Hi Uri, all,

Op di 4 okt. 2022 om 17:07 schreef Blumenthal, Uri - 0553 - MITLL <
u...@ll.mit.edu>:

> CSR is supposed to be signed by the corresponding private key to prove
> possession. Obviously, it cannot be done with a key such as described
> above. How is this problem addressed in the real world?  With AuthKEM and
> KEMTLS, how would these protocols get their certificates?
>

Yeah, that's something that came up a few times while we were working on
KEMTLS (and it eventually resulted in this paper by Güneysu, Hodges, Land,
Ounsworth, Stebila, and Zaverucha [1]). They also have some nice references
for the kinds of attacks that "sloppy" issuance could lead to in Appendix
A. I've not tried to work out if they apply to TLS/KEMTLS/AuthKEM, but
ruling them out anyway because of the many applications of certificates
seems worth it.

A different naive approach for issuance (that I have done zero security
analysis on) could be simply creating the cert for key PK and encrypting it
to a key encapsulated to PK. Then the owner of PK would need to decrypt the
certificate; using it the first time immediately proves possession. Of
course, in the real-world we also have things like CT logs and such; and it
would be terribly annoying if I could spam you with CT log alerts for
yourwebsite dot com. So this approach doesn't seem very favorable over a
"fancy" ZKP or interactive approach.

We weren't aware of CRMF, so it seems I've got some reading to do as I
write some paragraphs on KEM certificates in my PhD thesis :)

Cheers,

Thom


[1]: https://www.douglas.stebila.ca/research/papers/CCS-GHLOSZ22/
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to