Yes, we could also propose algorithm combinations for key agreement followed 
GCM key wrapping but I didn't think that was an ask from the working group.  
The Denver minutes just recorded my action item as "key wrap draft for 
AES-GCM-keywrap", so that's what I did.  We could have a discussion on Monday's 
call and on the list about whether the working group is also interested in 
other algorithms.

Remember, the beauty of having the algorithms registry is that algorithms can 
be added "just in time" - as actual need for them is demonstrated.  We don't 
have to register all conceivable algorithm combinations up front for the 
JWE/JWA specs to be complete.

As for how the AEAD parameters are handled I used a parameter encoding that 
doesn't result in double base64url encoding anything.  I could have instead 
introduced separate "iv" and "tag" header parameter values, but didn't do so 
for that reason.  But if people would prefer that approach because it's more 
parallel to the use of GCM for plaintext encryption, I have no problem with 
that.

I do believe that the objective of my draft was met - demonstrating that AEAD 
key wrapping can be easily done with the current drafts.  The details of how 
the algorithm parameters are encoded is secondary to that and 
algorithm-specific; several reasonable choices are possible within the current 
JWE framework - one of which was described in my draft.

                                                                -- Mike

From: [email protected] [mailto:[email protected]] On Behalf Of Jim 
Schaad
Sent: Wednesday, June 26, 2013 11:30 AM
To: Mike Jones; [email protected]
Subject: Re: [jose] Issue #13 - use AES-GCM for Key Wrapping

<no hat>
<sarcasm level="heavy">

I am shocked that you would possibly support this proposal.  It provides for 
two ways of dealing with something.  It is my understanding that you never 
support anything that has two ways of doing something.

How the AEAD algorithm parameters is handled completely differently for this 
proposal and for the same algorithms being used in a CEK context.  This is 
going to lead to confusion.

</sarcasm>

Your specification is missing some items that still need to be registered  Thus 
you also need to have ECDH-ES+A128GCMKW and ECDH-ES+A256GCMKW defined in your 
document as well.

Your document ends up with a registration complexity that needs to be thought 
about and dealt with as well.  For every new key wrap algorithm added, you will 
need to register not only it alone but also it with every different key 
agreement algorithm that is supported.  Thus adding a single key wrap algorithm 
becomes a slight issue in terms of adding in all of the different ways that it 
might be used.  This is a complexity issue that is not discussed in the current 
draft.

I have not necessarily found that document size equals code size.  I have 
implemented some very simple documents that were very difficult to code and 
implemented some very long documents that were very easy to code.  So I would 
not use that fact as a deciding factor.

(Once again I regret the fact that the group did not go with an object 
descriptor for algorithms as this would have made all of this much simpler.  I 
actually immediately map from the string to an object description in my JOSE 
implementation for simplicity reasons.  Not to mention that this is way it 
needs to be done for the WebCrypto specficiation.)

Jim



From: Mike Jones [mailto:[email protected]]
Sent: Tuesday, June 25, 2013 4:18 PM
To: 'Jim Schaad'; [email protected]<mailto:[email protected]>
Subject: RE: [jose] Issue #13 - use AES-GCM for Key Wrapping

http://tools.ietf.org/html/draft-jones-jose-aes-gcm-key-wrap-00 seems like a 
substantially simpler approach than 
http://tools.ietf.org/html/draft-barnes-jose-key-wrapping-01.  This is evident 
by several metrics:

*         Number of proposed changes:  The Jones draft proposes no changes to 
any of the current specs.  It simply defines an encoding for GCM and adds 
registry entries for it.  Whereas the Barnes draft proposes a major 
restructuring - listing 4 major changes in the introduction and 4 smaller 
changes.

*         Normative text size:  The Jones GCM key wrap approach requires only 7 
normative sentences in 1/2 page of text.  The Barnes draft has four pages of 
normative text, along with an extensive introduction describing the proposed 
complete restructuring of JWS and JWE.

We don't need to boil the ocean with a total redesign to enable AEAD key 
wrapping.  It can already easily be done with the current specs simply by 
defining new algorithms.  The approach taken in 
http://tools.ietf.org/html/draft-jones-jose-aes-gcm-key-wrap-00 would work for 
any AEAD algorithm.

                                                                -- Mike

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jim Schaad
Sent: Tuesday, June 25, 2013 9:53 AM
To: [email protected]<mailto:[email protected]>
Subject: [jose] Issue #13 - use AES-GCM for Key Wrapping

We now have two documents - one from Richard and one from Mike - which provide 
the two different ways that have been proposed for doing key wrapping with an 
AEAD algorithm.

Please review the two documents and provide comments to the list.

Jim

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to