<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ochkas-cose-ascon-01" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Ascon-AEAD128 for JOSE and COSE</title>

    <author initials="D." surname="Ochkas" fullname="Dmytro Ochkas">
      <organization>IMT Atlantique</organization>
      <address>
        <email>dmytro.ochkas@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="H." surname="Le Bouder" fullname="Hélène Le Bouder">
      <organization>IMT Atlantique</organization>
      <address>
        <email>helene.le-bouder@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization>IMT Atlantique</organization>
      <address>
        <email>alexander.pelov@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2025" month="January" day="21"/>

    <area>General</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 88?>

<t>This document describes JSON Object Signing and Encryption (JOSE) and
CBOR Object Signing and Encryption (COSE) serializations with Ascon which
received a lot of attention in the area of lightweight cryptography.</t>

<t>In 2019, as a part of CAESAR competition, Ascon-128 and Ascon-128a were
selected as the first choice for the lightweight authenticated encryption <xref target="asconv1.2-caesar"></xref>.
After, in 2023, National Institute of Standards and Technology (NIST) selected
Ascon family of cryptographic algorithms to be the standard for lightweight
cryptography <xref target="asconv1.2-nist"></xref>. This recognition makes it particularly interesting to use Ascon with
COSE and JOSE structures.</t>

<t>This document does not define any new cryptography, only
serializations of existing cryptographic systems described in
<xref target="NIST.SP.800-232"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 105?>

<section anchor="intro"><name>Introduction</name>

<t>Constrained networks such as Internet of Things (IoT) networks most of the
time are characterized by the limited computational power and autonomy.
In this context, the choice of suitable cryptographic algorithms that provide 
robust security without consuming large amount of resources is essential.
As a winner of the lightweight cryptography standardization process conducted by
NIST, Ascon family of cryptographic algorithms is a perfect candidate for
the described situation.</t>

<t>Ascon-Based Lightweight Cryptography Standards for Constrained Devices
<xref target="NIST.SP.800-232"/> introduces a suite of algorithms to provide Authenticated
Encryption with Associated Data (AEAD), a hash function, and two eXtendable
Output Functions (XOFs).</t>

<t>This document focuses on the AEAD part of Ascon standard. It enables the
usage of Ascon-AEAD128 with JOSE and COSE for content encryption.</t>

</section>
<section anchor="need"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="algos"><name>Ascon algorithms</name>

<t>In the scope of this document, only the authenticated encryption Ascon
is allowed for. Ascon's encryption and decryption algorithms are parametrized
by the key length k, the rate r, and the internal round numbers a and b.
<xref target="NIST.SP.800-232"/> specifies the Ascon-AEAD128 algorithm with the following parameters:</t>

<texttable title="Ascon-AEAD128 parameters" anchor="asconaeadparams">
      <ttcol align='left'>Key Length, k</ttcol>
      <ttcol align='left'>Rate, r</ttcol>
      <ttcol align='left'>Outer permutation rounds, a</ttcol>
      <ttcol align='left'>Inner permutation rounds, b</ttcol>
      <c>128</c>
      <c>128</c>
      <c>12</c>
      <c>8</c>
</texttable>

<t>COSE encryption and decryption with Ascon-AEAD128 is done in accordance with Section 5.3 of <xref target="RFC9052"/>.</t>

<t>Thus, this document requests the registration of the Ascon-AEAD128 algorithm in <xref target="IANA.cose"/>:</t>

<texttable title="COSE Algorithms for Ascon" anchor="cosealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>alg</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>TBD (requested assignment 35)</c>
      <c>CBOR Object Encryption Algorithm for Ascon-AEAD128</c>
</texttable>

<t>In COSE, keys may be obtained from either a key structure or a recipient structure <xref target="RFC9052"/>.</t>

<t>When using a COSE key for this algorithm, the following checks are made:</t>

<t><list style="symbols">
  <t>The "kty" field MUST be present, and it MUST be "Symmetric".</t>
  <t>If the "alg" field is present, it MUST match the Ascon-AEAD128 algorithm being used.</t>
  <t>If the "key_ops" field is present, it MUST include "encrypt" when encrypting.</t>
  <t>If the "key_ops" field is present, it MUST include "decrypt" when decrypting.</t>
</list></t>

<t>Also, this document requests the registration of the Ascon-AEAD128 algorithm in <xref target="IANA.jose"/>:</t>

<texttable title="JOSE Algorithms for Ascon" anchor="josealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>enc</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128</c>
      <c>JSON Object Encryption Algorithm for Ascon-AEAD128</c>
</texttable>

<t>Implementations that are encrypting or decrypting MUST validate that the key type, key length,
and algorithm are correct and appropriate for the entities involved.</t>

</section>
<section anchor="iv"><name>IV Header Parameter</name>

<t>Unlike some common AEAD algorithms, Ascon distinguishes between the notion
of initialization vector (IV) and nonce (N). While N is the input argument
for the Ascon encryption/decryption functions, IV is the constant defined
for each Ascon algorithm and is based on its parameters.</t>

<t>However, <xref target="IANA.cose"/> does not define a separate header parameter to specify Nonce.
Thus, in COSE, whenever Full Initialization Vector Header Parameter (Name: IV,
Label: 5) or Partial Initialization Vector Header Parameter (Name: Partial IV, Label: 6) is
specified it MUST refer to the N argument of the corresponding Ascon function.</t>

<t>On the other hand, JSON Web Signature and Encryption Header Parameters registry
at <xref target="IANA.jose"/> defines both Nonce Header Parameter ("nonce") and Initialization
Vector Header Parameter ("iv"). However, the "nonce" parameter is intended to be used
only for signatures. That is, in JOSE, "iv" parameters MUST refer to the N argument
of the corresponding Ascon function. There SHOULD NOT be "nonce" parameters specified
while using Ascon for content encryption. In case "nonce" parameter is specified it MUST be ignored.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The security considerations for <xref target="RFC7516"/>, <xref target="RFC7517"/> and <xref target="RFC9053"/> apply to
this specification as well.</t>

<t>According to the most recent security analysis publications, Ascon did not show any
security vulnerabilities so far and the best attacks target the initialization of Ascon
reduced to 7 (out of 12) rounds, concluding that Ascon has a security margin of 5 rounds
(42 % of the 12 rounds).</t>

<t>Refer to the Ascon's List of Published Analysis section at <xref target="asconv1.2-nist"></xref> for more details.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to add the following entries to the COSE Algorithms
Registry. The following completed registration templates are
provided as described in <xref target="RFC9052"/> and <xref target="RFC9053"/>.</t>

<section anchor="ascon-aead128-for-cose"><name>Ascon-AEAD128 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128</t>
  <t>Value: TBD (requested assignment 35)</t>
  <t>Description: CBOR Object Encryption Algorithm with Ascon-AEAD128</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: FIPS XXX</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
</section>
<section anchor="new-jose-algorithms"><name>New JOSE Algorithms</name>

<t>IANA is requested to add the following entries to the JSON Web
Signature and Encryption Algorithms Registry. The following
completed registration templates are provided as described in
<xref target="RFC7518"/>.</t>

<section anchor="ascon-aead128-for-jose"><name>Ascon-AEAD128 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128</t>
  <t>Algorithm Description: Ascon-AEAD128 as described in FIPS XXX.</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): FIPS XXX</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>

<reference anchor="RFC7518">
  <front>
    <title>JSON Web Algorithms (JWA)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7518"/>
  <seriesInfo name="DOI" value="10.17487/RFC7518"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
  <front>
    <title>JSON Object Signing and Encryption (JOSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="asconv1.2-caesar" target="https://competitions.cr.yp.to/round3/asconv12.pdf">
  <front>
    <title>Ascon v1.2, Submission to Round 3 of the CAESAR competition</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="asconv1.2-nist" target="https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf">
  <front>
    <title>Ascon v1.2, Submission to Final Round of the NIST Lightweight Cryptography project</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NIST.SP.800-232" target="https://doi.org/10.6028/NIST.SP.800-232.ipd">
  <front>
    <title>Ascon-Based Lightweight Cryptography Standards for Constrained Devices</title>
    <author initials="M. S." surname="Turan" fullname="Meltem Sönmez Turan">
      <organization></organization>
    </author>
    <author initials="K. A." surname="McKay" fullname="Kerry A. McKay">
      <organization></organization>
    </author>
    <author initials="J." surname="Kang" fullname="Jinkeon Kang">
      <organization></organization>
    </author>
    <author initials="J." surname="Kelsey" fullname="John Kelsey">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/NIST.SP.800-232"/>
</reference>


    </references>

</references>


<?line 263?>

<section anchor="xmp"><name>Examples</name>

<t>This appendix provides some examples of various Ascon-AEAD128 Encryptions with COSE and JOSE</t>

<section anchor="cose"><name>COSE</name>

<section anchor="simple-ascon-aead128-encryption"><name>Simple Ascon-AEAD128 Encryption</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "AAD": "8367456E637279707443A1010140",
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "Encrypt0": "d08344a1011823a1055000000000000000000000000000000000582436ba4da1fa787205e5fff06fd4b645c637c02b505046fb242984864e1f6875c4ae5c9557",
  "Encrypt0_diag": "16([h'A1011823', {5: h'00000000000000000000000000000000'}, h'36BA4DA1FA787205E5FFF06FD4B645C637C02B505046FB242984864E1F6875C4AE5C9557'])"  
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-hkdf-sha-256"><name>Direct Ascon-AEAD128 Encryption with HKDF-SHA-256</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "AAD": "8367456E637279707443A1010140",
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "6F75722D736563726574",
    "kty": "Symmetric"
  },
  "salt": "61616262636364646565666667676868",
  "Encrypt": "d8608444a1011823a105500000000000000000000000000000000058247b09f4de6d93b6779163d978efa2d7eaac699acad60a6a9779168b5569d57ef92d3102bf818343a10129a2044a6f75722d73656372657433506161626263636464656566666767686840",
  "Encrypt_diag": "96([h'A1011823', {5: h'00000000000000000000000000000000'}, h'7B09F4DE6D93B6779163D978EFA2D7EAAC699ACAD60A6A9779168B5569D57EF92D3102BF', [[h'A10129', {4: h'6F75722D736563726574', -20: h'61616262636364646565666667676868'}, h'']]])"
}
]]></artwork></figure>

</section>
</section>
<section anchor="jose"><name>JOSE</name>

<section anchor="direct-compact-jwe-structure-using-ascon-aead128"><name>Direct Compact JWE structure using Ascon-AEAD128</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "protected": {
    "alg":"dir",
    "enc":"Ascon-AEAD128"
  },
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "jwe": "eyJhbGciOiJkaXIiLCJlbmMiOiJBc2Nvbi1BRUFEMTI4In0..AAAAAAAAAAAAAAAAAAAAAA.XjkRZmV9Dy0lpQp_4yUYIY1CGN8.zUqKLKMQnqjXFY258aNMgw"
}


]]></artwork></figure>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

