Permit me to ask a clarifying question.  You state that "the key itself to be 
in a clear-text format ... is an explicit no-no" but surely that can't be true 
of the public key, since, by definition, it's public.  Sure, that's true of the 
private key.

Are you trying to share the public key or also the private key?  If the private 
key, then no matter what representation you use for it (JWK or other), you'll 
have to protect to private key by other means - be it TLS encryption or other 
context-specific encryption.

                                                       Best wishes,
                                                       -- Mike

From: Robins, Eric <[email protected]>
Sent: Friday, August 19, 2022 9:40 AM
To: [email protected]
Cc: Devolder, Eric <[email protected]>; Mike Jones 
<[email protected]>
Subject: RFC7517 (JWK) and potential changes for financial services

You don't often get email from 
[email protected]<mailto:[email protected]>. Learn why this 
is important<https://aka.ms/LearnAboutSenderIdentification>
Hi:

As a financial services provider, Mastercard works frequently with applied 
cryptography, including the use of the JOSE patterns for identity credential 
management and message-level encryption and signing.  Like many of our 
competitors and partners in this space, we make heavy use of hardware security 
modules (HSMs) and other such devices for the protection of cryptographic keys 
related to the signing and encryption of sensitive PII/PCI data.

We recently ran across an interesting integration with one of our partner 
Issuing banks where we'll need to share a sensitive key on a regular basis with 
them (an HMAC key in this case) that will be protected on both sides by HSMs.  
We're looking at trying to standardize on a format for the sharing of that key 
and had considered the use of the JWK/JWE pattern but it appears that doing so 
requires the key itself to be in a clear-text format when written as the JWK 
(prior to being encrypted as a JWE).  This is an explicit no-no for these types 
of keys, which never exist in such a format and are only recoverable as 
clear-text inside of the HSMs themselves.

Thus, we're at a bit of a crossroad here.  We can't - and our partners won't 
either - export keys from our HSMs into a clear-text format prior to writing a 
JWK.  Most HSM vendors don't support exporting keys in a JWK/JWE format since 
they predate the JOSE standards, so we need to A>propose changes to the JWK 
standard, B>convince all major HSM manufacturers to support JOSE or C>not use 
JOSE.

Would whoever manages this standard be open for a quick discussion for proposed 
changes to the RFC?  Or, do you have recommendations as to how other financial 
services may be using this standard today?  We'd love feedback here.

Thanks in advance - looking forward to connecting...

Eric Robins
Corporate Security - Business Security Engineering/Architecture

Mastercard
2200 Mastercard Blvd
tel 636-722-7130
[cid:[email protected]]

CONFIDENTIALITY NOTICE This e-mail message and any attachments are only for the 
use of the intended recipient and may contain information that is privileged, 
confidential or exempt from disclosure under applicable law. If you are not the 
intended recipient, any disclosure, distribution or other use of this e-mail 
message or attachments is prohibited. If you have received this e-mail message 
in error, please delete and notify the sender immediately. Thank you.
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to