During the last LAMPS interim call, I mentioned this topic as well. It was 
decided to add support for KEM keys in RFC4210bis.
Sean said, that he is working on a draft on PoP for KEM keys.

Hendrik

> Von: Spasm <spasm-boun...@ietf.org> Im Auftrag von Blumenthal, Uri - 0553 -
> MITLL
> 
> TL;DR
> Need to create a CSR for a key pair whose algorithm does not allow signing
> (either because it’s something like Kyber, or because restriction enforced by
> HSM). How to do it?
> 
> Longer version:
> 
> There are several use cases that require certifying long-term asymmetric keys
> that are only capable of encryption/decryption – but not signing/verification.
> That could be either because the algorithm itself does not do signing, or 
> because
> the private key is generated and kept in a secure hardware that enforces usage
> restriction.
> 
> One example of a protocol that needs this is KEMTLS - which I hope is 
> accepted,
> either as-is, or with simplification.
> 
> CSR is supposed to be signed by the corresponding private key to prove
> possession. Obviously, it cannot be done with a key such as described above.
> How is this problem addressed in the real world?  With AuthKEM and KEMTLS,
> how would these protocols get their certificates?
> 
> A short discussion of this issue on the OpenSSL mailing list brought up 
> Certificate
> Management Protocol (CMP) and CRMF format. Is that where we're heading?
> Are the "big CAs" on board with it?
> 
> Thanks!
> --
> V/R,
> Uri
> 
> 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to