6 b0 53 4b 71 c2 b4 9e 4b f9 03 15 00 ce e6 86 99 
79 c2 97 bb 5a 8b 38 1e 98 db 71 41 08 41 5e 5c 50 db 78 97 4c 27 15 79 
b0 16 33 a3 ef 62 71 be 5c 22 5e b2 8f 9c f6 18 0b 5a 6a f3 1e 80 20 9a 
08 5c fb f9 5f 3f dc f9 b1 8b 69 3d 6c 0e 0d 0f fb 8e 3f 9a 32 a5 08 59 
ec d0 bf cf f2 c2 18 48 cf 99 99 ae 75 9e c0 d8
]]></artwork></figure>

<t>From there Signature_or_MAC_2 is a signature (since method = 0):</t>

<figure><artwork><![CDATA[
Signature_or_MAC_2 (64 bytes)
45 47 81 ec ef eb b4 83 e6 90 83 9d 57 83 8d fe 24 a8 cf 3f 66 42 8a a0 
16 20 4a 22 61 84 4a f8 4f 98 b8 c6 83 4f 38 7f dd 60 6a 29 41 3a dd e3 
a2 07 74 02 13 74 01 19 6f 6a 50 24 06 6f ac 0e 
]]></artwork></figure>

<t>CIPHERTEXT_2 is the ciphertext resulting from XOR encrypting a plaintext constructed from the following parameters and the key K_2e.</t>

<t><list style="symbols">
  <t>plaintext = CBOR Sequence of the items ID_CRED_R and Singature_or_MAC_2, in this order.</t>
</list></t>

<t>The plaintext is the following:</t>

<figure><artwork><![CDATA[
P_2e (CBOR Sequence) (80 bytes)
a1 18 22 82 2e 48 fc 79 99 0f 24 31 a3 f5 58 40 45 47 81 ec ef eb b4 83 
e6 90 83 9d 57 83 8d fe 24 a8 cf 3f 66 42 8a a0 16 20 4a 22 61 84 4a f8 
4f 98 b8 c6 83 4f 38 7f dd 60 6a 29 41 3a dd e3 a2 07 74 02 13 74 01 19 
6f 6a 50 24 06 6f ac 0e 
]]></artwork></figure>

<t>K_2e = HKDF-Expand( PRK, info, length ), where length is the length of the plaintext, so 80.</t>

<figure><artwork><![CDATA[
info for K_2e =
[
  10,
  h'B0DC6C1BA0BAE6E2888610FA0B27BFC52E311A47B9CAFB609DE4F6A1760D6CF7',
  "K_2e",
  80
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2e (CBOR-encoded) (43 bytes)
84 0a 58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 
b9 ca fb 60 9d e4 f6 a1 76 0d 6c f7 64 4b 5f 32 65 18 50
]]></artwork></figure>

<t>From there, K_2e is computed:</t>

<figure><artwork><![CDATA[
K_2e (80 bytes)
38 cd 1a 83 89 6d 43 af 3d e8 39 35 27 42 0d ac 7d 7a 76 96 7e 85 74 58 
26 bb 39 e1 76 21 8d 7e 5f e7 97 60 14 c9 ed ba c0 58 ee 18 cd 57 71 80 
a4 4d de 0b 83 00 fe 8e 09 66 9a 34 d6 3e 3a e6 10 12 26 ab f8 5c eb 28 
05 dc 00 13 d1 78 2a 20
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_2 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_2 (80 bytes)
99 d5 38 01 a7 25 bf d6 a4 e7 1d 04 84 b7 55 ec 38 3d f7 7a 91 6e c0 db 
c0 2b ba 7c 21 a2 00 80 7b 4f 58 5f 72 8b 67 1a d6 78 a4 3a ac d3 3b 78 
eb d5 66 cd 00 4f c6 f1 d4 06 f0 1d 97 04 e7 05 b2 15 52 a9 eb 28 ea 31 
6a b6 50 37 d7 17 86 2e
]]></artwork></figure>

<t>message_2 is the CBOR Sequence of data_2 and CIPHERTEXT_2, in this order:</t>

<figure><artwork><![CDATA[
message_2 =
(
 data_2,
 h'99d53801a725bfd6a4e71d0484b755ec383df77a916ec0dbc02bba7c21a200807b4f
585f728b671ad678a43aacd33b78ebd566cd004fc6f1d406f01d9704e705b21552a9eb
28ea316ab65037d717862e'
) 
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
message_2 (CBOR Sequence) (117 bytes)
58 20 71 a3 d5 99 c2 1d a1 89 02 a1 ae a8 10 b2 b6 38 2c cd 8d 5f 9b f0 
19 52 81 75 4c 5e bc af 30 1e 13 58 50 99 d5 38 01 a7 25 bf d6 a4 e7 1d 
04 84 b7 55 ec 38 3d f7 7a 91 6e c0 db c0 2b ba 7c 21 a2 00 80 7b 4f 58 
5f 72 8b 67 1a d6 78 a4 3a ac d3 3b 78 eb d5 66 cd 00 4f c6 f1 d4 06 f0 
1d 97 04 e7 05 b2 15 52 a9 eb 28 ea 31 6a b6 50 37 d7 17 86 2e
]]></artwork></figure>

</section>
<section anchor="message3" title="Message_3">

<t>Since corr equals 1, C_R is not omitted from data_3.</t>

<figure><artwork><![CDATA[
SK_I (Initiator's private authentication key) (32 bytes)
2f fc e7 a0 b2 b8 25 d3 97 d0 cb 54 f7 46 e3 da 3f 27 59 6e e0 6b 53 71 
48 1d c0 e0 12 bc 34 d7
]]></artwork></figure>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>PRK_4x3m = HMAC-SHA-256 (PRK_3e2m, G_IY)</t>

<figure><artwork><![CDATA[
PRK_4x3m (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a 
]]></artwork></figure>

<t>data 3 is equal to C_R.</t>

<figure><artwork><![CDATA[
data_3 (CBOR Sequence) (1 bytes)
13 
]]></artwork></figure>

<t>From data_3, CIPHERTEXT_2, and TH_2, compute the input to the transcript hash TH_3 = H(TH_2 , CIPHERTEXT_2, data_3), as a CBOR Sequence of these 3 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_3 (CBOR Sequence) (117 bytes)
58 20 b0 dc 6c 1b a0 ba e6 e2 88 86 10 fa 0b 27 bf c5 2e 31 1a 47 b9 ca 
fb 60 9d e4 f6 a1 76 0d 6c f7 58 50 99 d5 38 01 a7 25 bf d6 a4 e7 1d 04 
84 b7 55 ec 38 3d f7 7a 91 6e c0 db c0 2b ba 7c 21 a2 00 80 7b 4f 58 5f 
72 8b 67 1a d6 78 a4 3a ac d3 3b 78 eb d5 66 cd 00 4f c6 f1 d4 06 f0 1d 
97 04 e7 05 b2 15 52 a9 eb 28 ea 31 6a b6 50 37 d7 17 86 2e 13 
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_3 = SHA-256(TH_2 , CIPHERTEXT_2, data_3)</t>

<figure><artwork><![CDATA[
TH_3 (32 bytes)
a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e f6 ee e4 dd 
b3 2e 4a 27 ce 93 58 da 
]]></artwork></figure>

<t>The initiator’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Initiator's subject name (text string)
""
]]></artwork></figure>

<t>CRED_I is the certificate (X509_I) encoded as a CBOR byte string:</t>

<figure><artwork><![CDATA[
X509_I (101 bytes)
fa 34 b2 2a 9c a4 a1 e1 29 24 ea e1 d1 76 60 88 09 84 49 cb 84 8f fc 79 
5f 88 af c4 9c be 8a fd d1 ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 95 60 
1f 6f 0a 08 52 97 8b d4 3d 28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 88 37 
00 16 b8 96 5b db 20 74 bf f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 2b 87 
ec 3f f2 45 b7
]]></artwork></figure>

<figure><artwork><![CDATA[
CRED_I (103 bytes)
58 65 fa 34 b2 2a 9c a4 a1 e1 29 24 ea e1 d1 76 60 88 09 84 49 cb 84 8f 
fc 79 5f 88 af c4 9c be 8a fd d1 ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 
95 60 1f 6f 0a 08 52 97 8b d4 3d 28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 
88 37 00 16 b8 96 5b db 20 74 bf f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 
2b 87 ec 3f f2 45 b7 
]]></artwork></figure>

<t>And because certificates are identified by a hash value with the ‘x5t’ parameter, ID_CRED_I is the following:</t>

<t>ID_CRED_I = { 34 : COSE_CertHash }. In this example, the hash algorithm used is SHA-2 256-bit with hash truncated to 64-bits (value -15). The hash value is calculated over the certificate X509_I.</t>

<figure><artwork><![CDATA[
ID_CRED_I =
{
  34: [-15, h'FC79990F2431A3F5']
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_I (14 bytes)
a1 18 22 82 2e 48 5b 78 69 88 43 9e bc f2
]]></artwork></figure>

<t>Since no opaque auxiliary data is exchanged:</t>

<figure><artwork><![CDATA[
AD_3 (0 bytes)
]]></artwork></figure>

<t>The Plaintext of the COSE_Encrypt is the empty string:</t>

<figure><artwork><![CDATA[
P_3m (0 bytes)
]]></artwork></figure>

<t>The external_aad is the CBOR Sequence od CRED_I and TH_3, in this order:</t>

<figure><artwork><![CDATA[
A_3m (CBOR-encoded) (164 bytes)
83 68 45 6e 63 72 79 70 74 30 4e a1 18 22 82 2e 48 5b 78 69 88 43 9e bc 
f2 58 89 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 
3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 58 65 fa 34 b2 2a 9c a4 a1 e1 29 
24 ea e1 d1 76 60 88 09 84 49 cb 84 8f fc 79 5f 88 af c4 9c be 8a fd d1 
ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 95 60 1f 6f 0a 08 52 97 8b d4 3d 
28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 88 37 00 16 b8 96 5b db 20 74 bf 
f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 2b 87 ec 3f f2 45 b7 
]]></artwork></figure>

<t>Info for K_3m is computed as follows:</t>

<figure><artwork><![CDATA[
info for K_3m =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "K_3m",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3m (CBOR-encoded) (42 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 64 4b 5f 33 6d 10 
]]></artwork></figure>

<t>From these parameters, K_3m is computed. Key K_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_3m (16 bytes)
3d bb f0 d6 01 03 26 e8 27 3f c6 c6 c3 b0 de cd 
]]></artwork></figure>

<t>Nonce IV_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L = 13 bytes.</t>

<t>Info for IV_3m is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3m =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "IV_3m",
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3m (CBOR-encoded) (43 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 65 49 56 5f 33 6d 0d 
]]></artwork></figure>

<t>From these parameters, IV_3m is computed:</t>

<figure><artwork><![CDATA[
IV_3m (13 bytes)
10 b6 f4 41 4a 2c 91 3c cd a1 96 42 e3 
]]></artwork></figure>

<t>MAC_3 is the ciphertext of the COSE_Encrypt0:</t>

<figure><artwork><![CDATA[
MAC_3 (8 bytes)
5e ef b8 85 98 3c 22 d9
]]></artwork></figure>

<t>Since the method = 0, Signature_or_Mac_3 is a signature:</t>

<t><list style="symbols">
  <t>The message M_3 to be signed = [ “Signature1”, « ID_CRED_I », « TH_3, CRED_I », MAC_3 ]</t>
  <t>The signing key is the private authentication key of the Initiator.</t>
</list></t>

<figure><artwork><![CDATA[
M_3 =
[
  "Signature1", 
  h'A11822822E485B786988439EBCF2', 
  h'5820A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358D
  A5865FA34B22A9CA4A1E12924EAE1D1766088098449CB848FFC795F88AFC49CBE8AFD
  D1BA009F21675E8F6C77A4A2C30195601F6F0A0852978BD43D28207D44486502FF7BD
  DA632C788370016B8965BDB2074BFF82E5A20E09BEC21F8406E86442B87EC3FF245
  B7',
  h'5EEFB885983C22D9']
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
M_3 (175 bytes)
84 6a 53 69 67 6e 61 74 75 72 65 31 4e a1 18 22 82 2e 48 5b 78 69 88 43 
9e bc f2 58 89 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 
6d 39 3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 58 65 fa 34 b2 2a 9c a4 a1 
e1 29 24 ea e1 d1 76 60 88 09 84 49 cb 84 8f fc 79 5f 88 af c4 9c be 8a 
fd d1 ba 00 9f 21 67 5e 8f 6c 77 a4 a2 c3 01 95 60 1f 6f 0a 08 52 97 8b 
d4 3d 28 20 7d 44 48 65 02 ff 7b dd a6 32 c7 88 37 00 16 b8 96 5b db 20 
74 bf f8 2e 5a 20 e0 9b ec 21 f8 40 6e 86 44 2b 87 ec 3f f2 45 b7 48 5e 
ef b8 85 98 3c 22 d9 
]]></artwork></figure>

<t>From there, the signature can be computed:</t>

<figure><artwork><![CDATA[
Signature_or_MAC_3 (64 bytes)
b3 31 76 33 fa eb c7 f4 24 9c f3 ab 95 96 fd ae 2b eb c8 e7 27 5d 39 9f 
42 00 04 f3 76 7b 88 d6 0f fe 37 dc f3 90 a0 00 d8 5a b0 ad b0 d7 24 e3 
a5 7c 4d fe 24 14 a4 1e 79 78 91 b9 55 35 89 06
]]></artwork></figure>

<t>Finally, the outer COSE_Encrypt0 is computed.</t>

<t>The Plaintext is the following CBOR Sequence: 
plaintext = ( ID_CRED_I , Signature_or_MAC_3 )</t>

<figure><artwork><![CDATA[
P_3ae (CBOR Sequence) (80 bytes)
a1 18 22 82 2e 48 5b 78 69 88 43 9e bc f2 58 40 b3 31 76 33 fa eb c7 f4 
24 9c f3 ab 95 96 fd ae 2b eb c8 e7 27 5d 39 9f 42 00 04 f3 76 7b 88 d6 
0f fe 37 dc f3 90 a0 00 d8 5a b0 ad b0 d7 24 e3 a5 7c 4d fe 24 14 a4 1e 
79 78 91 b9 55 35 89 06 
]]></artwork></figure>

<t>The Associated data A is the following:
Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>

<figure><artwork><![CDATA[
A_3ae (CBOR-encoded) (45 bytes)
83 68 45 6e 63 72 79 70 74 30 40 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 
1e c3 92 bf eb 92 6d 39 3e f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 
]]></artwork></figure>

<t>Key K_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_3ae = 
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "K_3ae",
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3ae (CBOR-encoded) (43 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 65 4b 5f 33 61 65 10 
]]></artwork></figure>

<t>L is the length of K_3ae, so 16 bytes.</t>

<t>From these parameters, K_3ae is computed:</t>

<figure><artwork><![CDATA[
K_3ae (16 bytes)
58 b5 2f 94 5b 30 9d 85 4c a7 36 cd 06 a9 62 95 
]]></artwork></figure>

<t>Nonce IV_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3ae =
[
  10,
  h'A239A627ADA3802DB8DAE51EC392BFEB926D393EF6EEE4DDB32E4A27CE9358DA',
  "IV_3ae", 
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3ae (CBOR-encoded) (44 bytes)
84 0a 58 20 a2 39 a6 27 ad a3 80 2d b8 da e5 1e c3 92 bf eb 92 6d 39 3e 
f6 ee e4 dd b3 2e 4a 27 ce 93 58 da 66 49 56 5f 33 61 65 0d 
]]></artwork></figure>

<t>L is the length of IV_3ae, so 13 bytes.</t>

<t>From these parameters, IV_3ae is computed:</t>

<figure><artwork><![CDATA[
IV_3ae (13 bytes)
cf a9 a5 85 58 10 d6 dc e9 74 3c 3b c3 
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_3 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_3 (88 bytes)
2d 88 ff 86 da 47 48 2c 0d fa 55 9a c8 24 a4 a7 83 d8 70 c9 db a4 78 05 
e8 aa fb ad 69 74 c4 96 46 58 65 03 fa 9b bf 3e 00 01 2c 03 7e af 56 e4 
5e 30 19 20 83 9b 81 3a 53 f6 d4 c5 57 48 0f 6c 79 7d 5b 76 f0 e4 62 f5 
f5 7a 3d b6 d2 b5 0c 32 31 9f 34 0f 4a c5 af 9a 
]]></artwork></figure>

<t>From the parameter above, message_3 is computed, as the CBOR Sequence of the following items: (C_R, CIPHERTEXT_3).</t>

<figure><artwork><![CDATA[
message_3 =
(
  h'13',
  h''
)
]]></artwork></figure>

<t>Which encodes to the following byte string:</t>

<figure><artwork><![CDATA[
message_3 (CBOR Sequence) (91 bytes)
13 58 58 2d 88 ff 86 da 47 48 2c 0d fa 55 9a c8 24 a4 a7 83 d8 70 c9 db 
a4 78 05 e8 aa fb ad 69 74 c4 96 46 58 65 03 fa 9b bf 3e 00 01 2c 03 7e 
af 56 e4 5e 30 19 20 83 9b 81 3a 53 f6 d4 c5 57 48 0f 6c 79 7d 5b 76 f0 
e4 62 f5 f5 7a 3d b6 d2 b5 0c 32 31 9f 34 0f 4a c5 af 9a 
]]></artwork></figure>

</section>
</section>
<section anchor="test-vectors-for-edhoc-authenticated-with-static-diffie-hellman-keys" title="Test Vectors for EDHOC Authenticated with Static Diffie-Hellman Keys">

<t>EDHOC with static Diffie-Hellman keys is used.</t>

<figure><artwork><![CDATA[
method (Static DH Based Authentication)
3
]]></artwork></figure>

<t>CoAP is used as transport and the Initiator acts as CoAP client:</t>

<figure><artwork><![CDATA[
corr (the Initiator can correlate message_1 and message_2)
1
]]></artwork></figure>

<t>From there, METHOD_CORR has the following value:</t>

<figure><artwork><![CDATA[
METHOD_CORR (4 * method + corr) (int)
13
]]></artwork></figure>

<t>No unprotected opaque auxiliary data is sent in the message exchanges.</t>

<t>The list of supported cipher suites of the Initiator in order of preference is the following:</t>

<figure><artwork><![CDATA[
Supported Cipher Suites (4 bytes)
00 01 02 03
]]></artwork></figure>

<t>The cipher suite selected by the Initiator is the most preferred:</t>

<figure><artwork><![CDATA[
Selected Cipher Suite (int)
0
]]></artwork></figure>

<t>The mandatory-to-implement cipher suite 0 is supported by both the Initiator and the Responder, see <xref target="cipher-suites"/>.</t>

<section anchor="dh-ss-m1" title="Message_1">

<figure><artwork><![CDATA[
X (Initiator's ephemeral private key) (32 bytes)
ae 11 a0 db 86 3c 02 27 e5 39 92 fe b8 f5 92 4c 50 d0 a7 ba 6e ea b4 ad 
1f f2 45 72 f4 f5 7c fa
]]></artwork></figure>

<figure><artwork><![CDATA[
G_X (Initiator's ephemeral public key) (32 bytes)
8d 3e f5 6d 1b 75 0a 43 51 d6 8a c2 50 a0 e8 83 79 0e fc 80 a5 38 a4 44 
ee 9e 2b 57 e2 44 1a 7c
]]></artwork></figure>

<t>The Initiator chooses a connection identifier C_I:</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Initiator (1 bytes)
16
]]></artwork></figure>

<t>Note that since C_I is a byte strings of length one, it is encoded as the corresponding integer - 24 (see bstr_identifier in <xref target="bstr_id"/>), i.e. 0x16 = 22, 22 - 24 = -2, and -2 in CBOR encoding is equal to 0x21.</t>

<figure><artwork><![CDATA[
C_I (1 byte)
21
]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_1 (0 bytes)
]]></artwork></figure>

<t>Since the list of supported cipher suites needs to contain the selected cipher suite, the initiator truncates the list of supported cipher suites to one cipher suite only, 00.</t>

<t>Because one single selected cipher suite is conveyed, it is encoded as an int instead of an array:</t>

<figure><artwork><![CDATA[
SUITES_I (int)
0
]]></artwork></figure>

<t>With SUITES_I = 0, message_1 is constructed, as the CBOR Sequence of the CBOR data items above.</t>

<figure><artwork><![CDATA[
message_1 =
(
  13,
  0,
  h'8D3EF56D1B750A4351D68AC250A0E883790EFC80A538A444EE9E2B57E2441A7C',
  -2
)
]]></artwork></figure>

<figure><artwork><![CDATA[
message_1 (CBOR Sequence) (37 bytes)
0d 00 58 20 8d 3e f5 6d 1b 75 0a 43 51 d6 8a c2 50 a0 e8 83 79 0e fc 80 
a5 38 a4 44 ee 9e 2b 57 e2 44 1a 7c 21 
]]></artwork></figure>

</section>
<section anchor="dh-ss-m2" title="Message_2">

<t>Since METHOD_CORR mod 4 equals 1, C_I is omitted from data_2.</t>

<figure><artwork><![CDATA[
Y (Responder's ephemeral private key) (32 bytes)
c6 46 cd dc 58 12 6e 18 10 5f 01 ce 35 05 6e 5e bc 35 f4 d4 cc 51 07 49 
a3 a5 e0 69 c1 16 16 9a
]]></artwork></figure>

<figure><artwork><![CDATA[
G_Y (Responder's ephemeral public key) (32 bytes)
52 fb a0 bd c8 d9 53 dd 86 ce 1a b2 fd 7c 05 a4 65 8c 7c 30 af db fc 33 
01 04 70 69 45 1b af 35 
]]></artwork></figure>

<t>From G_X and Y or from G_Y and X the ECDH shared secret is computed:</t>

<figure><artwork><![CDATA[
G_XY (ECDH shared secret) (32 bytes)
de fc 2f 35 69 10 9b 3d 1f a4 a7 3d c5 e2 fe b9 e1 15 0d 90 c2 5e e2 f0 
66 c2 d8 85 f4 f8 ac 4e
]]></artwork></figure>

<t>The key and nonce for calculating the ciphertext are calculated as follows, as specified in <xref target="key-der"/>.</t>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>PRK_2e = HMAC-SHA-256(salt, G_XY)</t>

<t>Salt is the empty byte string.</t>

<figure><artwork><![CDATA[
salt (0 bytes)
]]></artwork></figure>

<t>From there, PRK_2e is computed:</t>

<figure><artwork><![CDATA[
PRK_2e (32 bytes)
93 9f cb 05 6d 2e 41 4f 1b ec 61 04 61 99 c2 c7 63 d2 7f 0c 3d 15 fa 16 
71 fa 13 4e 0d c5 a0 4d 
]]></artwork></figure>

<t>Since the Responder authenticates with a static Diffie-Hellman key, PRK_3e2m = HKDF-Extract( PRK_2e, G_RX ), where G_RX is the ECDH shared secret calculated from G_R and X, or G_X and R.</t>

<figure><artwork><![CDATA[
R (Responder's private authentication key) (32 bytes)
bb 50 1a ac 67 b9 a9 5f 97 e0 ed ed 6b 82 a6 62 93 4f bb fc 7a d1 b7 4c 
1f ca d6 6a 07 94 22 d0 
]]></artwork></figure>

<figure><artwork><![CDATA[
G_R (Responder's public authentication key) (32 bytes)
a3 ff 26 35 95 be b3 77 d1 a0 ce 1d 04 da d2 d4 09 66 ac 6b cb 62 20 51 
b8 46 59 18 4d 5d 9a 32
]]></artwork></figure>

<t>From the Responder’s authentication key and the Initiator’s ephemeral key (see <xref target="dh-ss-m1"/>), the ECDH shared secret G_RX is calculated.</t>

<figure><artwork><![CDATA[
G_RX (ECDH shared secret) (32 bytes)
21 c7 ef f4 fb 69 fa 4b 67 97 d0 58 84 31 5d 84 11 a3 fd a5 4f 6d ad a6 
1d 4f cd 85 e7 90 66 68
]]></artwork></figure>

<figure><artwork><![CDATA[
PRK_3e2m (32 bytes)
75 07 7c 69 1e 35 01 2d 48 bc 24 c8 4f 2b ab 89 f5 2f ac 03 fe dd 81 3e 
43 8c 93 b1 0b 39 93 07 
]]></artwork></figure>

<t>The Responder chooses a connection identifier C_R.</t>

<figure><artwork><![CDATA[
Connection identifier chosen by Responder (1 byte)
20
]]></artwork></figure>

<t>Note that since C_R is a byte strings of length one, it is encoded as the corresponding integer - 24 (see bstr_identifier in <xref target="bstr_id"/>), i.e. 0x20 = 32, 32 - 24 = 8, and 8 in CBOR encoding is equal to 0x08.</t>

<figure><artwork><![CDATA[
C_R (1 byte)
08
]]></artwork></figure>

<t>Data_2 is constructed, as the CBOR Sequence of G_Y and C_R.</t>

<figure><artwork><![CDATA[
data_2 =
(
  h'52FBA0BDC8D953DD86CE1AB2FD7C05A4658C7C30AFDBFC3301047069451BAF35',
  08
)
]]></artwork></figure>

<figure><artwork><![CDATA[
data_2 (CBOR Sequence) (35 bytes)
58 20 52 fb a0 bd c8 d9 53 dd 86 ce 1a b2 fd 7c 05 a4 65 8c 7c 30 af db 
fc 33 01 04 70 69 45 1b af 35 08 
]]></artwork></figure>

<t>From data_2 and message_1, compute the input to the transcript hash TH_2 = H( message_1, data_2 ), as a CBOR Sequence of these 2 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_2 (CBOR Sequence) (72 bytes)
0d 00 58 20 8d 3e f5 6d 1b 75 0a 43 51 d6 8a c2 50 a0 e8 83 79 0e fc 80 
a5 38 a4 44 ee 9e 2b 57 e2 44 1a 7c 21 58 20 52 fb a0 bd c8 d9 53 dd 86 
ce 1a b2 fd 7c 05 a4 65 8c 7c 30 af db fc 33 01 04 70 69 45 1b af 35 08  
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_2 = SHA-256( message_1, data_2 )</t>

<figure><artwork><![CDATA[
TH_2 (32 bytes)
6a 28 78 e8 4b 2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 0c af 9c 49 
1a 52 e6 83 6a 25 64 ff 
]]></artwork></figure>

<t>The Responder’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Responders's subject name (text string)
""
]]></artwork></figure>

<t>ID_CRED_R is the following:</t>

<figure><artwork><![CDATA[
ID_CRED_R =
{
  4: h'07'
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_R (4 bytes)
a1 04 41 07
]]></artwork></figure>

<t>CRED_R is the following COSE_Key:</t>

<figure><artwork><![CDATA[
{
  1: 1,
  -1: 4,
  -2: h'A3FF263595BEB377D1A0CE1D04DAD2D40966AC6BCB622051B84659184D5D9A32',
  "subject name": ""
}
]]></artwork></figure>

<t>Which encodes to the following byte string:</t>

<figure><artwork><![CDATA[
CRED_R (54 bytes)
a4 01 01 20 04 21 58 20 a3 ff 26 35 95 be b3 77 d1 a0 ce 1d 04 da d2 d4 
09 66 ac 6b cb 62 20 51 b8 46 59 18 4d 5d 9a 32 6c 73 75 62 6a 65 63 74 
20 6e 61 6d 65 60 
]]></artwork></figure>

<t>Since no unprotected opaque auxiliary data is sent in the message exchanges:</t>

<figure><artwork><![CDATA[
AD_2  (0 bytes)
]]></artwork></figure>

<t>The Plaintext is defined as the empty string:</t>

<figure><artwork><![CDATA[
P_2m (0 bytes)
]]></artwork></figure>

<t>The Enc_structure is defined as follows: [ “Encrypt0”, « ID_CRED_R », « TH_2, CRED_R » ]</t>

<figure><artwork><![CDATA[
A_2m =
[
  "Encrypt0", 
  h'A1044107', 
  h'58206A2878E84B2CC021CC1AEBA2965253EF42F7FA300CAF9C491A52E6836A2564FFA401012004215820A3FF263595BEB377D1A0CE1D04DAD2D40966AC6BCB622051B84659184D5D9A326C7375626A656374206E616D6560'
]
]]></artwork></figure>

<t>Which encodes to the following byte string to be used as Additional Authenticated Data:</t>

<figure><artwork><![CDATA[
A_2m (CBOR-encoded) (105 bytes)
83 68 45 6e 63 72 79 70 74 30 44 a1 04 41 07 58 58 58 20 6a 28 78 e8 4b 
2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 0c af 9c 49 1a 52 e6 83 6a 
25 64 ff a4 01 01 20 04 21 58 20 a3 ff 26 35 95 be b3 77 d1 a0 ce 1d 04 
da d2 d4 09 66 ac 6b cb 62 20 51 b8 46 59 18 4d 5d 9a 32 6c 73 75 62 6a 
65 63 74 20 6e 61 6d 65 60 
]]></artwork></figure>

<t>info for K_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_2m =
[
  10, 
  h'6A2878E84B2CC021CC1AEBA2965253EF42F7FA300CAF9C491A52E6836A2564FF', 
  "K_2m", 
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2m (CBOR-encoded) (42 bytes)
84 0a 58 20 6a 28 78 e8 4b 2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 
0c af 9c 49 1a 52 e6 83 6a 25 64 ff 64 4b 5f 32 6d 10 
]]></artwork></figure>

<t>From these parameters, K_2m is computed. Key K_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_2m (16 bytes)
81 2a 48 87 d1 90 ff ed 2b 10 0b a7 a5 c2 5e 67
]]></artwork></figure>

<t>info for IV_2m is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_2m =
[
  10, 
  h'6A2878E84B2CC021CC1AEBA2965253EF42F7FA300CAF9C491A52E6836A2564FF', 
  "IV_2m", 
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_2m (CBOR-encoded) (43 bytes)
84 0a 58 20 6a 28 78 e8 4b 2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 
0c af 9c 49 1a 52 e6 83 6a 25 64 ff 65 49 56 5f 32 6d 0d
]]></artwork></figure>

<t>From these parameters, IV_2m is computed. IV_2m is the output of HKDF-Expand(PRK_3e2m, info, L), where L is the length of IV_2m, so 13 bytes.</t>

<figure><artwork><![CDATA[
IV_2m (13 bytes)
92 3c 0f 94 31 51 5b 69 21 30 49 2b 7f 
]]></artwork></figure>

<t>Finally, COSE_Encrypt0 is computed from the parameters above.</t>

<t><list style="symbols">
  <t>protected header = CBOR-encoded ID_CRED_R</t>
  <t>external_aad = A_2m</t>
  <t>empty plaintext = P_2m</t>
</list></t>

<figure><artwork><![CDATA[
MAC_2 (8 bytes)
64 21 0d 2e 18 b9 28 cd 
]]></artwork></figure>

<t>From there Signature_or_MAC_2 is the MAC (since method = 3):</t>

<figure><artwork><![CDATA[
Signature_or_MAC_2 (8 bytes)
64 21 0d 2e 18 b9 28 cd 
]]></artwork></figure>

<t>CIPHERTEXT_2 is the ciphertext resulting from XOR encrypting a plaintext constructed from the following parameters and the key K_2e.</t>

<t><list style="symbols">
  <t>plaintext = CBOR Sequence of the items ID_CRED_R and the CBOR encoded Signature_or_MAC_2, in this order. Note that since ID_CRED_R contains a single ‘kid’ parameter, i.e., ID_CRED_R = { 4 : kid_R }, only the byte string kid_R is conveyed in the plaintext encoded as a bstr_identifier. kid_R is encoded as the corresponding integer - 24 (see bstr_identifier in <xref target="bstr_id"/>), i.e. 0x07 = 7, 7 - 24 = -17, and -17 in CBOR encoding is equal to 0x30.</t>
</list></t>

<t>The plaintext is the following:</t>

<figure><artwork><![CDATA[
P_2e (CBOR Sequence) (10 bytes)
30 48 64 21 0d 2e 18 b9 28 cd 
]]></artwork></figure>

<t>K_2e = HKDF-Expand( PRK, info, length ), where length is the length of the plaintext, so 10.</t>

<figure><artwork><![CDATA[
info for K_2e =
[
  10, 
  h'6A2878E84B2CC021CC1AEBA2965253EF42F7FA300CAF9C491A52E6836A2564FF', 
  "K_2e", 
  10
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_2e (CBOR-encoded) (42 bytes)
84 0a 58 20 6a 28 78 e8 4b 2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 
0c af 9c 49 1a 52 e6 83 6a 25 64 ff 64 4b 5f 32 65 0a 
]]></artwork></figure>

<t>From there, K_2e is computed:</t>

<figure><artwork><![CDATA[
K_2e (10 bytes)
ec be 9a bd 5f 62 3a fc 65 26 
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_2 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_2 (10 bytes)
dc f6 fe 9c 52 4c 22 45 4d eb 
]]></artwork></figure>

<t>message_2 is the CBOR Sequence of data_2 and CIPHERTEXT_2, in this order:</t>

<figure><artwork><![CDATA[
message_2 =
(
 data_2,
 h'DCF6FE9C524C22454DEB'
) 
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
message_2 (CBOR Sequence) (46 bytes)
58 20 52 fb a0 bd c8 d9 53 dd 86 ce 1a b2 fd 7c 05 a4 65 8c 7c 30 af db 
fc 33 01 04 70 69 45 1b af 35 08 4a dc f6 fe 9c 52 4c 22 45 4d eb 
]]></artwork></figure>

</section>
<section anchor="message3-1" title="Message_3">

<t>Since corr equals 1, C_R is not omitted from data_3.</t>

<figure><artwork><![CDATA[
SK_I (Initiator's private authentication key) (32 bytes)
2b be a6 55 c2 33 71 c3 29 cf bd 3b 1f 02 c6 c0 62 03 38 37 b8 b5 90 99 
a4 43 6f 66 60 81 b0 8e 
]]></artwork></figure>

<figure><artwork><![CDATA[
G_I (Initiator's public authentication key) (32 bytes)
2c 44 0c c1 21 f8 d7 f2 4c 3b 0e 41 ae da fe 9c aa 4f 4e 7a bb 83 5e c3 
0f 1d e8 8a db 96 ff 71
]]></artwork></figure>

<t>HKDF SHA-256 is the HKDF used (as defined by cipher suite 0).</t>

<t>From the Initiator’s authentication key and the Responder’s ephemeral key (see <xref target="dh-ss-m2"/>), the ECDH shared secret G_IY is calculated.</t>

<figure><artwork><![CDATA[
G_IY (ECDH shared secret) (32 bytes)
cb ff 8c d3 4a 81 df ec 4c b6 5d 9a 57 2e bd 09 64 45 0c 78 56 3d a4 98 
1d 80 d3 6c 8b 1a 75 2a 
]]></artwork></figure>

<t>PRK_4x3m = HMAC-SHA-256 (PRK_3e2m, G_IY).</t>

<figure><artwork><![CDATA[
PRK_4x3m (32 bytes)
ec 62 92 a0 67 f1 37 fc 7f 59 62 9d 22 6f bf c4 e0 68 89 49 f6 62 a9 7f 
d8 2f be b7 99 71 39 4a 
]]></artwork></figure>

<t>data 3 is equal to C_R.</t>

<figure><artwork><![CDATA[
data_3 (CBOR Sequence) (1 bytes)
08 
]]></artwork></figure>

<t>From data_3, CIPHERTEXT_2, and TH_2, compute the input to the transcript hash TH_3 = H(TH_2 , CIPHERTEXT_2, data_3), as a CBOR Sequence of these 3 data items.</t>

<figure><artwork><![CDATA[
Input to calculate TH_3 (CBOR Sequence) (46 bytes)
58 20 6a 28 78 e8 4b 2c c0 21 cc 1a eb a2 96 52 53 ef 42 f7 fa 30 0c af 
9c 49 1a 52 e6 83 6a 25 64 ff 4a dc f6 fe 9c 52 4c 22 45 4d eb 08 
]]></artwork></figure>

<t>And from there, compute the transcript hash TH_3 = SHA-256(TH_2 , CIPHERTEXT_2, data_3)</t>

<figure><artwork><![CDATA[
TH_3 (32 bytes)
51 dd 22 43 a6 b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc e4 80 16 07 
03 ee d9 c4 a1 bc b6 11 
]]></artwork></figure>

<t>The initiator’s subject name is the empty string:</t>

<figure><artwork><![CDATA[
Initiator's subject name (text string)
""
]]></artwork></figure>

<t>And its credential is:</t>

<figure><artwork><![CDATA[
ID_CRED_I =
{
  4: h'24'
}
]]></artwork></figure>

<figure><artwork><![CDATA[
ID_CRED_I (4 bytes)
a1 04 41 24
]]></artwork></figure>

<t>CRED_I is the following COSE_Key:</t>

<figure><artwork><![CDATA[
{
  1: 1, 
  -1: 4,
   -2: h'2C440CC121F8D7F24C3B0E41AEDAFE9CAA4F4E7ABB835EC30F1DE88ADB96FF71', 
   "subject name": ""
 }
]]></artwork></figure>

<t>Which encodes to the following byte string:</t>

<figure><artwork><![CDATA[
CRED_I (54 bytes)
a4 01 01 20 04 21 58 20 2c 44 0c c1 21 f8 d7 f2 4c 3b 0e 41 ae da fe 9c 
aa 4f 4e 7a bb 83 5e c3 0f 1d e8 8a db 96 ff 71 6c 73 75 62 6a 65 63 74 
20 6e 61 6d 65 60  
]]></artwork></figure>

<t>Since no opaque auxiliary data is exchanged:</t>

<figure><artwork><![CDATA[
AD_3 (0 bytes)
]]></artwork></figure>

<t>The Plaintext of the COSE_Encrypt is the empty string:</t>

<figure><artwork><![CDATA[
P_3m (0 bytes)
]]></artwork></figure>

<t>The external_aad is the CBOR Sequence of CRED_I and TH_3, in this order:</t>

<figure><artwork><![CDATA[
A_3m (CBOR-encoded) (105 bytes)
83 68 45 6e 63 72 79 70 74 30 44 a1 04 41 24 58 58 58 20 51 dd 22 43 a6 
b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc e4 80 16 07 03 ee d9 c4 a1 
bc b6 11 a4 01 01 20 04 21 58 20 2c 44 0c c1 21 f8 d7 f2 4c 3b 0e 41 ae 
da fe 9c aa 4f 4e 7a bb 83 5e c3 0f 1d e8 8a db 96 ff 71 6c 73 75 62 6a 
65 63 74 20 6e 61 6d 65 60 
]]></artwork></figure>

<t>Info for K_3m is computed as follows:</t>

<figure><artwork><![CDATA[
info for K_3m =
[
  10, 
  h'51DD2243A6B83F1316DC53291AE191CD93B444CCE480160703EED9C4A1BCB611', 
  "K_3m", 
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3m (CBOR-encoded) (42 bytes)
84 0a 58 20 51 dd 22 43 a6 b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc 
e4 80 16 07 03 ee d9 c4 a1 bc b6 11 64 4b 5f 33 6d 10  
]]></artwork></figure>

<t>From these parameters, K_3m is computed. Key K_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L is the length of K_2m, so 16 bytes.</t>

<figure><artwork><![CDATA[
K_3m (16 bytes)
84 85 31 8a a3 08 6f d5 86 7a 02 8e 99 e2 40 30 
]]></artwork></figure>

<t>Nonce IV_3m is the output of HKDF-Expand(PRK_4x3m, info, L), where L = 13 bytes.</t>

<t>Info for IV_3m is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3m =
[
  10, 
  h'51DD2243A6B83F1316DC53291AE191CD93B444CCE480160703EED9C4A1BCB611', 
  "IV_3m", 
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3m (CBOR-encoded) (43 bytes)
84 0a 58 20 51 dd 22 43 a6 b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc 
e4 80 16 07 03 ee d9 c4 a1 bc b6 11 65 49 56 5f 33 6d 0d  
]]></artwork></figure>

<t>From these parameters, IV_3m is computed:</t>

<figure><artwork><![CDATA[
IV_3m (13 bytes)
1e 10 5b 88 50 0e d5 ae b0 5d 00 6b ea 
]]></artwork></figure>

<t>MAC_3 is the ciphertext of the COSE_Encrypt0:</t>

<figure><artwork><![CDATA[
MAC_3 (8 bytes)
1f b7 5a c1 aa d2 34 25 
]]></artwork></figure>

<t>Since the method = 3, Signature_or_Mac_3 is the MAC_3:</t>

<figure><artwork><![CDATA[
Signature_or_MAC_3 (8 bytes)
1f b7 5a c1 aa d2 34 25 
]]></artwork></figure>

<t>Finally, the outer COSE_Encrypt0 is computed.</t>

<t>The Plaintext is the following CBOR Sequence: 
plaintext = ( ID_CRED_I , Signature_or_MAC_3 ).  Note that since ID_CRED_I contains a single ‘kid’ parameter, i.e., ID_CRED_I = { 4 : kid_I }, only the byte string kid_I is conveyed in the plaintext encoded as a bstr_identifier. kid_I is encoded as the corresponding integer - 24 (see bstr_identifier in <xref target="bstr_id"/>), i.e. 0x24 = 36, 36 - 24 = 12, and 12 in CBOR encoding is equal to 0x0c.</t>

<figure><artwork><![CDATA[
P_3ae (CBOR Sequence) (10 bytes)
0c 48 1f b7 5a c1 aa d2 34 25 
]]></artwork></figure>

<t>The Associated data A is the following:
Associated data A = [ “Encrypt0”, h’’, TH_3 ]</t>

<figure><artwork><![CDATA[
A_3ae (CBOR-encoded) (45 bytes)
83 68 45 6e 63 72 79 70 74 30 40 58 20 51 dd 22 43 a6 b8 3f 13 16 dc 53 
29 1a e1 91 cd 93 b4 44 cc e4 80 16 07 03 ee d9 c4 a1 bc b6 11 
]]></artwork></figure>

<t>Key K_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for K_3ae = 
[
  10, 
  h'51DD2243A6B83F1316DC53291AE191CD93B444CCE480160703EED9C4A1BCB611', 
  "K_3ae", 
  16
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for K_3ae (CBOR-encoded) (43 bytes)
84 0a 58 20 51 dd 22 43 a6 b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc 
e4 80 16 07 03 ee d9 c4 a1 bc b6 11 65 4b 5f 33 61 65 10  
]]></artwork></figure>

<t>L is the length of K_3ae, so 16 bytes.</t>

<t>From these parameters, K_3ae is computed:</t>

<figure><artwork><![CDATA[
K_3ae (16 bytes)
bf 29 0b 7e e0 4b 86 5d e1 01 0a 81 1b 36 00 64 
]]></artwork></figure>

<t>Nonce IV_3ae is the output of HKDF-Expand(PRK_3e2m, info, L).</t>

<t>info is defined as follows:</t>

<figure><artwork><![CDATA[
info for IV_3ae =
[
  10, 
  h'51DD2243A6B83F1316DC53291AE191CD93B444CCE480160703EED9C4A1BCB611', 
  "IV_3ae", 
  13
]
]]></artwork></figure>

<t>Which as a CBOR encoded data item is:</t>

<figure><artwork><![CDATA[
info for IV_3ae (CBOR-encoded) (44 bytes)
84 0a 58 20 51 dd 22 43 a6 b8 3f 13 16 dc 53 29 1a e1 91 cd 93 b4 44 cc 
e4 80 16 07 03 ee d9 c4 a1 bc b6 11 66 49 56 5f 33 61 65 0d 
]]></artwork></figure>

<t>L is the length of IV_3ae, so 13 bytes.</t>

<t>From these parameters, IV_3ae is computed:</t>

<figure><artwork><![CDATA[
IV_3ae (13 bytes)
0e 74 45 0a fc ec e9 73 af 64 e9 4d 46 
]]></artwork></figure>

<t>Using the parameters above, the ciphertext CIPHERTEXT_3 can be computed:</t>

<figure><artwork><![CDATA[
CIPHERTEXT_3 (18 bytes)
53 c3 99 19 99 a5 ff b8 69 21 e9 9b 60 7c 06 77 70 e0 
]]></artwork></figure>

<t>From the parameter above, message_3 is computed, as the CBOR Sequence of the following items: (C_R, CIPHERTEXT_3).</t>

<figure><artwork><![CDATA[
message_3 =
(
  h'08',
  h'53C3991999A5FFB86921E99B607C067770E0'
)
]]></artwork></figure>

<t>Which encodes to the following byte string:</t>

<figure><artwork><![CDATA[
message_3 (CBOR Sequence) (20 bytes)
08 52 53 c3 99 19 99 a5 ff b8 69 21 e9 9b 60 7c 06 77 70 e0 
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="applicability" title="Applicability Statement Template">

<t>EDHOC requires certain parameters to be agreed upon between Initiator and Responder. A cipher suite is negotiated with the protocol, but certain other parameters need to be agreed beforehand:</t>

<t><list style="numbers">
  <t>Method and correlation of underlying transport messages (METHOD_CORR, see <xref target="method"/> and <xref target="corr"/>).</t>
  <t>Type of authentication credentials (CRED_I, CRED_R, see <xref target="id_cred"/>).</t>
  <t>Type for identifying authentication credentials (ID_CRED_I, ID_CRED_R, see <xref target="id_cred"/>).</t>
  <t>Type and use of Auxiliary Data AD_1, AD_2, AD_3 (see <xref target="AD"/>).</t>
  <t>Identifier used as identity of endpoint (see <xref target="auth-key-id"/>).</t>
</list></t>

<t>An example of an applicability statement is shown in the next section.</t>

<t>Note that for some of the parameters, like METHOD_CORR, ID_CRED_x, type of AD_x, the receiver is able to assert whether it supports the parameter or not and thus, if it fails, to infer why.</t>

<t>For other parameters, like type of authentication credential, it may be more difficult to detect if the receiver got the wrong type since the credential is not necessarily transported, and a failed integrity of the received message may be caused by other circumstances. For example in the case of public key certificates there is a large variety of profiles and alternative encodings, which the applicability statement needs to nail down.</t>

<t>Note also that it is not always necessary for the endpoints to agree on the transport for the EDHOC messages. For example, a mix of CoAP and HTTP may be used along the path and still allow correlation between message_1 and message_2.</t>

<section anchor="use-of-edhoc-in-the-xx-protocol" title="Use of EDHOC in the XX Protocol">

<t>For use of EDHOC in the XX protocol, the following assumptions are made on the parameters.</t>

<t><list style="symbols">
  <t>METHOD_CORR = 5
  <list style="symbols">
      <t>method = 1 (I uses signature key, R uses static DH key.)</t>
      <t>corr = 1 (CoAP Token or other transport data enables correlation between message_1 and message_2.)</t>
    </list></t>
  <t>CRED_I is an 802.1AR IDevID encoded as a CBOR Certificate of type 0
  <list style="symbols">
      <t>R acquires CRED_I out-of-band, indicated in AD_1</t>
      <t>ID_CRED_I = {4: h’’} is a kid with value empty byte string</t>
    </list></t>
  <t>CRED_R is a COSE_Key of type OKP as specified in <xref target="id_cred"/>.
  <list style="symbols">
      <t>The CBOR map has parameters 1 (kty), -1 (crv), and -2 (x-coordinate).</t>
    </list></t>
  <t>ID_CRED_R = CRED_R</t>
  <t>AD_1 contains Auxiliary Data of type A (TBD)</t>
  <t>AD_2 contains Auxiliary Data of type B (TBD)</t>
</list></t>

<t>Auxiliary Data is processed as specified in <xref target="I-D.ietf-ace-oauth-authz"/>.</t>

<t><list style="symbols">
  <t>Need to specify use of C_I/C_R ? (TBD)</t>
</list></t>

</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Alessandro Bruni, Karthikeyan Bhargavan, Martin Disch, Theis Grønbech Petersen, Dan Harkins, Klaus Hartke, Russ Housley, Alexandros Krontiris, Ilari Liusvaara, Karl Norrman, Salvador Pérez, Eric Rescorla, Michael Richardson, Thorvald Sahl Jørgensen, Jim Schaad, Carsten Schürmann, Ludwig Seitz, Stanislav Smyshlyaev, Valery Smyslov, Rene Struik, Vaishnavi Sundararajan, Erik Thormarker, and Michel Veillette for reviewing and commenting on intermediate versions of the draft. We are especially indebted to Jim Schaad for his continuous reviewing and implementation of different versions of the draft.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

