<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-oscore-key-limits-06" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Key Usage Limits for OSCORE">Key Usage Limits for OSCORE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-key-limits-06"/>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2026" month="January" day="07"/>
    <area>Internet</area>
    <workgroup>CoRE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 56?>

<t>Object Security for Constrained RESTful Environments (OSCORE) uses AEAD algorithms to ensure confidentiality and integrity of exchanged messages. Due to known issues allowing forgery attacks against AEAD algorithms, limits should be followed regarding the number of times a specific key is used for encryption or decryption. Among other reasons, approaching key usage limits requires updating the OSCORE keying material before communications can securely continue. This document defines how two OSCORE peers can follow these key usage limits and what steps they should take to preserve the security of their communications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/oscore-key-limits"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> provides end-to-end protection of CoAP <xref target="RFC7252"/> messages at the application-layer, ensuring message confidentiality and integrity, replay protection, as well as binding of response to request between a sender and a recipient.</t>
      <t>OSCORE uses AEAD algorithms to provide confidentiality and integrity of messages exchanged between two peers. Due to known issues which allows forgery attacks against AEAD algorithms, limits should be followed on the number of times a specific key is used to perform encryption or decryption <xref target="I-D.irtf-cfrg-aead-limits"/>.</t>
      <t>The OSCORE specification <xref target="RFC8613"/> does not consider such key usage limits. However, should they be exceeded, an adversary may break the security properties of the used AEAD algorithm, such as message confidentiality and integrity, e.g., by performing a message forgery attack. This and other reasons require that peers who are approaching the key usage limits update the OSCORE keying material before communications can securely continue. This document defines what steps an OSCORE peer should take to preserve the security of its communications, by stopping the use of an OSCORE Security Context shared with another peer when approaching the key usage limits.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with the terms and concepts related to CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/>.</t>
      </section>
    </section>
    <section anchor="aead-key-usage-limits-in-oscore">
      <name>AEAD Key Usage Limits in OSCORE</name>
      <t>This section details how key usage limits for AEAD algorithms can be considered when using OSCORE. In particular, it discusses specific limits for common AEAD algorithms used with OSCORE; parameters to track associated with an OSCORE Security Context; and additions to the OSCORE message processing.</t>
      <section anchor="problem-overview">
        <name>Problem Overview</name>
        <t>The OSCORE security protocol <xref target="RFC8613"/> uses AEAD algorithms to provide integrity and confidentiality of messages, as exchanged between two peers sharing an OSCORE Security Context.</t>
        <t>When processing messages with OSCORE, each peer should follow specific limits as to the number of times it uses a specific key. This applies separately to the Sender Key used to encrypt outgoing messages, and to the Recipient Key used to decrypt and verify incoming protected messages.</t>
        <t>Exceeding these limits may allow an adversary to break the security properties of the AEAD algorithm, such as message confidentiality and integrity, e.g., by performing a message forgery attack.</t>
        <t>The following refers to the two parameters 'q' and 'v' introduced in <xref target="I-D.irtf-cfrg-aead-limits"/>, to use when deploying an AEAD algorithm.</t>
        <ul spacing="normal">
          <li>
            <t>'q': this parameter has as value the number of messages protected with a specific key, i.e., the number of times the AEAD algorithm has been invoked to encrypt data with that key.</t>
          </li>
          <li>
            <t>'v': this parameter has as value the number of alleged forgery attempts that have been made against a specific key, i.e., the number of failed decryptions that have occurred with the AEAD algorithm for that key.</t>
          </li>
        </ul>
        <t>When a peer uses OSCORE:</t>
        <ul spacing="normal">
          <li>
            <t>The key used to protect outgoing messages is its Sender Key from its Sender Context.</t>
          </li>
          <li>
            <t>The key used to decrypt and verify incoming messages is its Recipient Key from its Recipient Context.</t>
          </li>
        </ul>
        <t>Both keys are derived as part of the establishment of the OSCORE Security Context, as defined in <xref section="3.2" sectionFormat="of" target="RFC8613"/>.</t>
        <t>As mentioned above, exceeding specific limits for the 'q' or 'v' value can weaken the security properties of the AEAD algorithm used, thus compromising secure communication requirements.</t>
        <t>Therefore, in order to preserve the security of the used AEAD algorithm, OSCORE has to observe limits for the 'q' and 'v' values, throughout the lifetime of the used AEAD keys.</t>
        <section anchor="limits">
          <name>Limits for 'q' and 'v'</name>
          <t>Formulas for calculating the security levels, as Integrity Advantage (IA) and Confidentiality Advantage (CA) probabilities, are presented in <xref target="I-D.irtf-cfrg-aead-limits"/>. These formulas take as input specific values for 'q' and 'v' (see section <xref target="problem-overview"/>) and for 'l', i.e., the maximum length of each message (in cipher blocks).</t>
          <t>For the algorithms shown in <xref target="algorithm-limits"/> that can be used as AEAD Algorithm for OSCORE, the main property to achieve is having IA and CA values which are no larger than p = 2^-64, which will ensure a safe security level for the AEAD Algorithm. This can be achieved by using the values q = 2^20, v = 2^20, and l = 2^10, that this document recommends using for these algorithms.</t>
          <t><xref target="algorithm-limits"/> also shows the resulting IA and CA probabilities enjoyed by the considered algorithms, when taking the value of 'q', 'v' and 'l' above as input to the formulas defined in <xref target="I-D.irtf-cfrg-aead-limits"/>.</t>
          <figure anchor="algorithm-limits">
            <name>Probabilities for algorithms based on chosen q, v and l values.</name>
            <artwork align="center"><![CDATA[
+------------------------+----------------+----------------+
| Algorithm name         | IA probability | CA probability |
|------------------------+----------------+----------------|
| AEAD_AES_128_CCM       | 2^-64          | 2^-66          |
| AEAD_AES_128_GCM       | 2^-97          | 2^-89          |
| AEAD_AES_256_GCM       | 2^-97          | 2^-89          |
| AEAD_CHACHA20_POLY1305 | 2^-73          | -              |
+------------------------+----------------+----------------+
]]></artwork>
          </figure>
          <t>When AEAD_AES_128_CCM_8 is used as AEAD Algorithm for OSCORE, the triplet (q, v, l) considered above yields larger values of IA and CA. Hence, specifically for AEAD_AES_128_CCM_8, this document recommends using the triplet (q, v, l) = (2^20, 2^14, 2^8). This is appropriate, since the resulting CA and IA values are not greater than the threshold value of 2^-50 defined in <xref target="I-D.irtf-cfrg-aead-limits"/>, and thus yields an acceptable security level. Achieving smaller values of CA and IA would require inconveniently reducing 'q', 'v' or 'l', with no corresponding increase in terms of security, as further elaborated in <xref target="aead-aes-128-ccm-8-details"/>.</t>
          <figure anchor="l-values-as-bytes">
            <name>Maximum length of each message (in bytes)</name>
            <artwork align="center"><![CDATA[
+------------------------+----------+----------+-----------+
| Algorithm name         | l=2^6 in | l=2^8 in | l=2^10 in |
|                        | bytes    | bytes    | bytes     |
|------------------------+----------+----------|-----------|
| AEAD_AES_128_CCM       | 1024     | 4096     | 16384     |
| AEAD_AES_128_GCM       | 1024     | 4096     | 16384     |
| AEAD_AES_256_GCM       | 1024     | 4096     | 16384     |
| AEAD_AES_128_CCM_8     | 1024     | 4096     | 16384     |
| AEAD_CHACHA20_POLY1305 | 4096     | 16384    | 65536     |
+------------------------+----------+----------+-----------+
]]></artwork>
          </figure>
          <t>With regards to the limit for 'l', the recommended 'l' value for the algorithms shown in <xref target="algorithm-limits"/>, and for AEAD_AES_128_CCM_8, is 2^10 (16384 bytes) and 2^8 (4096 bytes) respectively. Considering a typical MTU size of 1500 bytes, and the fact that the maximum block size when using block-wise transfers with CoAP is 1024 bytes (see <xref section="2" sectionFormat="of" target="RFC7959"/>), it is unlikely that a larger size of 'l' than what is recommended makes sense to use in typical network setups.</t>
          <t>However, although under typical circumstances an 'l' limit of 2^8 (4096 bytes) is acceptable, exceptional cases can warrant a higher value of 'l'. For instance, Block-wise Extension for Reliable Transport (BERT) extends the CoAP Block-Wise transfer functionality, enabling use of larger messages over reliable transports such as TCP or WebSockets (see <xref target="RFC8323"/>). In case the OSCORE peers wish to take full advantage of BERT functionality and the large message sizes it allows for, the OSCORE peers must use higher values of 'l'.</t>
          <t>An alternative means of allowing for larger values of 'l', while still maintaining the security properties of the used AEAD algorithm, is to adjust the 'q' and 'v' values to compensate. In practice, this means reducing the value of 'q' and 'v' considering the new value of 'l', to ensure an acceptably low value of the IA and CA probabilities. A reasonable target for the IA and CA probability values is the threshold value of 2^-50 defined in <xref target="I-D.irtf-cfrg-aead-limits"/>.</t>
        </section>
      </section>
      <section anchor="context">
        <name>Additional Information in the Security Context</name>
        <t>In addition to what is defined in <xref section="3.1" sectionFormat="of" target="RFC8613"/>, the following parameters associated with an OSCORE Security Context can be used for keeping track of the expiration of that OSCORE Security Context and maintaining key usage below safe limits.</t>
        <section anchor="common-context">
          <name>Common Context</name>
          <t>The Common Context has the following associated parameter.</t>
          <ul spacing="normal">
            <li>
              <t>'exp': with value the expiration time of the OSCORE Security Context, as a non-negative integer. The parameter contains a numeric value representing the number of seconds from 1970-01-01T00:00:00Z UTC until the specified UTC date/time, ignoring leap seconds, analogous to what is specified for NumericDate in <xref section="2" sectionFormat="of" target="RFC7519"/>.  </t>
              <t>
At the time indicated by this parameter, a peer must stop using this Security Context to process any incoming or outgoing messages, and is required to establish a new Security Context to continue OSCORE-protected communications with the other peer. That is, the expiration of an OSCORE Security Context means that the current Sender Key must no longer be used for protecting outgoing messages, and the Recipient Key must no longer be used for unprotecting incoming messages.  </t>
              <t>
The value of 'exp' must be set upon installing the OSCORE Security Context, namely at time t_1, considering a lifetime value t_l. In particular, t_l can be a default value (potentially differing between the two peers sharing the OSCORE Security Context), or can be agreed by the two peers during the establishment of the OSCORE Security Context. For instance, this value may be stored and/or transported in an OSCORE LwM2M object, or specified as part of an EDHOC Application Profile <xref section="3.9" sectionFormat="of" target="RFC9528"/> used when executing EDHOC to establish the OSCORE Security Context. Regardless of how the lifetime value is determined, the 'exp' parameter is set to indicate the point in time corresponding to t_1 offset by t_l.</t>
            </li>
          </ul>
        </section>
        <section anchor="sender-context">
          <name>Sender Context</name>
          <t>The Sender Context has the following associated parameters.</t>
          <ul spacing="normal">
            <li>
              <t>'count_q': a non-negative integer counter, keeping track of the current 'q' value for the Sender Key. At any time, 'count_q' has as value the number of messages that have been encrypted using the Sender Key. The value of 'count_q' is set to 0 when establishing the Sender Context.</t>
            </li>
            <li>
              <t>'limit_q': a non-negative integer, which specifies the highest value that 'count_q' is allowed to reach, before stopping using the Sender Key to process outgoing messages.  </t>
              <t>
The value of 'limit_q' depends on the AEAD algorithm specified in the Common Context, considering the properties of that algorithm. The value of 'limit_q' is determined according to <xref target="limits"/>.</t>
            </li>
          </ul>
          <t>Note for implementors: it is possible to avoid storing and maintaining the counter 'count_q'. Rather, an estimated value to be compared against 'limit_q' can be computed, by leveraging the Sender Sequence Number (SSN) of the peer and (an estimate of) the other peer's SSN. A possible method to achieve this is described in <xref target="estimation-count-q"/>. While this relieves peers from storing and maintaining the precise 'count_q' value, it results in overestimating the number of encryptions performed with a Sender Key. This in turn results in approaching 'limit_q' sooner and thus in performing a key update procedure more frequently.</t>
        </section>
        <section anchor="recipient-context">
          <name>Recipient Context</name>
          <t>The Recipient Context has the following associated parameters.</t>
          <ul spacing="normal">
            <li>
              <t>'count_v': a non-negative integer counter, keeping track of the current 'v' value for the Recipient Key. At any time, 'count_v' has as value the number of failed decryptions occurred for incoming messages using the Recipient Key. The value of 'count_v' is set to 0 when establishing the Recipient Context.</t>
            </li>
            <li>
              <t>'limit_v': a non-negative integer, which specifies the highest value that 'count_v' is allowed to reach, before stopping using the Recipient Key to process incoming messages.  </t>
              <t>
The value of 'limit_v' depends on the AEAD algorithm specified in the Common Context, considering the properties of that algorithm. The value of 'limit_v' is determined according to <xref target="limits"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="oscore-message-processing">
        <name>OSCORE Message Processing</name>
        <t>To keep track of the 'q' and 'v' values and ensure that AEAD keys are not used beyond reaching their limits, OSCORE peers protect messages with OSCORE as defined in this section.</t>
        <t>A limitation that is introduced is that, in order to not exceed the selected value for 'l', the total size of the COSE plaintext <xref target="RFC9052"/>, authentication Tag, and possible cipher padding for a message must not exceed the block size for the selected algorithm multiplied with 'l‘. The size of the COSE plaintext is calculated as described in <xref section="5.3" sectionFormat="of" target="RFC8613"/>.</t>
        <t>If OSCORE peers need to transmit messages exceeding the maximum recommended size calculated from 'l', CoAP Block-Wise transfers <xref target="RFC7959"/> may be used to split content into smaller segments. The following steps can be adopted by a client or server to determine whether the usage of block-wise transfer is necessary for the transmission of a specific OSCORE protected message.</t>
        <ol spacing="normal" type="1"><li>
            <t>The CoAP message to transmit is first produced.</t>
          </li>
          <li>
            <t>The sum of the total size of the COSE plaintext, the length of the authentication tag, and the length of any potential ciphertext padding should be computed to produce a value T. It should be noted that the size of the padding and the length of the authentication tag depend on the used AEAD algorithm.</t>
          </li>
          <li>
            <t>If the value of T exceeds the 'l' value for the used AEAD algorithm, block-wise transfer is to be used with the CoAP message before protecting it with OSCORE.</t>
          </li>
        </ol>
        <t>The processing of CoAP messages with OSCORE follows the steps outlined in <xref section="8" sectionFormat="of" target="RFC8613"/>, with the additions defined below.</t>
        <section anchor="protecting-req-resp">
          <name>Protecting a Request or a Response</name>
          <t>Before encrypting the COSE object using the Sender Key, the 'count_q' counter is incremented.</t>
          <t>If 'count_q' exceeds the 'limit_q' limit, the message processing is aborted. From then on, the Sender Key must not be used to encrypt further messages.</t>
        </section>
        <section anchor="verifying-req-resp">
          <name>Verifying a Request or a Response</name>
          <t>If an incoming message is detected to be a replay (see <xref section="7.4" sectionFormat="of" target="RFC8613"/>), the 'count_v' counter is not incremented.</t>
          <t>If the decryption and verification of the COSE object using the Recipient Key fails, the 'count_v' counter is incremented.</t>
          <t>After 'count_v' has exceeded the 'limit_v' limit, incoming messages must not be decrypted and verified using the Recipient Key, and their processing must be aborted.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document mainly covers security considerations about using AEAD keys in OSCORE and their usage limits, in addition to the security considerations of <xref target="RFC8613"/>.</t>
      <t>[TODO: Add more considerations.]</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther" initials="F." surname="Günther">
              <organization>IBM Research Europe - Zurich</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="December" year="2025"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-11"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
    </references>
    <?line 224?>

<section anchor="aead-aes-128-ccm-8-details">
      <name>Detailed considerations for AEAD_AES_128_CCM_8</name>
      <t>For the AEAD_AES_128_CCM_8 algorithm when used as AEAD Algorithm for OSCORE, larger IA and CA values are achieved, depending on the value of 'q', 'v' and 'l'. <xref target="algorithm-limits-ccm8"/> shows the resulting IA and CA probabilities enjoyed by AEAD_AES_128_CCM_8, when taking different values of 'q', 'v' and 'l' as input to the formulas defined in <xref target="I-D.irtf-cfrg-aead-limits"/>.</t>
      <t>As shown in <xref target="algorithm-limits-ccm8"/>, it is especially possible to achieve the lowest IA = 2^-50 and a good CA = 2^-70 by considering the largest possible value of the (q, v, l) triplet equal to (2^20, 2^10, 2^8), while still keeping a good security level. Note that the value of 'l' does not impact the IA, while CA displays good values for every considered value of 'l'.</t>
      <figure anchor="algorithm-limits-ccm8">
        <name>Probabilities for AEAD_AES_128_CCM_8 based on chosen q, v and l values.</name>
        <artwork align="center"><![CDATA[
+-----------------------+----------------+----------------+
| 'q', 'v' and 'l'      | IA probability | CA probability |
|-----------------------+----------------+----------------|
| q=2^20, v=2^20, l=2^8 | 2^-44          | 2^-70          |
| q=2^15, v=2^20, l=2^8 | 2^-44          | 2^-80          |
| q=2^10, v=2^20, l=2^8 | 2^-44          | 2^-90          |
| q=2^20, v=2^15, l=2^8 | 2^-49          | 2^-70          |
| q=2^15, v=2^15, l=2^8 | 2^-49          | 2^-80          |
| q=2^10, v=2^15, l=2^8 | 2^-49          | 2^-90          |
| q=2^20, v=2^14, l=2^8 | 2^-50          | 2^-70          |
| q=2^15, v=2^14, l=2^8 | 2^-50          | 2^-80          |
| q=2^10, v=2^14, l=2^8 | 2^-50          | 2^-90          |
| q=2^20, v=2^10, l=2^8 | 2^-54          | 2^-70          |
| q=2^15, v=2^10, l=2^8 | 2^-54          | 2^-80          |
| q=2^10, v=2^10, l=2^8 | 2^-54          | 2^-90          |
|-----------------------+----------------+----------------|
| q=2^20, v=2^20, l=2^6 | 2^-44          | 2^-74          |
| q=2^15, v=2^20, l=2^6 | 2^-44          | 2^-84          |
| q=2^10, v=2^20, l=2^6 | 2^-44          | 2^-94          |
| q=2^20, v=2^15, l=2^6 | 2^-49          | 2^-74          |
| q=2^15, v=2^15, l=2^6 | 2^-49          | 2^-84          |
| q=2^10, v=2^15, l=2^6 | 2^-49          | 2^-94          |
| q=2^20, v=2^14, l=2^6 | 2^-50          | 2^-74          |
| q=2^15, v=2^14, l=2^6 | 2^-50          | 2^-84          |
| q=2^10, v=2^14, l=2^6 | 2^-50          | 2^-94          |
| q=2^20, v=2^10, l=2^6 | 2^-54          | 2^-74          |
| q=2^15, v=2^10, l=2^6 | 2^-54          | 2^-84          |
| q=2^10, v=2^10, l=2^6 | 2^-54          | 2^-94          |
+-----------------------+----------------+----------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="estimation-count-q">
      <name>Estimation of 'count_q'</name>
      <t>This section defines a method to compute an estimate of the counter 'count_q' (see <xref target="sender-context"/>), hence not requiring a peer to store it in its own Sender Context.</t>
      <t>This method relies on the fact that, at any point in time, a peer has performed <em>at most</em> ENC = (SSN + SSN*) encryptions using its own Sender Key, where:</t>
      <ul spacing="normal">
        <li>
          <t>SSN is the current value of this peer's Sender Sequence Number.</t>
        </li>
        <li>
          <t>SSN* is the current value of other peer's Sender Sequence Number. That is, SSN* is an overestimation of the responses without Partial IV that this peer has sent.</t>
        </li>
      </ul>
      <t>Thus, when protecting an outgoing message (see <xref target="protecting-req-resp"/>), the peer aborts the message processing if the estimated est_q &gt; limit_q, where est_q = (SSN + X) and X is determined as follows.</t>
      <ul spacing="normal">
        <li>
          <t>If the outgoing message is a response, X is the Partial IV specified in the corresponding request that this peer is responding to. Note that X &lt; SSN* always holds.</t>
        </li>
        <li>
          <t>If the outgoing message is a request, X is the highest Partial IV value marked as received in this peer's Replay Window plus 1, or 0 if it has not accepted any protected message from the other peer yet. That is, X is the highest Partial IV specified in a message received from the other peer, i.e., the highest seen Sender Sequence Number of the other peer. Note that, also in this case, X &lt; SSN* always holds.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-05-06">
        <name>Version -05 to -06</name>
        <ul spacing="normal">
          <li>
            <t>Editorial.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-04-05">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>
            <t>Editorial updates.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>
            <t>Various editorial updates.</t>
          </li>
          <li>
            <t>Improved references.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Updated references.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Extended discussion on setting the lifetime of OSCORE Security Contexts.</t>
          </li>
          <li>
            <t>Mention adjusting the 'q' and 'v' values to compensate for a larger 'l' value.</t>
          </li>
          <li>
            <t>Specify how to perform pre-calculation of message size to determine need for block-wise.</t>
          </li>
          <li>
            <t>Cover exceptional cases where the 'l' value needs to be larger than 2^8.</t>
          </li>
          <li>
            <t>Note on relevance of 'l' limit considering maximum block size and typical MTU.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>
            <t>Editorial improvements.</t>
          </li>
          <li>
            <t>Extended terminology.</t>
          </li>
          <li>
            <t>Recommendation on limits for CCM_8. Details in Appendix.</t>
          </li>
          <li>
            <t>Example of method to estimate and not store 'count_q'.</t>
          </li>
          <li>
            <t>Split out material from Key Update for OSCORE draft into this new document.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Göran Selander"/> and <contact fullname="Rafa Marin-Lopez"/> for their feedback and comments.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
