On Fri, May 8, 2020, at 17:08, Salz, Rich wrote:
> It cites it, but doesn't include it in the 800-56 doc.

Maybe I'm confused too, but it sounds like it's included to me. The
definition of the KDF includes:

> The  first  (randomness-extraction)  step  uses  either  HMAC  … If
> HMAC-hash is used in the randomness- extraction step, then the same
> HMAC-hash (i.e., using the same hash function, hash) shall be used as
> the PRF in the key-expansion step

This sounds like this would allow for HKDF as defined in RFC 5869 (which
as far as I can tell is the same thing except with HMAC required in both
steps instead of giving you the option of using AES-CMAC), unless I've
misunderstood something (not being anywhere near an expert on this
topic, this is quite possible — even likely).

Afterwards, it cites 5869 in such a way that sounds like it's saying
that it's a subset of the approved algorithm (although "a version" is
vague and confusing):

> [RFC 5869] specifies a version of the above extraction-then-expansion
> key-derivation procedure using HMAC for both the extraction and
> expansion steps. For an extensive discussion concerning the rationale
> for the extract-and-expand mechanisms specified in this
> Recommendation, see [LNCS 6223].

The last citation in that paragraph to LNCS 6223 appears to give a long
justification for why HKDF is secure, which all together makes it sound
like HKDF is an approved algorithm and thus TLS 1.3 will be okay.

—Sam

-- 
Sam Whited

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to