Hi, one more reflection on this:

- People have requested EDHOC as well as EAP with PSK authentication. For the 
first protocol run (i.e., not resumption) ephemeral key exchange should be a 
requirement. A PSK with ephemeral ECDH mode can be used for more than 
resumption.

Tero Kivinen wrote:

> and doing Diffie-Hellman for each of them would be too costly

I agree that was true in the past. Do you think that is still the case for an 
optimized implementation of modern algorithms running on new CPUs? As I wrote 
in draft-mattsson-tls-psk-ke-dont-dont-don’t:

  “Modern ephemeral key exchange algorithms like x25519 [RFC7748] are
   very fast and have small message overhead.  The public keys are 32
   bytes long and the cryptographic operations take 53 microseconds per
   endpoint on a single core AMD Ryzen 5 5560U [eBACS-DH].  Ephemeral
   key exchange with the quantum-resistant algorithm Kyber that NIST
   will standardize is even faster.  For the current non-standardized
   version of Kyber512 the cryptographic operations take 12 microseconds
   for the client and 8 microseconds for the server [eBACS-KEM].”

(running times on constrained IoT devices would of course be much longer)

Cheers,
John


From: Tero Kivinen <kivi...@iki.fi>
Date: Sunday, 29 January 2023 at 16:32
To: Rafa Marín López <r...@um.es>
Cc: John Mattsson <john.matts...@ericsson.com>, l...@ietf.org <l...@ietf.org>, 
EMU WG <emu@ietf.org>
Subject: Re: [Lake] EDHOC rekey
Rafa Marín López writes:
> Hi John:
>     - 2) Use PSK with ECDHE (similar to psk_dhe_ke in TLS)
>
> Let me also add here, as a reference, IKEv2. Basically, section 1.3.2 in RFC
> 7296 shows a 1-RTT exchange including DH exchange and nonces to regenerate the
> IKE security association.
>
>     - 3) Use PSK with exchanged random values (similar to psk_ke in TLS)
>
> Curiously, when IKEv2 tries to generate key material for the IPsec security
> associations (and not for the IKEv2 SA) allows just sending nonces (see
> section 1.3.3 in RFC 7296), though there is also the possibility to include a
> DH exchange. I mention this because EDHOC can be used to regenerate OSCORE
> contexts.

IKEv2 allows doing IPsec SA rekeys without Diffie-Hellman because
there might be thousands of those between two gateways, and doing
Diffie-Hellman for each of them would be too costly. I.e., it allows
per SA decision whether you need PFS or not. If you are rekeying SA
just because your traffic counters roll over, there is no need to do
PFS.

Note, in this context the Diffie-Hellman secret to protect IKE SA is
considered as "long term secret", i.e., breaking that will allow you
to see the IKEv2 SA traffic, thus break all the IPsec SAs negotiated
over that IKE SA unless they did their own Diffie-Hellman. Doing IKE
SA rekey will redo that Diffie-Hellman, meaning attacker need to break
that new Diffie-Hellman secret again to allow it to break new IPsec
SAs created after rekey.

For IKE SA rekeys there was no point to do rekey without doing
Diffie-Hellman, so thats why doing Diffie-Hellman there is mandatory.
--
kivi...@iki.fi
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to