Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Hybrid KEM: more combiners, more abstraction #17

Open
bhess opened this issue Mar 30, 2021 · 1 comment
Open

Hybrid KEM: more combiners, more abstraction #17

bhess opened this issue Mar 30, 2021 · 1 comment
Labels
enhancement New feature or request

Comments

@bhess
Copy link
Member

bhess commented Mar 30, 2021

Follow-up after #16:

  • So far, the shared secret uses "Comb-Concat" as described in https://tools.ietf.org/html/draft-ietf-tls-hybrid-design-01#appendix-B.4.1. The same is done in OSSL111. This is suitable for inputting the shared secret to the TLS 1.3 key schedule. Compared to the implementation in OSSL111, the oqs-provider can also be used outside a TLS context. For this purpose, a method like "Comb-KDF" would be useful.
  • Investigate using more OSSL3 API to allow more flexible combination of hybrid schemes:
    -> query algorithm parameters (secret-, ciphertext-, key-lengths) with provider API
    -> define individual algorithms for hybrid KEM in an array
    -> unify initialization of EVP-ECP and EVP-ECX code
@mouse07410
Copy link
Contributor

IMHO, from practical point of view, a construct like

K = KDF (SS1 || SS2 || ... || SSn)

is hard to beat, both security-wise and simplicity-wise. I don't think we need anything more elaborated, though a few details should be written down, like fixed length of each shared secret.

@baentsch baentsch added the enhancement New feature or request label Jul 14, 2023
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants