rfc9374v4.txt | rfc9374.txt | |||
---|---|---|---|---|
skipping to change at line 128 ¶ | skipping to change at line 128 ¶ | |||
spoofable (ID-5), and identify a registry where the ID is listed | spoofable (ID-5), and identify a registry where the ID is listed | |||
(ID-2); all within a 19-character identifier (ID-1). | (ID-2); all within a 19-character identifier (ID-1). | |||
This RFC is a foundational document of DRIP, as it describes the use | This RFC is a foundational document of DRIP, as it describes the use | |||
of Hierarchical Host Identity Tags (HHITs) (Section 3) as self- | of Hierarchical Host Identity Tags (HHITs) (Section 3) as self- | |||
asserting IPv6 addresses and thereby a trustable identifier for use | asserting IPv6 addresses and thereby a trustable identifier for use | |||
as the UAS Remote ID (see Section 3 of [DRIP-ARCH]). All other DRIP- | as the UAS Remote ID (see Section 3 of [DRIP-ARCH]). All other DRIP- | |||
related technologies will enable or use HHITs as multipurpose remote | related technologies will enable or use HHITs as multipurpose remote | |||
identifiers. HHITs add explicit hierarchy to the 128-bit HITs, | identifiers. HHITs add explicit hierarchy to the 128-bit HITs, | |||
enabling DNS HHIT queries (Host ID for authentication, e.g., | enabling DNS HHIT queries (Host ID for authentication, e.g., | |||
[DRIP-AUTH]) and use with a Differentiated Access Control (e.g. | [DRIP-AUTH]) and use with a Differentiated Access Control (e.g., | |||
Registration Data Access Protocol (RDAP) [RFC9224]) for 3rd-party | Registration Data Access Protocol (RDAP) [RFC9224]) for 3rd-party | |||
identification endorsement (e.g., [DRIP-AUTH]). | identification endorsement (e.g., [DRIP-AUTH]). | |||
The addition of hierarchy to HITs is an extension to [RFC7401] and | The addition of hierarchy to HITs is an extension to [RFC7401] and | |||
requires an update to [RFC7343]. As this document also adds EdDSA | requires an update to [RFC7343]. As this document also adds EdDSA | |||
(Section 3.4) for Host Identities (HIs), a number of Host Identity | (Section 3.4) for Host Identities (HIs), a number of Host Identity | |||
Protocol (HIP) parameters in [RFC7401] are updated, but these should | Protocol (HIP) parameters in [RFC7401] are updated, but these should | |||
not be needed in a DRIP implementation that does not use HIP. | not be needed in a DRIP implementation that does not use HIP. | |||
HHITs as used within the context of UAS are labeled as DRIP Entity | HHITs as used within the context of UAS are labeled as DRIP Entity | |||
Tags (DETs). Throughout this document, HHIT and DET will be used | Tags (DETs). Throughout this document, HHIT and DET will be used | |||
appropriately. HHIT will be used when covering the technology, and | appropriately. HHIT will be used when covering the technology, and | |||
DET will be used in the context of UAS RID. | DET will be used in the context of UAS RID. | |||
HHITs provide self-claims of the HHIT registry. A HHIT can only be | HHITs provide self-claims of the HHIT registry. A HHIT can only be | |||
in a single registry within a registry system (e.g. DNS). | in a single registry within a registry system (e.g., DNS). | |||
HHITs are valid, though non-routable, IPv6 addresses [RFC8200]. As | HHITs are valid, though non-routable, IPv6 addresses [RFC8200]. As | |||
such, they fit in many ways within various IETF technologies. | such, they fit in many ways within various IETF technologies. | |||
1.1. HHIT Statistical Uniqueness Different from UUID or X.509 Subject | 1.1. HHIT Statistical Uniqueness Different from UUID or X.509 Subject | |||
HHITs are statistically unique through the cryptographic hash feature | HHITs are statistically unique through the cryptographic hash feature | |||
of second-preimage resistance. The cryptographically bound addition | of second-preimage resistance. The cryptographically bound addition | |||
of the hierarchy and a HHIT registration process [DRIP-REG] provide | of the hierarchy and a HHIT registration process [DRIP-REG] provide | |||
complete, global HHIT uniqueness. If the HHITs cannot be looked up | complete, global HHIT uniqueness. If the HHITs cannot be looked up | |||
skipping to change at line 308 ¶ | skipping to change at line 308 ¶ | |||
Context IDs are allocated out of the namespace introduced for | Context IDs are allocated out of the namespace introduced for | |||
Cryptographically Generated Addresses (CGA) Type Tags [RFC3972]. | Cryptographically Generated Addresses (CGA) Type Tags [RFC3972]. | |||
3.1. HHIT Prefix for RID Purposes | 3.1. HHIT Prefix for RID Purposes | |||
The IPv6 HHIT prefix MUST be distinct from that used in the flat- | The IPv6 HHIT prefix MUST be distinct from that used in the flat- | |||
space HIT as allocated in [RFC7343]. Without this distinct prefix, | space HIT as allocated in [RFC7343]. Without this distinct prefix, | |||
the first 4 bits of the RAA would be interpreted as the HIT Suite ID | the first 4 bits of the RAA would be interpreted as the HIT Suite ID | |||
per HIPv2 [RFC7401]. | per HIPv2 [RFC7401]. | |||
Initially, for DET use, one 28-bit prefix should be assigned out of | Initially, the IPv6 prefix listed in Table 1 is assigned for DET use. | |||
the IANA IPv6 Special Purpose Address Block ([RFC6890]). | It has been registered in the "IANA IPv6 Special-Purpose Address | |||
Registry" [RFC6890]. | ||||
+==========+======+==============+ | +==========+======+==============+ | |||
| HHIT Use | Bits | Value | | | HHIT Use | Bits | Value | | |||
+==========+======+==============+ | +==========+======+==============+ | |||
| DET | 28 | 2001:30::/28 | | | DET | 28 | 2001:30::/28 | | |||
+----------+------+--------------+ | +----------+------+--------------+ | |||
Table 1 | Table 1: Initial DET IPv6 Prefix | |||
Other prefixes may be added in the future either for DET use or other | Other prefixes may be added in the future either for DET use or other | |||
applications of HHITs. For a prefix to be added to the registry in | applications of HHITs. For a prefix to be added to the registry in | |||
Section 8.2, its usage and HID allocation process have to be publicly | Section 8.2, its usage and HID allocation process have to be publicly | |||
available. | available. | |||
3.2. HHIT Suite IDs | 3.2. HHIT Suite IDs | |||
The HHIT Suite IDs specify the HI and hash algorithms. These are a | The HHIT Suite IDs specify the HI and hash algorithms. These are a | |||
superset of the 4-bit and 8-bit HIT Suite IDs as defined in | superset of the 4-bit and 8-bit HIT Suite IDs as defined in | |||
skipping to change at line 356 ¶ | skipping to change at line 357 ¶ | |||
+-----------------+-------------+ | +-----------------+-------------+ | |||
| RSA,DSA/SHA-256 | 1 [RFC7401] | | | RSA,DSA/SHA-256 | 1 [RFC7401] | | |||
+-----------------+-------------+ | +-----------------+-------------+ | |||
| ECDSA/SHA-384 | 2 [RFC7401] | | | ECDSA/SHA-384 | 2 [RFC7401] | | |||
+-----------------+-------------+ | +-----------------+-------------+ | |||
| ECDSA_LOW/SHA-1 | 3 [RFC7401] | | | ECDSA_LOW/SHA-1 | 3 [RFC7401] | | |||
+-----------------+-------------+ | +-----------------+-------------+ | |||
| EdDSA/cSHAKE128 | 5 | | | EdDSA/cSHAKE128 | 5 | | |||
+-----------------+-------------+ | +-----------------+-------------+ | |||
Table 2 | Table 2: Initial HHIT Suite IDs | |||
3.2.1. HDA Custom HIT Suite IDs | 3.2.1. HDA Custom HIT Suite IDs | |||
Support for 8-bit HHIT Suite IDs allows for HDA custom HIT Suite IDs. | Support for 8-bit HHIT Suite IDs allows for HDA custom HIT Suite IDs | |||
These will be assigned values greater than 15 as follows: | (see Table 3). | |||
+===================+=======+ | +===================+=======+ | |||
| HHIT Suite | Value | | | HHIT Suite | Value | | |||
+===================+=======+ | +===================+=======+ | |||
| HDA Private Use 1 | 254 | | | HDA Private Use 1 | 254 | | |||
+-------------------+-------+ | +-------------------+-------+ | |||
| HDA Private Use 2 | 255 | | | HDA Private Use 2 | 255 | | |||
+-------------------+-------+ | +-------------------+-------+ | |||
Table 3 | Table 3: HDA Custom HIT | |||
Suite IDs | ||||
These custom HIT Suite IDs, for example, may be used for large-scale | These custom HIT Suite IDs, for example, may be used for large-scale | |||
experimentation with post-quantum computing hashes or similar domain- | experimentation with post-quantum computing hashes or similar domain- | |||
specific needs. Note that currently there is no support for domain- | specific needs. Note that currently there is no support for domain- | |||
specific HI algorithms. | specific HI algorithms. | |||
They should not be used to create a "de facto standardization". | They should not be used to create a "de facto standardization". | |||
Section 8.2 states that additional Suite IDs can be made through IETF | Section 8.2 states that additional Suite IDs can be made through IETF | |||
Review. | Review. | |||
skipping to change at line 416 ¶ | skipping to change at line 418 ¶ | |||
The RAA is a 14-bit field (16,384 RAAs). Management of this space is | The RAA is a 14-bit field (16,384 RAAs). Management of this space is | |||
further described in [DRIP-REG]. An RAA MUST provide a set of | further described in [DRIP-REG]. An RAA MUST provide a set of | |||
services to allocate HDAs to organizations. It SHOULD have a public | services to allocate HDAs to organizations. It SHOULD have a public | |||
policy on what is necessary to obtain an HDA. The RAA need not | policy on what is necessary to obtain an HDA. The RAA need not | |||
maintain any HIP-related services. At minimum, it MUST maintain a | maintain any HIP-related services. At minimum, it MUST maintain a | |||
DNS zone for the HDA zone delegation for discovering HIP RVS servers | DNS zone for the HDA zone delegation for discovering HIP RVS servers | |||
[RFC8004] for the HID. Zone delegation is covered in [DRIP-REG]. | [RFC8004] for the HID. Zone delegation is covered in [DRIP-REG]. | |||
As DETs under administrative control may be used in many different | As DETs under administrative control may be used in many different | |||
domains (e.g., commercial, recreation, military), RAAs should be | domains (e.g., commercial, recreation, military), RAAs should be | |||
allocated in blocks (e.g. 16-19) with consideration of the likely | allocated in blocks (e.g., 16-19) with consideration of the likely | |||
size of a particular usage. Alternatively, different prefixes can be | size of a particular usage. Alternatively, different prefixes can be | |||
used to separate different domains of use of HHITs. | used to separate different domains of use of HHITs. | |||
The RAA DNS zone within the UAS DNS tree may be a PTR for its RAA. | The RAA DNS zone within the UAS DNS tree may be a PTR for its RAA. | |||
It may be a zone in a HHIT-specific DNS zone. Assume that the RAA is | It may be a zone in a HHIT-specific DNS zone. Assume that the RAA is | |||
decimal 100. The PTR record could be constructed as follows (where | decimal 100. The PTR record could be constructed as follows (where | |||
20010030 is the DET prefix): | 20010030 is the DET prefix): | |||
100.20010030.hhit.arpa. IN PTR raa.example.com. | 100.20010030.hhit.arpa. IN PTR raa.example.com. | |||
skipping to change at line 470 ¶ | skipping to change at line 472 ¶ | |||
parameters. Other than the HIP DNS RR (Resource Record) [RFC8005], | parameters. Other than the HIP DNS RR (Resource Record) [RFC8005], | |||
these should not be needed in a DRIP implementation that does not use | these should not be needed in a DRIP implementation that does not use | |||
HIP. | HIP. | |||
See Section 3.2 for use of the HIT Suite in the context of DRIP. | See Section 3.2 for use of the HIT Suite in the context of DRIP. | |||
3.4.1. HOST_ID | 3.4.1. HOST_ID | |||
The HOST_ID parameter specifies the public key algorithm, and for | The HOST_ID parameter specifies the public key algorithm, and for | |||
elliptic curves, a name. The HOST_ID parameter is defined in | elliptic curves, a name. The HOST_ID parameter is defined in | |||
Section 5.2.9 of [RFC7401]. | Section 5.2.9 of [RFC7401]. Table 4 adds a new HI Algorithm. | |||
+===================+=======+===========+ | +===================+=======+===========+ | |||
| Algorithm profile | Value | Reference | | | Algorithm profile | Value | Reference | | |||
+===================+=======+===========+ | +===================+=======+===========+ | |||
| EdDSA | 13 | [RFC8032] | | | EdDSA | 13 | [RFC8032] | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
Table 4 | Table 4: New EdDSA Host ID | |||
3.4.1.1. HIP Parameter support for EdDSA | 3.4.1.1. HIP Parameter support for EdDSA | |||
The addition of EdDSA as a HI algorithm requires a subfield in the | The addition of EdDSA as a HI algorithm requires a subfield in the | |||
HIP HOST_ID parameter (Section 5.2.9 of [RFC7401]) as was done for | HIP HOST_ID parameter (Section 5.2.9 of [RFC7401]) as was done for | |||
ECDSA when used in a HIP exchange. | ECDSA when used in a HIP exchange. | |||
For HIP hosts that implement EdDSA as the algorithm, the following | For HIP hosts that implement EdDSA as the algorithm, the following | |||
EdDSA curves are represented by the following fields: | EdDSA curves are represented by the fields in Figure 2 | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| EdDSA Curve | NULL | | | EdDSA Curve | NULL | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Public Key | | | Public Key | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 2 | Figure 2: EdDSA Curves Fields | |||
EdDSA Curve: Curve label | EdDSA Curve: Curve label | |||
Public Key: Represented in Octet-string format [RFC8032] | Public Key: Represented in Octet-string format [RFC8032] | |||
For hosts that implement EdDSA as a HIP algorithm, the following | For hosts that implement EdDSA as a HIP algorithm, the following | |||
EdDSA curves are defined. Recommended curves are tagged accordingly: | EdDSA curves are defined. Recommended curves are tagged accordingly: | |||
+===========+==============+===========================+ | +===========+==============+===========================+ | |||
| Algorithm | Curve | Values | | | Algorithm | Curve | Values | | |||
skipping to change at line 520 ¶ | skipping to change at line 522 ¶ | |||
+-----------+--------------+---------------------------+ | +-----------+--------------+---------------------------+ | |||
| EdDSA | EdDSA25519 | 1 [RFC8032] (RECOMMENDED) | | | EdDSA | EdDSA25519 | 1 [RFC8032] (RECOMMENDED) | | |||
+-----------+--------------+---------------------------+ | +-----------+--------------+---------------------------+ | |||
| EdDSA | EdDSA25519ph | 2 [RFC8032] | | | EdDSA | EdDSA25519ph | 2 [RFC8032] | | |||
+-----------+--------------+---------------------------+ | +-----------+--------------+---------------------------+ | |||
| EdDSA | EdDSA448 | 3 [RFC8032] (RECOMMENDED) | | | EdDSA | EdDSA448 | 3 [RFC8032] (RECOMMENDED) | | |||
+-----------+--------------+---------------------------+ | +-----------+--------------+---------------------------+ | |||
| EdDSA | EdDSA448ph | 4 [RFC8032] | | | EdDSA | EdDSA448ph | 4 [RFC8032] | | |||
+-----------+--------------+---------------------------+ | +-----------+--------------+---------------------------+ | |||
Table 5 | Table 5: EdDSA Curves | |||
3.4.1.2. HIP DNS RR support for EdDSA | 3.4.1.2. HIP DNS RR support for EdDSA | |||
The HIP DNS RR is defined in [RFC8005]. It uses the values defined | The HIP DNS RR is defined in [RFC8005]. It uses the values defined | |||
for the 'Algorithm Type' of the IPSECKEY RR [RFC4025] for its PK | for the 'Algorithm Type' of the IPSECKEY RR [RFC4025] for its PK | |||
Algorithm field. | Algorithm field. | |||
The 'Algorithm Type' value and EdDSA HI encoding are assigned per | The 'Algorithm Type' value and EdDSA HI encoding are assigned per | |||
[RFC9373]. | [RFC9373]. | |||
skipping to change at line 547 ¶ | skipping to change at line 549 ¶ | |||
Section 5.2.10 of [RFC7401]. | Section 5.2.10 of [RFC7401]. | |||
The following HIT Suite ID is defined: | The following HIT Suite ID is defined: | |||
+=================+=======+ | +=================+=======+ | |||
| HIT Suite | Value | | | HIT Suite | Value | | |||
+=================+=======+ | +=================+=======+ | |||
| EdDSA/cSHAKE128 | 5 | | | EdDSA/cSHAKE128 | 5 | | |||
+-----------------+-------+ | +-----------------+-------+ | |||
Table 6 | Table 6: HIT Suite ID | |||
Table 7 provides more detail on the above HIT Suite combination. | Table 7 provides more detail on the above HIT Suite combination. | |||
The output of cSHAKE128 is variable per the needs of a specific | The output of cSHAKE128 is variable per the needs of a specific | |||
ORCHID construction. It is at most 96 bits long and is directly used | ORCHID construction. It is at most 96 bits long and is directly used | |||
in the ORCHID (without truncation). | in the ORCHID (without truncation). | |||
+=======+===========+=========+===========+====================+ | +=======+===========+=========+===========+====================+ | |||
| Index | Hash | HMAC | Signature | Description | | | Index | Hash | HMAC | Signature | Description | | |||
| | function | | algorithm | | | | | function | | algorithm | | | |||
skipping to change at line 1032 ¶ | skipping to change at line 1034 ¶ | |||
[RFC6890]. Future additions to this subregistry are to be made | [RFC6890]. Future additions to this subregistry are to be made | |||
through Expert Review (Section 4.5 of [RFC8126]). Entries with | through Expert Review (Section 4.5 of [RFC8126]). Entries with | |||
network-specific prefixes may be present in the registry. | network-specific prefixes may be present in the registry. | |||
+==========+======+==============+===========+ | +==========+======+==============+===========+ | |||
| HHIT Use | Bits | Value | Reference | | | HHIT Use | Bits | Value | Reference | | |||
+==========+======+==============+===========+ | +==========+======+==============+===========+ | |||
| DET | 28 | 2001:30::/28 | RFC 9374 | | | DET | 28 | 2001:30::/28 | RFC 9374 | | |||
+----------+------+--------------+-----------+ | +----------+------+--------------+-----------+ | |||
Table 8 | Table 8: Registered DET IPv6 Prefix | |||
Criteria that should be applied by the designated experts includes | Criteria that should be applied by the designated experts includes | |||
determining whether the proposed registration duplicates existing | determining whether the proposed registration duplicates existing | |||
functionality and whether the registration description is clear and | functionality and whether the registration description is clear and | |||
fits the purpose of this registry. | fits the purpose of this registry. | |||
Registration requests MUST be sent to drip-reg-review@ietf.org and be | Registration requests MUST be sent to drip-reg-review@ietf.org and be | |||
evaluated within a three-week review period on the advice of one or | evaluated within a three-week review period on the advice of one or | |||
more designated experts. Within that review period, the designated | more designated experts. Within that review period, the designated | |||
experts will either approve or deny the registration request, and | experts will either approve or deny the registration request, and | |||
skipping to change at line 1076 ¶ | skipping to change at line 1078 ¶ | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
| ECDSA_LOW/SHA-1 | 3 | [RFC7401] | | | ECDSA_LOW/SHA-1 | 3 | [RFC7401] | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
| EdDSA/cSHAKE128 | 5 | RFC 9374 | | | EdDSA/cSHAKE128 | 5 | RFC 9374 | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
| HDA Private Use 1 | 254 | RFC 9374 | | | HDA Private Use 1 | 254 | RFC 9374 | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
| HDA Private Use 2 | 255 | RFC 9374 | | | HDA Private Use 2 | 255 | RFC 9374 | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
Table 9 | Table 9: Registered HHIT Suite IDs | |||
The HHIT Suite ID values 1 - 31 are reserved for IDs that MUST be | The HHIT Suite ID values 1 - 31 are reserved for IDs that MUST be | |||
replicated as HIT Suite IDs (Section 8.4) as is 5 here. Higher | replicated as HIT Suite IDs (Section 8.4) as is 5 here. Higher | |||
values (32 - 255) are for those Suite IDs that need not or cannot be | values (32 - 255) are for those Suite IDs that need not or cannot be | |||
accommodated as a HIT Suite ID. | accommodated as a HIT Suite ID. | |||
8.3. IANA CGA Registry Update | 8.3. IANA CGA Registry Update | |||
This document has been added as a reference for the "CGA Extension | This document has been added as a reference for the "CGA Extension | |||
Type Tags" registry [IANA-CGA]. IANA has the following Context ID in | Type Tags" registry [IANA-CGA]. IANA has the following Context ID in | |||
skipping to change at line 1118 ¶ | skipping to change at line 1120 ¶ | |||
This document defines the new EdDSA Host ID with value 13 | This document defines the new EdDSA Host ID with value 13 | |||
(Section 3.4.1) in the "HI Algorithm" subregistry of the "Host | (Section 3.4.1) in the "HI Algorithm" subregistry of the "Host | |||
Identity Protocol (HIP) Parameters" registry. | Identity Protocol (HIP) Parameters" registry. | |||
+===================+=======+===========+ | +===================+=======+===========+ | |||
| Algorithm Profile | Value | Reference | | | Algorithm Profile | Value | Reference | | |||
+===================+=======+===========+ | +===================+=======+===========+ | |||
| EdDSA | 13 | [RFC8032] | | | EdDSA | 13 | [RFC8032] | | |||
+-------------------+-------+-----------+ | +-------------------+-------+-----------+ | |||
Table 11 | Table 11: Registered HI Algorithm | |||
EdDSA Curve Label: | EdDSA Curve Label: | |||
This document specifies a new algorithm-specific subregistry named | This document specifies a new algorithm-specific subregistry named | |||
"EdDSA Curve Label". The values for this subregistry are defined | "EdDSA Curve Label". The values for this subregistry are defined | |||
in Section 3.4.1.1. Future additions to this subregistry are to | in Section 3.4.1.1. Future additions to this subregistry are to | |||
be made through IETF Review (Section 4.8 of [RFC8126]). | be made through IETF Review (Section 4.8 of [RFC8126]). | |||
+===========+==============+=========+============+ | +===========+==============+=========+============+ | |||
| Algorithm | Curve | Value | Reference | | | Algorithm | Curve | Value | Reference | | |||
+===========+==============+=========+============+ | +===========+==============+=========+============+ | |||
skipping to change at line 1142 ¶ | skipping to change at line 1144 ¶ | |||
+-----------+--------------+---------+------------+ | +-----------+--------------+---------+------------+ | |||
| EdDSA | EdDSA25519ph | 2 | [RFC8032] | | | EdDSA | EdDSA25519ph | 2 | [RFC8032] | | |||
+-----------+--------------+---------+------------+ | +-----------+--------------+---------+------------+ | |||
| EdDSA | EdDSA448 | 3 | [RFC8032] | | | EdDSA | EdDSA448 | 3 | [RFC8032] | | |||
+-----------+--------------+---------+------------+ | +-----------+--------------+---------+------------+ | |||
| EdDSA | EdDSA448ph | 4 | [RFC8032] | | | EdDSA | EdDSA448ph | 4 | [RFC8032] | | |||
+-----------+--------------+---------+------------+ | +-----------+--------------+---------+------------+ | |||
| | | 5-65535 | Unassigned | | | | | 5-65535 | Unassigned | | |||
+-----------+--------------+---------+------------+ | +-----------+--------------+---------+------------+ | |||
Table 12 | Table 12: Registered EdDSA Curve Labels | |||
HIT Suite ID: | HIT Suite ID: | |||
This document defines the new HIT Suite of EdDSA/cSHAKE with value | This document defines the new HIT Suite of EdDSA/cSHAKE with value | |||
5 (Section 3.4.2) in the "HIT Suite ID" subregistry of the "Host | 5 (Section 3.4.2) in the "HIT Suite ID" subregistry of the "Host | |||
Identity Protocol (HIP) Parameters" registry. | Identity Protocol (HIP) Parameters" registry. | |||
+=================+=======+===========+ | +=================+=======+===========+ | |||
| Suite ID | Value | Reference | | | Suite ID | Value | Reference | | |||
+=================+=======+===========+ | +=================+=======+===========+ | |||
| EdDSA/cSHAKE128 | 5 | RFC 9374 | | | EdDSA/cSHAKE128 | 5 | RFC 9374 | | |||
+-----------------+-------+-----------+ | +-----------------+-------+-----------+ | |||
Table 13 | Table 13: Registered HIT Suite of | |||
EdDSA/cSHAKE | ||||
The HIT Suite ID 4-bit values 1 - 15 and 8-bit values 0x00 - 0x0F | The HIT Suite ID 4-bit values 1 - 15 and 8-bit values 0x00 - 0x0F | |||
MUST be replicated as HHIT Suite IDs (Section 8.2) as is 5 here. | MUST be replicated as HHIT Suite IDs (Section 8.2) as is 5 here. | |||
9. Security Considerations | 9. Security Considerations | |||
The 64-bit hash in HHITs presents a real risk of second pre-image | The 64-bit hash in HHITs presents a real risk of second pre-image | |||
cryptographic hash attack (see Section 9.5). There are no known (to | cryptographic hash attack (see Section 9.5). There are no known (to | |||
the authors) studies of hash size impact on cryptographic hash | the authors) studies of hash size impact on cryptographic hash | |||
attacks. | attacks. | |||
skipping to change at line 1703 ¶ | skipping to change at line 1706 ¶ | |||
+------------------+-------------------------------------+------+ | +------------------+-------------------------------------+------+ | |||
| 2^72 | 1B | 10B | | | 2^72 | 1B | 10B | | |||
+------------------+-------------------------------------+------+ | +------------------+-------------------------------------+------+ | |||
| 2^68 | 250M | 2.5B | | | 2^68 | 250M | 2.5B | | |||
+------------------+-------------------------------------+------+ | +------------------+-------------------------------------+------+ | |||
| 2^64 | 66M | 663M | | | 2^64 | 66M | 663M | | |||
+------------------+-------------------------------------+------+ | +------------------+-------------------------------------+------+ | |||
| 2^60 | 16M | 160M | | | 2^60 | 16M | 160M | | |||
+------------------+-------------------------------------+------+ | +------------------+-------------------------------------+------+ | |||
Table 15 | Table 15: Approximate Population Size With Collision Risk | |||
Acknowledgments | Acknowledgments | |||
Dr. Gurtov is an adviser on Cybersecurity to the Swedish Civil | Dr. Gurtov is an adviser on Cybersecurity to the Swedish Civil | |||
Aviation Administration. | Aviation Administration. | |||
Quynh Dang of NIST gave considerable guidance on using Keccak and the | Quynh Dang of NIST gave considerable guidance on using Keccak and the | |||
supporting NIST documents. Joan Deamen of the Keccak team was | supporting NIST documents. Joan Deamen of the Keccak team was | |||
especially helpful in many aspects of using Keccak. Nicholas | especially helpful in many aspects of using Keccak. Nicholas | |||
Gajcowski [CFRG-COMMENT] provided a concise hash pre-image security | Gajcowski [CFRG-COMMENT] provided a concise hash pre-image security | |||
End of changes. 20 change blocks. | ||||
22 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |