Skip to content

Commit

Permalink
Update to Updating Traffic Secrets Section
Browse files Browse the repository at this point in the history
  • Loading branch information
tireddy2 authored Jul 7, 2024
1 parent 1b15728 commit 13c9f16
Showing 1 changed file with 12 additions and 1 deletion.
13 changes: 12 additions & 1 deletion draft-tschofenig-tls-extended-key-update.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,12 @@ informative:
title: Transport Layer Security (TLS) Extensions
target: https://www.iana.org/assignments/tls-extensiontype-values
date: November 2023
CDM23:
author:
org: ACM
title: "Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols"
target: https://eprint.iacr.org/2023/1933.pdf
date: November 2023

--- abstract

Expand Down Expand Up @@ -331,7 +337,9 @@ of application_traffic_secret is motivated by the desire to include
* the old traffic secret as well as a secret derived from the DH
exchange or from the hybrid key exchange,
* the concatenation of the ExtendedKeyUpdateRequest and the
ExtendedKeyUpdateResponse messages, which contain the key shares, and
ExtendedKeyUpdateResponse messages, which contain the key shares, binding
the encapsulated shared secret ciphertext to IKM in case of hybrid key
exchange, providing MAL-BIND-K-CT security (see {{CDM23}}), and
* a new label string to distinguish it from the application traffic
secret computation defined in {{I-D.ietf-tls-rfc8446bis}} for use with
the regular KeyUpdate.
Expand All @@ -345,6 +353,9 @@ application_traffic_secret_N+1 =
Hash.length)
~~~

The traffic keys are re-derived from the client_/server_application_traffic_secret_N+1
as described in Section 7.3 of {{I-D.ietf-tls-rfc8446bis}}.

Once client_/server_application_traffic_secret_N+1 and its associated
traffic keys have been computed, implementations SHOULD delete
client_/server_application_traffic_secret_N and its associated
Expand Down

0 comments on commit 13c9f16

Please sign in to comment.