<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-barnes-hpke-hpke-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="HPKE">Hybrid Public Key Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-barnes-hpke-hpke-00"/>
    <author initials="R." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthik Bhargavan">
      <organization>Inria</organization>
      <address>
        <email>karthikeyan.bhargavan@inria.fr</email>
      </address>
    </author>
    <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
      <organization>Inria</organization>
      <address>
        <email>ietf@benjaminlipp.de</email>
      </address>
    </author>
    <author initials="C." surname="Wood" fullname="Christopher A. Wood">
      <organization>Apple</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2025" month="March" day="20"/>
    <workgroup>HPKE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 238?>

<t>This document describes a scheme for hybrid public key encryption (HPKE).
This scheme provides a variant of public key encryption of arbitrary-sized
plaintexts for a recipient public key. It also includes three authenticated
variants, including one that authenticates possession of a pre-shared key
and two optional ones that authenticate possession of a key encapsulation
mechanism (KEM) private key. HPKE works for any combination of an asymmetric
KEM, key derivation function (KDF), and authenticated encryption with
additional data (AEAD) encryption function. Some authenticated variants may not
be supported by all KEMs. We provide instantiations of the scheme using widely
used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key
agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
      <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hpkewg/hpke"/>.</t>
    </note>
  </front>
  <middle>
    <?line 254?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Encryption schemes that combine asymmetric and symmetric algorithms have been
specified and practiced since the early days of public key cryptography, e.g.,
<xref target="RFC1421"/>. Combining the two yields the key management advantages of asymmetric
cryptography and the performance benefits of symmetric cryptography. The traditional
combination has been "encrypt the symmetric key with the public key." "Hybrid"
public key encryption (HPKE) schemes, specified here, take a different approach:
"generate the symmetric key and its encapsulation with the public key."
Specifically, encrypted messages convey an encryption key encapsulated with a
public key scheme, along with one or more arbitrary-sized ciphertexts encrypted
using that key. This type of public key encryption has many applications in
practice, including Messaging Layer Security <xref target="I-D.ietf-mls-protocol"/> and
TLS Encrypted ClientHello <xref target="I-D.ietf-tls-esni"/>.</t>
      <t>Currently, there are numerous competing and non-interoperable standards and
variants for hybrid encryption, mostly variants on the Elliptic Curve Integrated Encryption Scheme (ECIES), including ANSI X9.63
(ECIES) <xref target="ANSI"/>, IEEE 1363a <xref target="IEEE1363"/>, ISO/IEC 18033-2 <xref target="ISO"/>, and SECG SEC 1
<xref target="SECG"/>.  See <xref target="MAEA10"/> for a thorough comparison.  All these existing
schemes have problems, e.g., because they rely on outdated primitives, lack
proofs of indistinguishable (adaptive) chosen-ciphertext attack (IND-CCA2) security, or fail to provide test vectors.</t>
      <t>This document defines an HPKE scheme that provides a subset
of the functions provided by the collection of schemes above but
specified with sufficient clarity that they can be interoperably
implemented. The HPKE construction defined herein is secure against (adaptive)
chosen ciphertext attacks (IND-CCA2-secure) under classical assumptions about
the underlying primitives <xref target="HPKEAnalysis"/> <xref target="ABHKLR20"/>. A summary of
these analyses is in <xref target="sec-properties"/>.</t>
      <t>This document represents the consensus of the Crypto Forum Research Group (CFRG).</t>
    </section>
    <section anchor="requirements-notation">
      <name>Requirements Notation</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="notation">
      <name>Notation</name>
      <t>The following terms are used throughout this document to describe the
operations, roles, and behaviors of HPKE:</t>
      <ul spacing="normal">
        <li>
          <t><tt>(skX, pkX)</tt>: A key encapsulation mechanism (KEM) key pair used in role X,
where X is one of S, R, or E as sender, recipient, and ephemeral, respectively;
<tt>skX</tt> is the private key and <tt>pkX</tt> is the public key.</t>
        </li>
        <li>
          <t><tt>pk(skX)</tt>: The KEM public key corresponding to the KEM private key <tt>skX</tt>.</t>
        </li>
        <li>
          <t>Sender (S): Role of entity that sends an encrypted message.</t>
        </li>
        <li>
          <t>Recipient (R): Role of entity that receives an encrypted message.</t>
        </li>
        <li>
          <t>Ephemeral (E): Role of a fresh random value meant for one-time use.</t>
        </li>
        <li>
          <t><tt>I2OSP(n, w)</tt>: Convert non-negative integer <tt>n</tt> to a <tt>w</tt>-length,
big-endian byte string, as described in <xref target="RFC8017"/>.</t>
        </li>
        <li>
          <t><tt>OS2IP(x)</tt>: Convert byte string <tt>x</tt> to a non-negative integer, as
described in <xref target="RFC8017"/>, assuming big-endian byte order.</t>
        </li>
        <li>
          <t><tt>concat(x0, ..., xN)</tt>: Concatenation of byte strings.
<tt>concat(0x01, 0x0203, 0x040506) = 0x010203040506</tt>.</t>
        </li>
        <li>
          <t><tt>random(n)</tt>: A pseudorandom byte string of length <tt>n</tt> bytes</t>
        </li>
        <li>
          <t><tt>xor(a,b)</tt>: XOR of byte strings; <tt>xor(0xF0F0, 0x1234) = 0xE2C4</tt>.
It is an error to call this function with two arguments of unequal
length.</t>
        </li>
      </ul>
    </section>
    <section anchor="base-crypto">
      <name>Cryptographic Dependencies</name>
      <t>HPKE variants rely on the following primitives:</t>
      <ul spacing="normal">
        <li>
          <t>A key encapsulation mechanism (KEM):
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>GenerateKeyPair()</tt>: Randomized algorithm to generate a key pair <tt>(skX, pkX)</tt>.</t>
            </li>
            <li>
              <t><tt>DeriveKeyPair(ikm)</tt>: Deterministic algorithm to derive a key pair
<tt>(skX, pkX)</tt> from the byte string <tt>ikm</tt>, where <tt>ikm</tt> SHOULD have at
least <tt>Nsk</tt> bytes of entropy (see <xref target="derive-key-pair"/> for discussion).</t>
            </li>
            <li>
              <t><tt>SerializePublicKey(pkX)</tt>: Produce a byte string of length <tt>Npk</tt> encoding the
public key <tt>pkX</tt>.</t>
            </li>
            <li>
              <t><tt>DeserializePublicKey(pkXm)</tt>: Parse a byte string of length <tt>Npk</tt> to recover a
public key. This function can raise a <tt>DeserializeError</tt> error upon <tt>pkXm</tt>
deserialization failure.</t>
            </li>
            <li>
              <t><tt>Encap(pkR)</tt>: Randomized algorithm to generate an ephemeral,
fixed-length symmetric key (the KEM shared secret) and
a fixed-length encapsulation of that key that can be decapsulated
by the holder of the private key corresponding to <tt>pkR</tt>. This function
can raise an <tt>EncapError</tt> on encapsulation failure.</t>
            </li>
            <li>
              <t><tt>Decap(enc, skR)</tt>: Deterministic algorithm using the private key <tt>skR</tt>
to recover the ephemeral symmetric key (the KEM shared secret) from
its encapsulated representation <tt>enc</tt>. This function can raise a
<tt>DecapError</tt> on decapsulation failure.</t>
            </li>
            <li>
              <t><tt>AuthEncap(pkR, skS)</tt> (optional): Same as <tt>Encap()</tt>, and the outputs
encode an assurance that the KEM shared secret was generated by the
holder of the private key <tt>skS</tt>.</t>
            </li>
            <li>
              <t><tt>AuthDecap(enc, skR, pkS)</tt> (optional): Same as <tt>Decap()</tt>, and the recipient
is assured that the KEM shared secret was generated by the holder of
the private key <tt>skS</tt>.</t>
            </li>
            <li>
              <t><tt>Nsecret</tt>: The length in bytes of a KEM shared secret produced by this KEM.</t>
            </li>
            <li>
              <t><tt>Nenc</tt>: The length in bytes of an encapsulated key produced by this KEM.</t>
            </li>
            <li>
              <t><tt>Npk</tt>: The length in bytes of an encoded public key for this KEM.</t>
            </li>
            <li>
              <t><tt>Nsk</tt>: The length in bytes of an encoded private key for this KEM.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>A key derivation function (KDF):
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>Extract(salt, ikm)</tt>: Extract a pseudorandom key of fixed length <tt>Nh</tt> bytes
from input keying material <tt>ikm</tt> and an optional byte string
<tt>salt</tt>.</t>
            </li>
            <li>
              <t><tt>Expand(prk, info, L)</tt>: Expand a pseudorandom key <tt>prk</tt> using
optional string <tt>info</tt> into <tt>L</tt> bytes of output keying material.</t>
            </li>
            <li>
              <t><tt>Nh</tt>: The output size of the <tt>Extract()</tt> function in bytes.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>An AEAD encryption algorithm <xref target="RFC5116"/>:
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>Seal(key, nonce, aad, pt)</tt>: Encrypt and authenticate plaintext
<tt>pt</tt> with associated data <tt>aad</tt> using symmetric key <tt>key</tt> and nonce
<tt>nonce</tt>, yielding ciphertext and tag <tt>ct</tt>. This function
 can raise a <tt>MessageLimitReachedError</tt> upon failure.</t>
            </li>
            <li>
              <t><tt>Open(key, nonce, aad, ct)</tt>: Decrypt ciphertext and tag <tt>ct</tt> using
associated data <tt>aad</tt> with symmetric key <tt>key</tt> and nonce <tt>nonce</tt>,
returning plaintext message <tt>pt</tt>. This function can raise an
<tt>OpenError</tt> or <tt>MessageLimitReachedError</tt> upon failure.</t>
            </li>
            <li>
              <t><tt>Nk</tt>: The length in bytes of a key for this algorithm.</t>
            </li>
            <li>
              <t><tt>Nn</tt>: The length in bytes of a nonce for this algorithm.</t>
            </li>
            <li>
              <t><tt>Nt</tt>: The length in bytes of the authentication tag for this algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Beyond the above, a KEM MAY also expose the following functions, whose behavior
is detailed in <xref target="serializeprivatekey"/>:</t>
      <ul spacing="normal">
        <li>
          <t><tt>SerializePrivateKey(skX)</tt>: Produce a byte string of length <tt>Nsk</tt> encoding the private
key <tt>skX</tt>.</t>
        </li>
        <li>
          <t><tt>DeserializePrivateKey(skXm)</tt>: Parse a byte string of length <tt>Nsk</tt> to recover a
private key. This function can raise a <tt>DeserializeError</tt> error upon <tt>skXm</tt>
deserialization failure.</t>
        </li>
      </ul>
      <t>A <em>ciphersuite</em> is a triple (KEM, KDF, AEAD) containing a choice of algorithm
for each primitive.</t>
      <t>A set of algorithm identifiers for concrete instantiations of these
primitives is provided in <xref target="ciphersuites"/>.  Algorithm identifier
values are two bytes long.</t>
      <t>Note that <tt>GenerateKeyPair</tt> can be implemented as <tt>DeriveKeyPair(random(Nsk))</tt>.</t>
      <t>The notation <tt>pk(skX)</tt>, depending on its use and the KEM and its
implementation, is either the
computation of the public key using the private key, or just syntax
expressing the retrieval of the public key, assuming it is stored along
with the private key object.</t>
      <t>The following two functions are defined to facilitate domain separation of
KDF calls as well as context binding:</t>
      <artwork><![CDATA[
def LabeledExtract(salt, label, ikm):
  labeled_ikm = concat("HPKE-v1", suite_id, label, ikm)
  return Extract(salt, labeled_ikm)

def LabeledExpand(prk, label, info, L):
  labeled_info = concat(I2OSP(L, 2), "HPKE-v1", suite_id,
                        label, info)
  return Expand(prk, labeled_info, L)
]]></artwork>
      <t>The value of <tt>suite_id</tt> depends on where the KDF is used; it is assumed
implicit from the implementation and not passed as a parameter. If used
inside a KEM algorithm, <tt>suite_id</tt> MUST start with "KEM" and identify
this KEM algorithm; if used in the remainder of HPKE, it MUST start with
"HPKE" and identify the entire ciphersuite in use. See sections <xref target="dhkem"/>
and <xref target="encryption-context"/> for details.</t>
      <section anchor="dhkem">
        <name>DH-Based KEM (DHKEM)</name>
        <t>Suppose we are given a KDF, and a Diffie-Hellman (DH) group providing the
following operations:</t>
        <ul spacing="normal">
          <li>
            <t><tt>DH(skX, pkY)</tt>: Perform a non-interactive Diffie-Hellman exchange using
the private key <tt>skX</tt> and public key <tt>pkY</tt> to produce a Diffie-Hellman shared
secret of length <tt>Ndh</tt>. This function can raise a <tt>ValidationError</tt> as described
in <xref target="validation"/>.</t>
          </li>
          <li>
            <t><tt>Ndh</tt>: The length in bytes of a Diffie-Hellman shared secret produced
by <tt>DH()</tt>.</t>
          </li>
          <li>
            <t><tt>Nsk</tt>: The length in bytes of a Diffie-Hellman private key.</t>
          </li>
        </ul>
        <t>Then we can construct a KEM that implements the interface defined in <xref target="base-crypto"/>
called <tt>DHKEM(Group, KDF)</tt> in the following way, where <tt>Group</tt> denotes the
Diffie-Hellman group and <tt>KDF</tt> denotes the KDF. The function parameters <tt>pkR</tt> and <tt>pkS</tt>
are deserialized public keys, and <tt>enc</tt> is a serialized public key. Since
encapsulated keys are Diffie-Hellman public keys in this KEM algorithm,
we use <tt>SerializePublicKey()</tt> and <tt>DeserializePublicKey()</tt> to encode and decode
them, respectively. <tt>Npk</tt> equals <tt>Nenc</tt>. <tt>GenerateKeyPair()</tt> produces a key pair
for the Diffie-Hellman group in use. <xref target="derive-key-pair"/> contains the
<tt>DeriveKeyPair()</tt> function specification for DHKEMs defined in this document.</t>
        <artwork><![CDATA[
def ExtractAndExpand(dh, kem_context):
  eae_prk = LabeledExtract("", "eae_prk", dh)
  shared_secret = LabeledExpand(eae_prk, "shared_secret",
                                kem_context, Nsecret)
  return shared_secret

def Encap(pkR):
  skE, pkE = GenerateKeyPair()
  dh = DH(skE, pkR)
  enc = SerializePublicKey(pkE)

  pkRm = SerializePublicKey(pkR)
  kem_context = concat(enc, pkRm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret, enc

def Decap(enc, skR):
  pkE = DeserializePublicKey(enc)
  dh = DH(skR, pkE)

  pkRm = SerializePublicKey(pk(skR))
  kem_context = concat(enc, pkRm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret

def AuthEncap(pkR, skS):
  skE, pkE = GenerateKeyPair()
  dh = concat(DH(skE, pkR), DH(skS, pkR))
  enc = SerializePublicKey(pkE)

  pkRm = SerializePublicKey(pkR)
  pkSm = SerializePublicKey(pk(skS))
  kem_context = concat(enc, pkRm, pkSm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret, enc

def AuthDecap(enc, skR, pkS):
  pkE = DeserializePublicKey(enc)
  dh = concat(DH(skR, pkE), DH(skR, pkS))

  pkRm = SerializePublicKey(pk(skR))
  pkSm = SerializePublicKey(pkS)
  kem_context = concat(enc, pkRm, pkSm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret
]]></artwork>
        <t>The implicit <tt>suite_id</tt> value used within <tt>LabeledExtract</tt> and
<tt>LabeledExpand</tt> is defined as follows, where <tt>kem_id</tt> is defined
in <xref target="kem-ids"/>:</t>
        <artwork><![CDATA[
suite_id = concat("KEM", I2OSP(kem_id, 2))
]]></artwork>
        <t>The KDF used in DHKEM can be equal to or different from the KDF used
in the remainder of HPKE, depending on the chosen variant.
Implementations MUST make sure to use the constants (<tt>Nh</tt>) and function
calls (<tt>LabeledExtract</tt> and <tt>LabeledExpand</tt>) of the appropriate KDF when
implementing DHKEM. See <xref target="kdf-choice"/> for a comment on the choice of
a KDF for the remainder of HPKE, and <xref target="domain-separation"/> for the
rationale of the labels.</t>
        <t>For the variants of DHKEM defined in this document, the size <tt>Nsecret</tt> of the
KEM shared secret is equal to the output length of the hash function
underlying the KDF. For P-256, P-384, and P-521, the size <tt>Ndh</tt> of the
Diffie-Hellman shared secret is equal to 32, 48, and 66, respectively,
corresponding to the x-coordinate of the resulting elliptic curve point <xref target="IEEE1363"/>.
For X25519 and X448, the size <tt>Ndh</tt> is equal to 32 and 56, respectively
(see <xref target="RFC7748"/>, Section 5).</t>
        <t>It is important to note that the <tt>AuthEncap()</tt> and <tt>AuthDecap()</tt> functions of the
DHKEM variants defined in this document are vulnerable to key-compromise
impersonation (KCI). This means the assurance that the KEM shared secret
was generated by the holder of the private key <tt>skS</tt> does not hold if
the recipient private key <tt>skR</tt> is compromised. See <xref target="sec-properties"/>
for more details.</t>
        <t>Senders and recipients MUST validate KEM inputs and outputs as described
in <xref target="kem-ids"/>.</t>
      </section>
    </section>
    <section anchor="hpke">
      <name>Hybrid Public Key Encryption</name>
      <t>In this section, we define a few HPKE variants.  All variants take a
recipient public key and a sequence of plaintexts <tt>pt</tt> and produce an
encapsulated key <tt>enc</tt> and a sequence of ciphertexts <tt>ct</tt>.  These outputs are
constructed so that only the holder of <tt>skR</tt> can decapsulate the key from
<tt>enc</tt> and decrypt the ciphertexts.  All the algorithms also take an
<tt>info</tt> parameter that can be used to influence the generation of keys
(e.g., to fold in identity information) and an <tt>aad</tt> parameter that
provides additional authenticated data to the AEAD algorithm in use.</t>
      <t>In addition to the base case of encrypting to a public key, we
include three authenticated variants: one that authenticates
possession of a pre-shared key, one that authenticates
possession of a KEM private key, and one that authenticates possession of both
a pre-shared key and a KEM private key. All authenticated variants contribute
additional keying material to the encryption operation. The following one-byte
values will be used to distinguish between modes:</t>
      <table anchor="hpke-modes">
        <name>HPKE Modes</name>
        <thead>
          <tr>
            <th align="left">Mode</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mode_base</td>
            <td align="left">0x00</td>
          </tr>
          <tr>
            <td align="left">mode_psk</td>
            <td align="left">0x01</td>
          </tr>
          <tr>
            <td align="left">mode_auth</td>
            <td align="left">0x02</td>
          </tr>
          <tr>
            <td align="left">mode_auth_psk</td>
            <td align="left">0x03</td>
          </tr>
        </tbody>
      </table>
      <t>All these cases follow the same basic two-step pattern:</t>
      <ol spacing="normal" type="1"><li>
          <t>Set up an encryption context that is shared between the sender
and the recipient.</t>
        </li>
        <li>
          <t>Use that context to encrypt or decrypt content.</t>
        </li>
      </ol>
      <t>A <em>context</em> is an implementation-specific structure that encodes
the AEAD algorithm and key in use, and manages the nonces used so
that the same nonce is not used with multiple plaintexts. It also
has an interface for exporting secret values, as described in
<xref target="hpke-export"/>. See <xref target="hpke-dem"/> for a description of this structure
and its interfaces. HPKE decryption fails when the underlying AEAD
decryption fails.</t>
      <t>The constructions described here presume that the relevant non-private
parameters (<tt>enc</tt>, <tt>psk_id</tt>, etc.) are transported between the sender and the
recipient by some application making use of HPKE. Moreover, a recipient with more
than one public key needs some way of determining which of its public keys was
used for the encapsulation operation. As an example, applications may send this
information alongside a ciphertext from the sender to the recipient. Specification of
such a mechanism is left to the application. See <xref target="message-encoding"/> for more
details.</t>
      <t>Note that some KEMs may not support <tt>AuthEncap()</tt> or <tt>AuthDecap()</tt>.
For such KEMs, only <tt>mode_base</tt> or <tt>mode_psk</tt> are supported. Future specifications
which define new KEMs MUST indicate whether these modes are supported.
See <xref target="future-kems"/> for more details.</t>
      <t>The procedures described in this section are laid out in a
Python-like pseudocode. The algorithms in use are left implicit.</t>
      <section anchor="encryption-context">
        <name>Creating the Encryption Context</name>
        <t>The variants of HPKE defined in this document share a common
key schedule that translates the protocol inputs into an encryption
context. The key schedule inputs are as follows:</t>
        <ul spacing="normal">
          <li>
            <t><tt>mode</tt> - A one-byte value indicating the HPKE mode, defined in <xref target="hpke-modes"/>.</t>
          </li>
          <li>
            <t><tt>shared_secret</tt> - A KEM shared secret generated for this transaction.</t>
          </li>
          <li>
            <t><tt>info</tt> - Application-supplied information (optional; default value
"").</t>
          </li>
          <li>
            <t><tt>psk</tt> - A pre-shared key (PSK) held by both the sender
and the recipient (optional; default value "").</t>
          </li>
          <li>
            <t><tt>psk_id</tt> - An identifier for the PSK (optional; default value "").</t>
          </li>
        </ul>
        <t>Senders and recipients MUST validate KEM inputs and outputs as described
in <xref target="kem-ids"/>.</t>
        <t>The <tt>psk</tt> and <tt>psk_id</tt> fields MUST appear together or not at all.
That is, if a non-default value is provided for one of them, then
the other MUST be set to a non-default value. This requirement is
encoded in <tt>VerifyPSKInputs()</tt> below.</t>
        <t>The <tt>psk</tt>, <tt>psk_id</tt>, and <tt>info</tt> fields have maximum lengths that depend
on the KDF itself, on the definition of <tt>LabeledExtract()</tt>, and on the
constant labels used together with them. See <xref target="kdf-input-length"/> for
precise limits on these lengths.</t>
        <t>The <tt>key</tt>, <tt>base_nonce</tt>, and <tt>exporter_secret</tt> computed by the key schedule
have the property that they are only known to the holder of the recipient
private key, and the entity that used the KEM to generate <tt>shared_secret</tt> and
<tt>enc</tt>.</t>
        <t>In the Auth and AuthPSK modes, the recipient is assured that the sender
held the private key <tt>skS</tt>. This assurance is limited for the DHKEM
variants defined in this document because of key-compromise impersonation,
as described in <xref target="dhkem"/> and <xref target="sec-properties"/>. If in the PSK and
AuthPSK modes, the <tt>psk</tt> and <tt>psk_id</tt> arguments are provided as required,
then the recipient is assured that the sender held the corresponding
pre-shared key. See <xref target="sec-properties"/> for more details.</t>
        <t>The HPKE algorithm identifiers, i.e., the KEM <tt>kem_id</tt>, KDF <tt>kdf_id</tt>, and
AEAD <tt>aead_id</tt> 2-byte code points, as defined in <xref target="kemid-values"/>, <xref target="kdfid-values"/>,
and <xref target="aeadid-values"/>, respectively, are assumed implicit from the implementation
and not passed as parameters. The implicit <tt>suite_id</tt> value used within
<tt>LabeledExtract</tt> and <tt>LabeledExpand</tt> is defined based on them as follows:</t>
        <artwork><![CDATA[
suite_id = concat(
  "HPKE",
  I2OSP(kem_id, 2),
  I2OSP(kdf_id, 2),
  I2OSP(aead_id, 2)
)
]]></artwork>
        <artwork><![CDATA[
default_psk = ""
default_psk_id = ""

def VerifyPSKInputs(mode, psk, psk_id):
  got_psk = (psk != default_psk)
  got_psk_id = (psk_id != default_psk_id)
  if got_psk != got_psk_id:
    raise Exception("Inconsistent PSK inputs")

  if got_psk and (mode in [mode_base, mode_auth]):
    raise Exception("PSK input provided when not needed")
  if (not got_psk) and (mode in [mode_psk, mode_auth_psk]):
    raise Exception("Missing required PSK input")

def KeySchedule<ROLE>(mode, shared_secret, info, psk, psk_id):
  VerifyPSKInputs(mode, psk, psk_id)

  psk_id_hash = LabeledExtract("", "psk_id_hash", psk_id)
  info_hash = LabeledExtract("", "info_hash", info)
  key_schedule_context = concat(mode, psk_id_hash, info_hash)

  secret = LabeledExtract(shared_secret, "secret", psk)

  key = LabeledExpand(secret, "key", key_schedule_context, Nk)
  base_nonce = LabeledExpand(secret, "base_nonce",
                             key_schedule_context, Nn)
  exporter_secret = LabeledExpand(secret, "exp",
                                  key_schedule_context, Nh)

  return Context<ROLE>(key, base_nonce, 0, exporter_secret)
]]></artwork>
        <t>The <tt>ROLE</tt> template parameter is either S or R, depending on the role of
sender or recipient, respectively. See <xref target="hpke-dem"/> for a discussion of the
key schedule output, including the role-specific <tt>Context</tt> structure and its API.</t>
        <t>Note that the <tt>key_schedule_context</tt> construction in <tt>KeySchedule()</tt> is
equivalent to serializing a structure of the following form in the TLS presentation
syntax:</t>
        <artwork><![CDATA[
struct {
    uint8 mode;
    opaque psk_id_hash[Nh];
    opaque info_hash[Nh];
} KeyScheduleContext;
]]></artwork>
        <section anchor="hpke-kem">
          <name>Encryption to a Public Key</name>
          <t>The most basic function of an HPKE scheme is to enable encryption
to the holder of a given KEM private key.  The <tt>SetupBaseS()</tt> and
<tt>SetupBaseR()</tt> procedures establish contexts that can be used to
encrypt and decrypt, respectively, for a given private key.</t>
          <t>The KEM shared secret is combined via the KDF
with information describing the key exchange, as well as the
explicit <tt>info</tt> parameter provided by the caller.</t>
          <t>The parameter <tt>pkR</tt> is a public key, and <tt>enc</tt> is an encapsulated
KEM shared secret.</t>
          <artwork><![CDATA[
def SetupBaseS(pkR, info):
  shared_secret, enc = Encap(pkR)
  return enc, KeyScheduleS(mode_base, shared_secret, info,
                           default_psk, default_psk_id)

def SetupBaseR(enc, skR, info):
  shared_secret = Decap(enc, skR)
  return KeyScheduleR(mode_base, shared_secret, info,
                      default_psk, default_psk_id)
]]></artwork>
        </section>
        <section anchor="mode-psk">
          <name>Authentication Using a Pre-Shared Key</name>
          <t>This variant extends the base mechanism by allowing the recipient to
authenticate that the sender possessed a given PSK. The PSK also
improves confidentiality guarantees in certain adversary models, as
described in more detail in <xref target="sec-properties"/>. We assume that both
parties have been provisioned with both the PSK value <tt>psk</tt> and another
byte string <tt>psk_id</tt> that is used to identify which PSK should be used.</t>
          <t>The primary difference from the base case is that the <tt>psk</tt> and <tt>psk_id</tt> values
are used as <tt>ikm</tt> inputs to the KDF (instead of using the empty string).</t>
          <t>The PSK MUST have at least 32 bytes of entropy and SHOULD be of length <tt>Nh</tt>
bytes or longer. See <xref target="security-psk"/> for a more detailed discussion.</t>
          <artwork><![CDATA[
def SetupPSKS(pkR, info, psk, psk_id):
  shared_secret, enc = Encap(pkR)
  return enc, KeyScheduleS(mode_psk, shared_secret, info, psk, psk_id)

def SetupPSKR(enc, skR, info, psk, psk_id):
  shared_secret = Decap(enc, skR)
  return KeyScheduleR(mode_psk, shared_secret, info, psk, psk_id)
]]></artwork>
        </section>
        <section anchor="mode-auth">
          <name>Authentication Using an Asymmetric Key</name>
          <t>This variant extends the base mechanism by allowing the recipient
to authenticate that the sender possessed a given KEM private key.
This is because <tt>AuthDecap(enc, skR, pkS)</tt> produces the correct KEM
shared secret only if the encapsulated value <tt>enc</tt> was produced by
<tt>AuthEncap(pkR, skS)</tt>, where <tt>skS</tt> is the private key corresponding
to <tt>pkS</tt>.  In other words, at most two entities (precisely two, in the case
of DHKEM) could have produced this secret, so if the recipient is at most one, then
the sender is the other with overwhelming probability.</t>
          <t>The primary difference from the base case is that the calls to
<tt>Encap()</tt> and <tt>Decap()</tt> are replaced with calls to <tt>AuthEncap()</tt> and
<tt>AuthDecap()</tt>, which add the sender public key to their internal
context string. The function parameters <tt>pkR</tt> and <tt>pkS</tt> are
public keys, and <tt>enc</tt> is an encapsulated KEM shared secret.</t>
          <t>Obviously, this variant can only be used with a KEM that provides
<tt>AuthEncap()</tt> and <tt>AuthDecap()</tt> procedures.</t>
          <t>This mechanism authenticates only the key pair of the sender, not
any other identifier.  If an application wishes to bind HPKE
ciphertexts or exported secrets to another identity for the sender
(e.g., an email address or domain name), then this identifier should be
included in the <tt>info</tt> parameter to avoid identity misbinding issues <xref target="IMB"/>.</t>
          <artwork><![CDATA[
def SetupAuthS(pkR, info, skS):
  shared_secret, enc = AuthEncap(pkR, skS)
  return enc, KeyScheduleS(mode_auth, shared_secret, info,
                           default_psk, default_psk_id)

def SetupAuthR(enc, skR, info, pkS):
  shared_secret = AuthDecap(enc, skR, pkS)
  return KeyScheduleR(mode_auth, shared_secret, info,
                      default_psk, default_psk_id)
]]></artwork>
        </section>
        <section anchor="mode-auth-psk">
          <name>Authentication Using Both a PSK and an Asymmetric Key</name>
          <t>This mode is a straightforward combination of the PSK and authenticated modes.
Like the PSK mode, a PSK is provided as input to the key schedule, and like the
authenticated mode, authenticated KEM variants are used.</t>
          <artwork><![CDATA[
def SetupAuthPSKS(pkR, info, psk, psk_id, skS):
  shared_secret, enc = AuthEncap(pkR, skS)
  return enc, KeyScheduleS(mode_auth_psk, shared_secret, info,
                           psk, psk_id)

def SetupAuthPSKR(enc, skR, info, psk, psk_id, pkS):
  shared_secret = AuthDecap(enc, skR, pkS)
  return KeyScheduleR(mode_auth_psk, shared_secret, info,
                      psk, psk_id)
]]></artwork>
          <t>The PSK MUST have at least 32 bytes of entropy and SHOULD be of length <tt>Nh</tt>
bytes or longer. See <xref target="security-psk"/> for a more detailed discussion.</t>
        </section>
      </section>
      <section anchor="hpke-dem">
        <name>Encryption and Decryption</name>
        <t>HPKE allows multiple encryption operations to be done based on a
given setup transaction.  Since the public key operations involved
in setup are typically more expensive than symmetric encryption or
decryption, this allows applications to amortize the cost of the
public key operations, reducing the overall overhead.</t>
        <t>In order to avoid nonce reuse, however, this encryption must be
stateful. Each of the setup procedures above produces a role-specific
context object that stores the AEAD and secret export parameters.
The AEAD parameters consist of:</t>
        <ul spacing="normal">
          <li>
            <t>The AEAD algorithm in use</t>
          </li>
          <li>
            <t>A secret <tt>key</tt></t>
          </li>
          <li>
            <t>A base nonce <tt>base_nonce</tt></t>
          </li>
          <li>
            <t>A sequence number (initially 0)</t>
          </li>
        </ul>
        <t>The secret export parameters consist of:</t>
        <ul spacing="normal">
          <li>
            <t>The HPKE ciphersuite in use and</t>
          </li>
          <li>
            <t>An <tt>exporter_secret</tt> used for the secret export interface (see
<xref target="hpke-export"/>)</t>
          </li>
        </ul>
        <t>All these parameters except the AEAD sequence number are constant.
The sequence number provides nonce uniqueness: The nonce used for
each encryption or decryption operation is the result of XORing
<tt>base_nonce</tt> with the current sequence number, encoded as a big-endian
integer of the same length as <tt>base_nonce</tt>. Implementations MAY use a
sequence number that is shorter than the nonce length (padding on the left
with zero), but MUST raise an error if the sequence number overflows. The AEAD
algorithm produces ciphertext that is Nt bytes longer than the plaintext.
Nt = 16 for AEAD algorithms defined in this document.</t>
        <t>Encryption is unidirectional from sender to recipient. The sender's
context can encrypt a plaintext <tt>pt</tt> with associated data <tt>aad</tt> as
follows:</t>
        <artwork><![CDATA[
def ContextS.Seal(aad, pt):
  ct = Seal(self.key, self.ComputeNonce(self.seq), aad, pt)
  self.IncrementSeq()
  return ct
]]></artwork>
        <t>The recipient's context can decrypt a ciphertext <tt>ct</tt> with associated
data <tt>aad</tt> as follows:</t>
        <artwork><![CDATA[
def ContextR.Open(aad, ct):
  pt = Open(self.key, self.ComputeNonce(self.seq), aad, ct)
  if pt == OpenError:
    raise OpenError
  self.IncrementSeq()
  return pt
]]></artwork>
        <t>Each encryption or decryption operation increments the sequence number for
the context in use. The per-message nonce and sequence number increment
details are as follows:</t>
        <artwork><![CDATA[
def Context<ROLE>.ComputeNonce(seq):
  seq_bytes = I2OSP(seq, Nn)
  return xor(self.base_nonce, seq_bytes)

def Context<ROLE>.IncrementSeq():
  if self.seq >= (1 << (8*Nn)) - 1:
    raise MessageLimitReachedError
  self.seq += 1
]]></artwork>
        <t>The sender's context MUST NOT be used for decryption. Similarly, the recipient's
context MUST NOT be used for encryption. Higher-level protocols reusing the HPKE
key exchange for more general purposes can derive separate keying material as
needed using use the secret export interface; see <xref target="hpke-export"/> and <xref target="bidirectional"/>
for more details.</t>
        <t>It is up to the application to ensure that encryptions and decryptions are
done in the proper sequence, so that encryption and decryption nonces align.
If <tt>ContextS.Seal()</tt> or <tt>ContextR.Open()</tt> would cause the <tt>seq</tt> field to
overflow, then the implementation MUST fail with an error. (In the pseudocode
below, <tt>Context&lt;ROLE&gt;.IncrementSeq()</tt> fails with an error when <tt>seq</tt> overflows,
which causes <tt>ContextS.Seal()</tt> and <tt>ContextR.Open()</tt> to fail accordingly.)
Note that the internal <tt>Seal()</tt> and <tt>Open()</tt> calls inside correspond to the
context's AEAD algorithm.</t>
      </section>
      <section anchor="hpke-export">
        <name>Secret Export</name>
        <t>HPKE provides an interface for exporting secrets from the encryption context
using a variable-length pseudorandom function (PRF), similar to the TLS 1.3 exporter interface
(see <xref target="RFC8446"/>, Section 7.5). This interface takes as input a context
string <tt>exporter_context</tt> and a desired length <tt>L</tt> in bytes, and produces
a secret derived from the internal exporter secret using the corresponding
KDF Expand function. For the KDFs defined in this specification, <tt>L</tt> has
a maximum value of <tt>255*Nh</tt>. Future specifications that define new KDFs
MUST specify a bound for <tt>L</tt>.</t>
        <t>The <tt>exporter_context</tt> field has a maximum length that depends on the KDF
itself, on the definition of <tt>LabeledExpand()</tt>, and on the constant labels
used together with them. See <xref target="kdf-input-length"/> for precise limits on this
length.</t>
        <artwork><![CDATA[
def Context.Export(exporter_context, L):
  return LabeledExpand(self.exporter_secret, "sec",
                       exporter_context, L)
]]></artwork>
        <t>Applications that do not use the encryption API in <xref target="hpke-dem"/> can use
the export-only AEAD ID <tt>0xFFFF</tt> when computing the key schedule. Such
applications can avoid computing the <tt>key</tt> and <tt>base_nonce</tt> values in the
key schedule, as they are not used by the Export interface described above.</t>
      </section>
    </section>
    <section anchor="single-shot-apis">
      <name>Single-Shot APIs</name>
      <section anchor="single-shot-encryption">
        <name>Encryption and Decryption</name>
        <t>In many cases, applications encrypt only a single message to a recipient's public key.
This section provides templates for HPKE APIs that implement stateless "single-shot"
encryption and decryption using APIs specified in <xref target="hpke-kem"/> and <xref target="hpke-dem"/>:</t>
        <artwork><![CDATA[
def Seal<MODE>(pkR, info, aad, pt, ...):
  enc, ctx = Setup<MODE>S(pkR, info, ...)
  ct = ctx.Seal(aad, pt)
  return enc, ct

def Open<MODE>(enc, skR, info, aad, ct, ...):
  ctx = Setup<MODE>R(enc, skR, info, ...)
  return ctx.Open(aad, ct)
]]></artwork>
        <t>The <tt>MODE</tt> template parameter is one of Base, PSK, Auth, or AuthPSK. The optional parameters
indicated by "..." depend on <tt>MODE</tt> and may be empty. For example, <tt>SetupBase()</tt> has no
additional parameters. <tt>SealAuthPSK()</tt> and <tt>OpenAuthPSK()</tt> would be implemented as follows:</t>
        <artwork><![CDATA[
def SealAuthPSK(pkR, info, aad, pt, psk, psk_id, skS):
  enc, ctx = SetupAuthPSKS(pkR, info, psk, psk_id, skS)
  ct = ctx.Seal(aad, pt)
  return enc, ct

def OpenAuthPSK(enc, skR, info, aad, ct, psk, psk_id, pkS):
  ctx = SetupAuthPSKR(enc, skR, info, psk, psk_id, pkS)
  return ctx.Open(aad, ct)
]]></artwork>
      </section>
      <section anchor="secret-export">
        <name>Secret Export</name>
        <t>Applications may also want to derive a secret known only to a given recipient.
This section provides templates for HPKE APIs that implement stateless
"single-shot" secret export using APIs specified in <xref target="hpke-export"/>:</t>
        <artwork><![CDATA[
def SendExport<MODE>(pkR, info, exporter_context, L, ...):
  enc, ctx = Setup<MODE>S(pkR, info, ...)
  exported = ctx.Export(exporter_context, L)
  return enc, exported

def ReceiveExport<MODE>(enc, skR, info, exporter_context, L, ...):
  ctx = Setup<MODE>R(enc, skR, info, ...)
  return ctx.Export(exporter_context, L)
]]></artwork>
        <t>As in <xref target="single-shot-encryption"/>, the <tt>MODE</tt> template parameter is one of Base, PSK,
Auth, or AuthPSK. The optional parameters indicated by "..." depend on <tt>MODE</tt> and may
be empty.</t>
      </section>
    </section>
    <section anchor="ciphersuites">
      <name>Algorithm Identifiers</name>
      <t>This section lists algorithm identifiers suitable for different HPKE configurations.
Future specifications may introduce new KEM, KDF, and AEAD algorithm identifiers
and retain the security guarantees presented in this document provided they adhere
to the security requirements in <xref target="kem-security"/>, <xref target="kdf-choice"/>, and <xref target="aead-security"/>,
respectively.</t>
      <section anchor="kem-ids">
        <name>Key Encapsulation Mechanisms (KEMs)</name>
        <table anchor="kemid-values">
          <name>KEM IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">Nsecret</th>
              <th align="left">Nenc</th>
              <th align="left">Npk</th>
              <th align="left">Nsk</th>
              <th align="left">Auth</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">yes</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0010</td>
              <td align="left">DHKEM(P-256, HKDF-SHA256)</td>
              <td align="left">32</td>
              <td align="left">65</td>
              <td align="left">65</td>
              <td align="left">32</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0011</td>
              <td align="left">DHKEM(P-384, HKDF-SHA384)</td>
              <td align="left">48</td>
              <td align="left">97</td>
              <td align="left">97</td>
              <td align="left">48</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0012</td>
              <td align="left">DHKEM(P-521, HKDF-SHA512)</td>
              <td align="left">64</td>
              <td align="left">133</td>
              <td align="left">133</td>
              <td align="left">66</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0020</td>
              <td align="left">DHKEM(X25519, HKDF-SHA256)</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="RFC7748"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0021</td>
              <td align="left">DHKEM(X448, HKDF-SHA512)</td>
              <td align="left">64</td>
              <td align="left">56</td>
              <td align="left">56</td>
              <td align="left">56</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="RFC7748"/>, <xref target="RFC5869"/></td>
            </tr>
          </tbody>
        </table>
        <t>The <tt>Auth</tt> column indicates if the KEM algorithm provides the <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt>
interface and is therefore suitable for the Auth and AuthPSK modes. The meaning of all
other columns is explained in <xref target="kem-template"/>. All algorithms are suitable for the
PSK mode.</t>
        <section anchor="serializepublickey-and-deserializepublickey">
          <name>SerializePublicKey and DeserializePublicKey</name>
          <t>For P-256, P-384, and P-521, the <tt>SerializePublicKey()</tt> function of the
KEM performs the uncompressed Elliptic-Curve-Point-to-Octet-String
conversion according to <xref target="SECG"/>. <tt>DeserializePublicKey()</tt> performs the
uncompressed Octet-String-to-Elliptic-Curve-Point conversion.</t>
          <t>For X25519 and X448, the <tt>SerializePublicKey()</tt> and <tt>DeserializePublicKey()</tt>
functions are the identity function, since these curves already use
fixed-length byte strings for public keys.</t>
          <t>Some deserialized public keys MUST be validated before they can be used. See
<xref target="validation"/> for specifics.</t>
        </section>
        <section anchor="serializeprivatekey">
          <name>SerializePrivateKey and DeserializePrivateKey</name>
          <t>As per <xref target="SECG"/>, P-256, P-384, and P-521 private keys are field elements in the
scalar field of the curve being used. For this section, and for
<xref target="derive-key-pair"/>, it is assumed that implementors of ECDH over these curves
use an integer representation of private keys that is compatible with the
<tt>OS2IP()</tt> function.</t>
          <t>For P-256, P-384, and P-521, the <tt>SerializePrivateKey()</tt> function of the KEM
performs the Field-Element-to-Octet-String conversion according to <xref target="SECG"/>. If
the private key is an integer outside the range <tt>[0, order-1]</tt>, where <tt>order</tt>
is the order of the curve being used, the private key MUST be reduced to its
representative in <tt>[0, order-1]</tt> before being serialized.
<tt>DeserializePrivateKey()</tt> performs the Octet-String-to-Field-Element conversion
according to <xref target="SECG"/>.</t>
          <t>For X25519 and X448, private keys are identical to their byte string
representation, so little processing has to be done. The
<tt>SerializePrivateKey()</tt> function MUST clamp its output and the
<tt>DeserializePrivateKey()</tt> function MUST clamp its input, where <em>clamping</em> refers to the
bitwise operations performed on <tt>k</tt> in the <tt>decodeScalar25519()</tt> and
<tt>decodeScalar448()</tt> functions defined in Section 5 of <xref target="RFC7748"/>.</t>
          <t>To catch invalid keys early on, implementors of DHKEMs SHOULD check that
deserialized private keys are not equivalent to 0 (mod <tt>order</tt>), where <tt>order</tt>
is the order of the DH group. Note that this property is trivially true for X25519
and X448 groups, since clamped values can never be 0 (mod <tt>order</tt>).</t>
        </section>
        <section anchor="derive-key-pair">
          <name>DeriveKeyPair</name>
          <t>The keys that <tt>DeriveKeyPair()</tt> produces have only as much entropy as the provided
input keying material. For a given KEM, the <tt>ikm</tt> parameter given to <tt>DeriveKeyPair()</tt> SHOULD
have length at least <tt>Nsk</tt>, and SHOULD have at least <tt>Nsk</tt> bytes of entropy.</t>
          <t>All invocations of KDF functions (such as <tt>LabeledExtract</tt> or <tt>LabeledExpand</tt>) in any
DHKEM's <tt>DeriveKeyPair()</tt> function use the DHKEM's associated KDF (as opposed to
the ciphersuite's KDF).</t>
          <t>For P-256, P-384, and P-521, the <tt>DeriveKeyPair()</tt> function of the KEM performs
rejection sampling over field elements:</t>
          <artwork><![CDATA[
def DeriveKeyPair(ikm):
  dkp_prk = LabeledExtract("", "dkp_prk", ikm)
  sk = 0
  counter = 0
  while sk == 0 or sk >= order:
    if counter > 255:
      raise DeriveKeyPairError
    bytes = LabeledExpand(dkp_prk, "candidate",
                          I2OSP(counter, 1), Nsk)
    bytes[0] = bytes[0] & bitmask
    sk = OS2IP(bytes)
    counter = counter + 1
  return (sk, pk(sk))
]]></artwork>
          <t><tt>order</tt> is the order of the curve being used (see Section D.1.2 of <xref target="NISTCurves"/>), and
is listed below for completeness.</t>
          <artwork><![CDATA[
P-256:
0xffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551

P-384:
0xffffffffffffffffffffffffffffffffffffffffffffffffc7634d81f4372ddf
  581a0db248b0a77aecec196accc52973

P-521:
0x01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
  fa51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb71e91386409
]]></artwork>
          <t><tt>bitmask</tt> is defined to be 0xFF for P-256 and P-384, and 0x01 for P-521.
The precise likelihood of <tt>DeriveKeyPair()</tt> failing with DeriveKeyPairError
depends on the group being used, but it is negligibly small in all cases.
See <xref target="api-errors"/> for information about dealing with such failures.</t>
          <t>For X25519 and X448, the <tt>DeriveKeyPair()</tt> function applies a KDF to the input:</t>
          <artwork><![CDATA[
def DeriveKeyPair(ikm):
  dkp_prk = LabeledExtract("", "dkp_prk", ikm)
  sk = LabeledExpand(dkp_prk, "sk", "", Nsk)
  return (sk, pk(sk))
]]></artwork>
        </section>
        <section anchor="validation">
          <name>Validation of Inputs and Outputs</name>
          <t>The following public keys are subject to validation if the group
requires public key validation: the sender MUST validate the recipient's
public key <tt>pkR</tt>; the recipient MUST validate the ephemeral public key
<tt>pkE</tt>; in authenticated modes, the recipient MUST validate the sender's
static public key <tt>pkS</tt>. Validation failure yields a <tt>ValidationError</tt>.</t>
          <t>For P-256, P-384 and P-521, senders and recipients MUST perform partial
public key validation on all public key inputs, as defined in Section 5.6.2.3.4
of <xref target="keyagreement"/>. This includes checking that the coordinates are in the
correct range, that the point is on the curve, and that the point is not the
point at infinity. Additionally, senders and recipients MUST ensure the
Diffie-Hellman shared secret is not the point at infinity.</t>
          <t>For X25519 and X448, public keys and Diffie-Hellman outputs MUST be validated
as described in <xref target="RFC7748"/>. In particular, recipients MUST check whether
the Diffie-Hellman shared secret is the all-zero value and abort if so.</t>
        </section>
        <section anchor="future-kems">
          <name>Future KEMs</name>
          <t><xref target="kem-security"/> lists security requirements on a KEM used within HPKE.</t>
          <t>The <tt>AuthEncap()</tt> and <tt>AuthDecap()</tt> functions are OPTIONAL. If a KEM algorithm
does not provide them, only the Base and PSK modes of HPKE are supported.
Future specifications that define new KEMs MUST indicate whether or not
Auth and AuthPSK modes are supported.</t>
          <t>A KEM algorithm may support different encoding algorithms, with different output
lengths, for KEM public keys. Such KEM algorithms MUST specify only one encoding
algorithm whose output length is <tt>Npk</tt>.</t>
        </section>
      </section>
      <section anchor="kdf-ids">
        <name>Key Derivation Functions (KDFs)</name>
        <table anchor="kdfid-values">
          <name>KDF IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KDF</th>
              <th align="left">Nh</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0001</td>
              <td align="left">HKDF-SHA256</td>
              <td align="left">32</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0002</td>
              <td align="left">HKDF-SHA384</td>
              <td align="left">48</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">HKDF-SHA512</td>
              <td align="left">64</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
          </tbody>
        </table>
        <section anchor="kdf-input-length">
          <name>Input Length Restrictions</name>
          <t>This document defines <tt>LabeledExtract()</tt> and <tt>LabeledExpand()</tt> based on the
KDFs listed above. These functions add prefixes to their respective
inputs <tt>ikm</tt> and <tt>info</tt> before calling the KDF's <tt>Extract()</tt> and <tt>Expand()</tt>
functions. This leads to a reduction of the maximum input length that
is available for the inputs <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, <tt>exporter_context</tt>,
<tt>ikm</tt>, i.e., the variable-length parameters provided by HPKE applications.
The following table lists the maximum allowed lengths of these fields
for the KDFs defined in this document, as inclusive bounds in bytes:</t>
          <table anchor="input-limits">
            <name>Application Input Limits</name>
            <thead>
              <tr>
                <th align="left">Input</th>
                <th align="left">HKDF-SHA256</th>
                <th align="left">HKDF-SHA384</th>
                <th align="left">HKDF-SHA512</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">psk</td>
                <td align="left">2^{61} - 88</td>
                <td align="left">2^{125} - 152</td>
                <td align="left">2^{125} - 152</td>
              </tr>
              <tr>
                <td align="left">psk_id</td>
                <td align="left">2^{61} - 93</td>
                <td align="left">2^{125} - 157</td>
                <td align="left">2^{125} - 157</td>
              </tr>
              <tr>
                <td align="left">info</td>
                <td align="left">2^{61} - 91</td>
                <td align="left">2^{125} - 155</td>
                <td align="left">2^{125} - 155</td>
              </tr>
              <tr>
                <td align="left">exporter_context</td>
                <td align="left">2^{61} - 120</td>
                <td align="left">2^{125} - 200</td>
                <td align="left">2^{125} - 216</td>
              </tr>
              <tr>
                <td align="left">ikm (DeriveKeyPair)</td>
                <td align="left">2^{61} - 84</td>
                <td align="left">2^{125} - 148</td>
                <td align="left">2^{125} - 148</td>
              </tr>
            </tbody>
          </table>
          <t>This shows that the limits are only marginally smaller than the maximum
input length of the underlying hash function; these limits are large and
unlikely to be reached in practical applications. Future specifications
that define new KDFs MUST specify bounds for these variable-length
parameters.</t>
          <t>The RECOMMENDED limit for these values is 64 bytes. This would enable
interoperability with implementations that statically allocate memory
for these inputs to avoid memory allocations.</t>
          <t>The values for <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, and <tt>ikm</tt>, which are inputs to
<tt>LabeledExtract()</tt>, were computed with the following expression:</t>
          <artwork><![CDATA[
max_size_hash_input - Nb - size_version_label -
    size_suite_id - size_input_label
]]></artwork>
          <t>The value for <tt>exporter_context</tt>, which is an input to <tt>LabeledExpand()</tt>,
was computed with the following expression:</t>
          <artwork><![CDATA[
max_size_hash_input - Nb - Nh - size_version_label -
    size_suite_id - size_input_label - 2 - 1
]]></artwork>
          <t>In these equations, <tt>max_size_hash_input</tt> is the maximum input length
of the underlying hash function in bytes, <tt>Nb</tt> is the block size of the
underlying hash function in bytes, <tt>size_version_label</tt> is the size
of "HPKE-v1" in bytes and equals 7, <tt>size_suite_id</tt> is the size of the
<tt>suite_id</tt> in bytes and equals 5 for DHKEM (relevant for <tt>ikm</tt>) and 10 for the
remainder of HPKE (relevant for <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, and <tt>exporter_context</tt>),
and <tt>size_input_label</tt> is the size in bytes of the label used as parameter to
<tt>LabeledExtract()</tt> or <tt>LabeledExpand()</tt>, the maximum of which is 13
across all labels in this document.</t>
        </section>
      </section>
      <section anchor="aead-ids">
        <name>Authenticated Encryption with Associated Data (AEAD) Functions</name>
        <table anchor="aeadid-values">
          <name>AEAD IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">AEAD</th>
              <th align="left">Nk</th>
              <th align="left">Nn</th>
              <th align="left">Nt</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0001</td>
              <td align="left">AES-128-GCM</td>
              <td align="left">16</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="GCM"/></td>
            </tr>
            <tr>
              <td align="left">0x0002</td>
              <td align="left">AES-256-GCM</td>
              <td align="left">32</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="GCM"/></td>
            </tr>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">ChaCha20Poly1305</td>
              <td align="left">32</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="RFC8439"/></td>
            </tr>
            <tr>
              <td align="left">0xFFFF</td>
              <td align="left">Export-only</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
          </tbody>
        </table>
        <t>The <tt>0xFFFF</tt> AEAD ID is reserved for applications that only use the Export
interface; see <xref target="hpke-export"/> for more details.</t>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>API Considerations</name>
      <t>This section documents considerations for interfaces to implementations of HPKE.
This includes error handling considerations and recommendations that improve
interoperability when HPKE is used in applications.</t>
      <section anchor="auxiliary-authenticated-application-information">
        <name>Auxiliary Authenticated Application Information</name>
        <t>HPKE has two places at which applications can specify auxiliary authenticated information:
(1) during context construction via the Setup <tt>info</tt> parameter, and (2) during Context
operations, i.e., with the <tt>aad</tt> parameter for <tt>Open()</tt> and <tt>Seal()</tt>, and the <tt>exporter_context</tt> parameter
for <tt>Export()</tt>. Application information applicable to multiple operations on a single Context
should use the Setup <tt>info</tt> parameter. This avoids redundantly processing this information for
each Context operation. In contrast, application information that varies on a per-message basis
should be specified via the Context APIs (<tt>Seal()</tt>, <tt>Open()</tt>, or <tt>Export()</tt>).</t>
        <t>Applications that only use the single-shot APIs described in <xref target="single-shot-apis"/> should use the
Setup <tt>info</tt> parameter for specifying auxiliary authenticated information. Implementations which
only expose single-shot APIs should not allow applications to use both Setup <tt>info</tt> and Context
<tt>aad</tt> or <tt>exporter_context</tt> auxiliary information parameters.</t>
      </section>
      <section anchor="api-errors">
        <name>Errors</name>
        <t>The high-level, public HPKE APIs specified in this document are all fallible.
These include the Setup functions and all encryption context functions.
For example, <tt>Decap()</tt> can fail if the encapsulated key <tt>enc</tt> is invalid,
and <tt>Open()</tt> may fail if ciphertext decryption fails. The explicit errors
generated throughout this specification, along with the conditions that
lead to each error, are as follows:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ValidationError</tt>: KEM input or output validation failure; <xref target="dhkem"/>.</t>
          </li>
          <li>
            <t><tt>DeserializeError</tt>: Public or private key deserialization failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>EncapError</tt>: <tt>Encap()</tt> failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>DecapError</tt>: <tt>Decap()</tt> failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>OpenError</tt>: Context AEAD <tt>Open()</tt> failure; <xref target="base-crypto"/> and <xref target="hpke-dem"/>.</t>
          </li>
          <li>
            <t><tt>MessageLimitReachedError</tt>: Context AEAD sequence number overflow; <xref target="base-crypto"/> and <xref target="hpke-dem"/>.</t>
          </li>
          <li>
            <t><tt>DeriveKeyPairError</tt>: Key pair derivation failure; <xref target="derive-key-pair"/>.</t>
          </li>
        </ul>
        <t>Implicit errors may also occur. As an example, certain classes of failures,
e.g., malformed recipient public keys, may not yield explicit errors.
For example, for the DHKEM variant described in this specification,
the <tt>Encap()</tt> algorithm fails when given an invalid recipient public key.
However, other KEM algorithms may not have an efficient algorithm for verifying
the validity of public keys. As a result, an equivalent error may not manifest
until AEAD decryption at the recipient. As another example, DHKEM's <tt>AuthDecap()</tt>
function will produce invalid output if given the wrong sender public key.
This error is not detectable until subsequent AEAD decryption.</t>
        <t>The errors in this document are meant as a guide for implementors. They are not
an exhaustive list of all the errors an implementation might emit. For example,
future KEMs might have internal failure cases, or an implementation might run
out of memory.</t>
        <t>How these errors are expressed in an API or handled by applications is an
implementation-specific detail. For example, some implementations may abort or
panic upon a <tt>DeriveKeyPairError</tt> failure given that it only occurs with
negligible probability, whereas other implementations may retry the failed
DeriveKeyPair operation. See <xref target="derive-key-pair"/> for more information.
As another example, some implementations of the DHKEM specified in this document
may choose to transform <tt>ValidationError</tt> from <tt>DH()</tt> into an <tt>EncapError</tt> or
<tt>DecapError</tt> from <tt>Encap()</tt> or <tt>Decap()</tt>, respectively, whereas others may choose
to raise <tt>ValidationError</tt> unmodified.</t>
        <t>Applications using HPKE APIs should not assume that the errors here are complete,
nor should they assume certain classes of errors will always manifest the same way
for all ciphersuites. For example, the DHKEM specified in this document will emit
a <tt>DeserializationError</tt> or <tt>ValidationError</tt> if a KEM public key is invalid. However,
a new KEM might not have an efficient algorithm for determining whether or not a
public key is valid. In this case, an invalid public key might instead yield an
<tt>OpenError</tt> when trying to decrypt a ciphertext.</t>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <section anchor="sec-properties">
        <name>Security Properties</name>
        <t>HPKE has several security goals, depending on the mode of operation,
against active and adaptive attackers that can compromise partial
secrets of senders and recipients. The desired security goals are
detailed below:</t>
        <ul spacing="normal">
          <li>
            <t>Message secrecy: Confidentiality of the sender's messages against
chosen ciphertext attacks</t>
          </li>
          <li>
            <t>Export key secrecy: Indistinguishability of each export
secret from a uniformly random bitstring of equal length, i.e.,
<tt>Context.Export</tt> is a variable-length PRF</t>
          </li>
          <li>
            <t>Sender authentication: Proof of sender origin for PSK, Auth, and
AuthPSK modes</t>
          </li>
        </ul>
        <t>These security goals are expected to hold for any honest sender and
honest recipient keys, as well as if the honest sender and honest
recipient keys are the same.</t>
        <t>HPKE mitigates malleability problems (called benign malleability <xref target="SECG"/>) in prior
public key encryption standards based on ECIES by including all public keys in the
context of the key schedule.</t>
        <t>HPKE does not provide forward secrecy with respect to recipient compromise.
In the Base and Auth modes, the secrecy properties are only expected to
hold if the recipient private key <tt>skR</tt> is not compromised at any point
in time. In the PSK and AuthPSK modes, the secrecy properties are
expected to hold if the recipient private key <tt>skR</tt> and the pre-shared key
are not both compromised at any point in time. See <xref target="non-goals"/> for more
details.</t>
        <t>In the Auth mode, sender authentication is generally expected to hold if
the sender private key <tt>skS</tt> is not compromised at the time of message
reception. In the AuthPSK mode, sender authentication is generally
expected to hold if, at the time of message reception, the sender private
key skS and the pre-shared key are not both compromised.</t>
        <t>Besides forward secrecy and key-compromise impersonation, which are highlighted
in this section because of their particular cryptographic importance, HPKE
has other non-goals that are described in <xref target="non-goals"/>: no tolerance of
message reordering or loss, no downgrade or replay prevention, no hiding of the
plaintext length, and no protection against bad ephemeral randomness. <xref target="non-goals"/>
suggests application-level mitigations for some of them.</t>
        <section anchor="kci">
          <name>Key-Compromise Impersonation</name>
          <t>The DHKEM variants defined in this document are
vulnerable to key-compromise impersonation attacks <xref target="BJM97"/>,
which means that sender authentication cannot be expected to hold in the
Auth mode if the recipient private key <tt>skR</tt> is compromised, and in the
AuthPSK mode if the pre-shared key and the recipient private key <tt>skR</tt> are
both compromised. NaCl's <tt>box</tt> interface <xref target="NaCl"/> has the same issue. At
the same time, this enables repudiability.</t>
          <t>As shown by <xref target="ABHKLR20"/>, key-compromise impersonation attacks are generally possible on HPKE
because KEM ciphertexts are not bound to HPKE messages. An adversary who
knows a recipient's private key can decapsulate an observed KEM ciphertext,
compute the key schedule, and encrypt an arbitrary message that the recipient
will accept as coming from the original sender. Importantly, this is possible even
with a KEM that is resistant to key-compromise impersonation attacks. As a
result, mitigating this issue requires fundamental changes that are out of scope
of this specification.</t>
          <t>Applications that require resistance against key-compromise impersonation
SHOULD take extra steps to prevent this attack. One possibility is to
produce a digital signature over <tt>(enc, ct)</tt> tuples using a sender's
private key -- where <tt>ct</tt> is an AEAD ciphertext produced by the single-shot
or multi-shot API and <tt>enc</tt> is the corresponding KEM encapsulated key.</t>
          <t>Given these properties, pre-shared keys strengthen both the authentication and the
secrecy properties in certain adversary models. One particular example in which
this can be useful is a hybrid quantum setting: if a
non-quantum-resistant KEM used with HPKE is broken by a
quantum computer, the security properties are preserved through the use
of a pre-shared key. As described in Section 7 of <xref target="RFC8696"/> this
assumes that the pre-shared key has not been compromised.</t>
        </section>
        <section anchor="computational-analysis">
          <name>Computational Analysis</name>
          <t>It is shown in <xref target="CS01"/> that a hybrid public key encryption scheme of
essentially the same form as the Base mode described here is
IND-CCA2-secure as long as the underlying KEM and AEAD schemes are
IND-CCA2-secure. Moreover, it is shown in <xref target="HHK06"/> that IND-CCA2 security
of the KEM and the data encapsulation mechanism are necessary conditions
to achieve IND-CCA2 security for hybrid public key encryption.
The main difference between the scheme proposed in <xref target="CS01"/>
and the Base mode in this document (both named HPKE) is that we interpose
some KDF calls between the KEM and the AEAD. Analyzing the HPKE Base mode
instantiation in this document therefore requires verifying that the
additional KDF calls do not cause the IND-CCA2 property to fail, as
well as verifying the additional export key secrecy property.</t>
          <t>Analysis of the PSK, Auth, and AuthPSK modes defined in this document
additionally requires verifying the sender authentication property.
While the PSK mode just adds supplementary keying material to the key
schedule, the Auth and AuthPSK modes make use of a non-standard
authenticated KEM construction. Generally, the authenticated modes of
HPKE can be viewed and analyzed as flavors of signcryption <xref target="SigncryptionDZ10"/>.</t>
          <t>A preliminary computational analysis of all HPKE modes has been done
in <xref target="HPKEAnalysis"/>, indicating asymptotic security for the case where
the KEM is DHKEM, the AEAD is any IND-CPA-secure and INT-CTXT-secure scheme,
and the DH group and KDF satisfy the following conditions:</t>
          <ul spacing="normal">
            <li>
              <t>DH group: The gap Diffie-Hellman (GDH) problem is hard in the
appropriate subgroup <xref target="GAP"/>.</t>
            </li>
            <li>
              <t><tt>Extract()</tt> and <tt>Expand()</tt>: <tt>Extract()</tt> can be modeled as a random oracle.
<tt>Expand()</tt> can be modeled as a pseudorandom function, wherein the first
argument is the key.</t>
            </li>
          </ul>
          <t>In particular, the KDFs and DH groups defined in this document (see
<xref target="kdf-ids"/> and <xref target="kem-ids"/>) satisfy these properties when used as
specified. The analysis in <xref target="HPKEAnalysis"/> demonstrates that under these
constraints, HPKE continues to provide IND-CCA2 security, and provides
the additional properties noted above. Also, the analysis confirms the
expected properties hold under the different key compromise cases
mentioned above. The analysis considers a sender that sends one message
using the encryption context, and additionally exports two independent
secrets using the secret export interface.</t>
          <t>The table below summarizes the main results from <xref target="HPKEAnalysis"/>. N/A
means that a property does not apply for the given mode, whereas <tt>Y</tt> means
the given mode satisfies the property.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Variant</th>
                <th align="center">Message Sec.</th>
                <th align="center">Export Sec.</th>
                <th align="center">Sender Auth.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Base</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">N/A</td>
              </tr>
              <tr>
                <td align="left">PSK</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
              </tr>
              <tr>
                <td align="left">Auth</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
              </tr>
              <tr>
                <td align="left">AuthPSK</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
              </tr>
            </tbody>
          </table>
          <t>If non-DH-based KEMs are to be used with HPKE, further analysis will be
necessary to prove their security. The results from <xref target="CS01"/> provide
some indication that any IND-CCA2-secure KEM will suffice here, but are
not conclusive given the differences in the schemes.</t>
          <t>A detailed computational analysis of HPKE's Auth mode single-shot
encryption API has been done in <xref target="ABHKLR20"/>.
The paper defines security notions for authenticated
KEMs and for authenticated public key encryption, using the outsider and
insider security terminology known from signcryption <xref target="SigncryptionDZ10"/>.
The analysis proves that DHKEM's <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt> interface
fulfills these notions for all Diffie-Hellman groups specified in this document.
The analysis also provides exact security bounds, under the assumptions that the
gap Diffie-Hellman (GDH) problem is hard in the appropriate subgroup <xref target="GAP"/>,
and that HKDF can be modeled as a random oracle.</t>
          <t>Further, <xref target="ABHKLR20"/> proves composition theorems, showing that HPKE's
Auth mode fulfills the security notions of authenticated public key encryption
for all KDFs and AEAD schemes specified in this document, given any
authenticated KEM satisfying the previously defined security notions
for authenticated KEMs. The theorems assume that the KEM is perfectly correct;
they could easily be adapted to work with KEMs that have a nonzero but negligible
probability for decryption failure. The assumptions on the KDF are that <tt>Extract()</tt>
and <tt>Expand()</tt> can be modeled as pseudorandom functions wherein the first
argument is the key, respectively. The assumption for the AEAD is
IND-CPA and IND-CTXT security.</t>
          <t>In summary, the analysis in <xref target="ABHKLR20"/> proves that the single-shot encryption API of HPKE's
Auth mode satisfies the desired message confidentiality and sender
authentication properties listed at the beginning of this section;
it does not consider multiple messages, nor the secret export API.</t>
        </section>
        <section anchor="post-quantum-security">
          <name>Post-Quantum Security</name>
          <t>All of <xref target="CS01"/>, <xref target="HPKEAnalysis"/>, and <xref target="ABHKLR20"/> are premised on
classical security models and assumptions, and do not consider
adversaries capable of quantum computation. A full proof of post-quantum
security would need to take appropriate security models and assumptions
into account, in addition to simply using a post-quantum KEM. However,
the composition theorems from <xref target="ABHKLR20"/> for HPKE's Auth mode only make
standard assumptions (i.e., no random oracle assumption) that are expected
to hold against quantum adversaries (although with slightly worse bounds).
Thus, these composition theorems, in combination with a post-quantum-secure
authenticated KEM, guarantee the post-quantum security of HPKE's Auth mode.</t>
          <t>In future work, the analysis from <xref target="ABHKLR20"/> can be extended to cover
HPKE's other modes and desired security properties.
The hybrid quantum-resistance property described above, which is achieved
by using the PSK or AuthPSK mode, is not proven in <xref target="HPKEAnalysis"/> because
this analysis requires the random oracle model; in a quantum
setting, this model needs adaption to, for example, the quantum random
oracle model.</t>
        </section>
      </section>
      <section anchor="kem-security">
        <name>Security Requirements on a KEM Used within HPKE</name>
        <t>A KEM used within HPKE MUST allow HPKE to satisfy its desired security
properties described in <xref target="sec-properties"/>. <xref target="domain-separation"/> lists
requirements concerning domain separation.</t>
        <t>In particular, the KEM
shared secret MUST be a uniformly random byte string of length <tt>Nsecret</tt>.
This means, for instance, that it would not be sufficient if the KEM
shared secret is only uniformly random as an element of some set prior
to its encoding as a byte string.</t>
        <section anchor="encapdecap-interface">
          <name>Encap/Decap Interface</name>
          <t>As mentioned in <xref target="sec-considerations"/>, <xref target="CS01"/> provides some indications
that if the KEM's <tt>Encap()</tt>/<tt>Decap()</tt> interface (which is used in the Base
and PSK modes) is IND-CCA2-secure, HPKE is able to satisfy its desired
security properties. An appropriate definition of IND-CCA2 security for
KEMs can be found in <xref target="CS01"/> and <xref target="BHK09"/>.</t>
        </section>
        <section anchor="authencapauthdecap-interface">
          <name>AuthEncap/AuthDecap Interface</name>
          <t>The analysis of HPKE's Auth mode single-shot encryption API in <xref target="ABHKLR20"/>
provides composition theorems that guarantee that HPKE's Auth mode achieves
its desired security properties if the KEM's <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt>
interface satisfies multi-user Outsider-CCA, Outsider-Auth, and
Insider-CCA security, as defined in the same paper.</t>
          <t>Intuitively, Outsider-CCA security formalizes confidentiality, and
Outsider-Auth security formalizes authentication of the KEM shared secret
in case none of the sender or recipient private keys are compromised.
Insider-CCA security formalizes confidentiality of the KEM shared secret
in case the sender private key is known or chosen by the adversary.
(If the recipient private key is known or chosen by the adversary,
confidentiality is trivially broken, because then the adversary knows
all secrets on the recipient's side).</t>
          <t>An Insider-Auth security notion would formalize authentication of the
KEM shared secret in case the recipient private key is known or chosen
by the adversary. (If the sender private key is known or chosen by the
adversary, it can create KEM ciphertexts in the name of the sender).
Because of the generic attack on an analogous Insider-Auth security
notion of HPKE described in <xref target="sec-properties"/>, a definition of
Insider-Auth security for KEMs used within HPKE is not useful.</t>
        </section>
        <section anchor="kem-key-reuse">
          <name>KEM Key Reuse</name>
          <t>An <tt>ikm</tt> input to <tt>DeriveKeyPair()</tt> (<xref target="derive-key-pair"/>) MUST NOT be
reused elsewhere, in particular not with <tt>DeriveKeyPair()</tt> of a
different KEM.</t>
          <t>The randomness used in <tt>Encap()</tt> and <tt>AuthEncap()</tt> to generate the
KEM shared secret or its encapsulation MUST NOT be reused elsewhere.</t>
          <t>Since a KEM key pair belonging to a sender or recipient works with all modes, it can
be used with multiple modes in parallel. HPKE is constructed to be
secure in such settings due to domain separation using the <tt>suite_id</tt>
variable. However, there is no formal proof of security at the time of
writing for using multiple modes in parallel; <xref target="HPKEAnalysis"/> and
<xref target="ABHKLR20"/> only analyze isolated modes.</t>
        </section>
      </section>
      <section anchor="kdf-choice">
        <name>Security Requirements on a KDF</name>
        <t>The choice of the KDF for HPKE SHOULD be made based on the security
level provided by the KEM and, if applicable, by the PSK. The KDF
SHOULD at least have the security level of the KEM and SHOULD
at least have the security level provided by the PSK.</t>
      </section>
      <section anchor="aead-security">
        <name>Security Requirements on an AEAD</name>
        <t>All AEADs MUST be IND-CCA2-secure, as is currently true for all AEADs
listed in <xref target="aead-ids"/>.</t>
      </section>
      <section anchor="security-psk">
        <name>Pre-Shared Key Recommendations</name>
        <t>In the PSK and AuthPSK modes, the PSK MUST have at least 32 bytes of
entropy and SHOULD be of length <tt>Nh</tt> bytes or longer. Using a PSK longer than
32 bytes but shorter than <tt>Nh</tt> bytes is permitted.</t>
        <t>HPKE is specified to use HKDF as its key derivation function. HKDF is not
designed to slow down dictionary attacks (see <xref target="RFC5869"/>). Thus, HPKE's
PSK mechanism is not suitable for use with a low-entropy password as the
PSK: In scenarios in which the adversary knows the KEM shared secret
<tt>shared_secret</tt> and has access to an oracle that distinguishes between
a good and a wrong PSK, it can perform PSK-recovering attacks. This oracle
can be the decryption operation on a captured HPKE ciphertext or any other
recipient behavior that is observably different when using a wrong PSK.
The adversary knows the KEM shared secret <tt>shared_secret</tt> if it knows all
KEM private keys of one participant. In the PSK mode, this is trivially
the case if the adversary acts as the sender.</t>
        <t>To recover a lower entropy PSK, an attacker in this scenario can trivially
perform a dictionary attack. Given a set <tt>S</tt> of possible PSK values, the
attacker generates an HPKE ciphertext for each value in <tt>S</tt>, and submits
the resulting ciphertexts to the oracle to learn which PSK is being used by
the recipient. Further, because HPKE uses AEAD schemes that are not key-committing,
an attacker can mount a partitioning oracle attack <xref target="LGR20"/> that can recover
the PSK from a set of <tt>S</tt> possible PSK values, with |S| = m*k, in roughly
m + log k queries to the oracle using ciphertexts of length proportional to
k, the maximum message length in blocks. (Applying the multi-collision algorithm from
<xref target="LGR20"/> requires a small adaptation to the algorithm wherein the appropriate nonce
is computed for each candidate key. This modification adds one call to HKDF per key.
The number of partitioning oracle queries remains unchanged.) As a result, the PSK
must therefore be chosen with sufficient entropy so that m + log k is prohibitive for
attackers (e.g., 2^128). Future specifications can define new AEAD algorithms that
are key-committing.</t>
      </section>
      <section anchor="domain-separation">
        <name>Domain Separation</name>
        <t>HPKE allows combining a DHKEM variant <tt>DHKEM(Group, KDF')</tt> and a KDF
such that both KDFs are instantiated by the same KDF. By design, the
calls to <tt>Extract()</tt> and <tt>Expand()</tt> inside DHKEM and the remainder of
HPKE use separate input domains. This justifies modeling them as
independent functions even if instantiated by the same KDF.
This domain separation between DHKEM and the remainder of HPKE is achieved by
using prefix-free sets of <tt>suite_id</tt> values in <tt>LabeledExtract()</tt> and
<tt>LabeledExpand()</tt> (<tt>KEM...</tt> in DHKEM and <tt>HPKE...</tt> in the remainder of HPKE).
Recall that a set is prefix-free if no element is a prefix of another within the
set.</t>
        <t>Future KEM instantiations MUST ensure, should <tt>Extract()</tt> and
<tt>Expand()</tt> be used internally, that they can be modeled as functions
independent from the invocations of <tt>Extract()</tt> and <tt>Expand()</tt> in the
remainder of HPKE. One way to ensure this is by using <tt>LabeledExtract()</tt>
and <tt>LabeledExpand()</tt> with a <tt>suite_id</tt> as defined in <xref target="base-crypto"/>,
which will ensure input domain separation, as outlined above.
Particular attention needs to
be paid if the KEM directly invokes functions that are used internally
in HPKE's <tt>Extract()</tt> or <tt>Expand()</tt>, such as <tt>Hash()</tt> and <tt>HMAC()</tt> in the case of HKDF.
It MUST be ensured that inputs to these invocations cannot collide with
inputs to the internal invocations of these functions inside <tt>Extract()</tt> or
<tt>Expand()</tt>. In HPKE's <tt>KeySchedule()</tt> this is avoided by using <tt>Extract()</tt> instead of
<tt>Hash()</tt> on the arbitrary-length inputs <tt>info</tt> and <tt>psk_id</tt>.</t>
        <t>The string literal "HPKE-v1" used in <tt>LabeledExtract()</tt> and <tt>LabeledExpand()</tt>
ensures that any secrets derived in HPKE are bound to the scheme's name
and version, even when possibly derived from the same Diffie-Hellman or
KEM shared secret as in another scheme or version.</t>
      </section>
      <section anchor="non-goals">
        <name>Application Embedding and Non-Goals</name>
        <t>HPKE is designed to be a fairly low-level mechanism.  As a result, it assumes
that certain properties are provided by the application in which HPKE is
embedded and leaves certain security properties to be provided by other
mechanisms. Otherwise said, certain properties are out-of-scope for HPKE.</t>
        <section anchor="message-order-and-message-loss">
          <name>Message Order and Message Loss</name>
          <t>The primary requirement that HPKE imposes on applications is the requirement
that ciphertexts MUST be presented to <tt>ContextR.Open()</tt> in the same order in
which they were generated by <tt>ContextS.Seal()</tt>.  When the single-shot API is
used (see <xref target="single-shot-apis"/>), this is trivially true (since there is only
ever one ciphertext.  Applications that allow for multiple invocations of
<tt>Open()</tt> / <tt>Seal()</tt> on the same context MUST enforce the ordering property
described above.</t>
          <t>Ordering requirements of this character are usually fulfilled by providing a
sequence number in the framing of encrypted messages.  Whatever information is
used to determine the ordering of HPKE-encrypted messages SHOULD be included in
the AAD passed to <tt>ContextS.Seal()</tt> and <tt>ContextR.Open()</tt>.  The specifics of
this scheme are up to the application.</t>
          <t>HPKE is not tolerant of lost messages. Applications MUST be able to detect when
a message has been lost.  When an unrecoverable loss is detected, the application MUST discard
any associated HPKE context.</t>
        </section>
        <section anchor="downgrade-prevention">
          <name>Downgrade Prevention</name>
          <t>HPKE assumes that the sender and recipient agree on what algorithms to use.
Depending on how these algorithms are negotiated, it may be possible for an
intermediary to force the two parties to use suboptimal algorithms.</t>
        </section>
        <section anchor="replay-protection">
          <name>Replay Protection</name>
          <t>The requirement that ciphertexts be presented to the <tt>ContextR.Open()</tt> function
in the same order they were generated by <tt>ContextS.Seal()</tt> provides a degree of
replay protection within a stream of ciphertexts resulting from a given context.
HPKE provides no other replay protection.</t>
        </section>
        <section anchor="forward-secrecy">
          <name>Forward Secrecy</name>
          <t>HPKE ciphertexts are not forward secret with respect to recipient compromise
in any mode. This means that compromise of long-term recipient secrets allows
an attacker to decrypt past ciphertexts encrypted under said secrets. This is because
only long-term secrets are used on the side of the recipient.</t>
          <t>HPKE ciphertexts are forward secret with respect to sender compromise in all
modes. This is because ephemeral randomness is used on the sender's side, which
is supposed to be erased directly after computation of the KEM shared secret and
ciphertext.</t>
        </section>
        <section anchor="bad-ephemeral-randomness">
          <name>Bad Ephemeral Randomness</name>
          <t>If the randomness used for KEM encapsulation is bad -- i.e., of low entropy or
compromised because of a broken or subverted random number generator -- the
confidentiality guarantees of HPKE degrade significantly. In Base mode,
confidentiality guarantees can be lost completely; in the other modes, at least forward secrecy with
respect to sender compromise can be lost completely.</t>
          <t>Such a situation could also lead to the reuse of the same KEM shared secret
and thus to the reuse of same key-nonce pairs for the AEAD.
The AEADs specified in this document are not secure
in case of nonce reuse. This attack vector is particularly relevant in
authenticated modes because knowledge of the ephemeral randomness is not
enough to derive <tt>shared_secret</tt> in these modes.</t>
          <t>One way for applications to mitigate the impacts of bad ephemeral randomness is
to combine ephemeral randomness with a local long-term secret that has been
generated securely, as described in <xref target="RFC8937"/>.</t>
        </section>
        <section anchor="hiding-plaintext-length">
          <name>Hiding Plaintext Length</name>
          <t>AEAD ciphertexts produced by HPKE do not hide the plaintext length. Applications
requiring this level of privacy should use a suitable padding mechanism. See
<xref target="I-D.ietf-tls-esni"/> and <xref target="RFC8467"/> for examples of protocol-specific
padding policies.</t>
        </section>
      </section>
      <section anchor="bidirectional">
        <name>Bidirectional Encryption</name>
        <t>As discussed in <xref target="hpke-dem"/>, HPKE encryption is unidirectional from sender
to recipient. Applications that require bidirectional encryption can derive
necessary keying material with the secret export interface <xref target="hpke-export"/>.
The type and length of such keying material depends on the application use
case.</t>
        <t>As an example, if an application needs AEAD encryption from the recipient to
the sender, it can derive a key and nonce from the corresponding HPKE context
as follows:</t>
        <artwork><![CDATA[
key = context.Export("response key", Nk)
nonce = context.Export("response nonce", Nn)
]]></artwork>
        <t>In this example, the length of each secret is based on the AEAD algorithm
used for the corresponding HPKE context.</t>
        <t>Note that HPKE's limitations with regard to sender authentication become limits
on recipient authentication in this context. In particular, in the Base mode,
there is no authentication of the remote party at all. Even in the Auth mode,
where the remote party has proven that they hold a specific private key, this
authentication is still subject to key-compromise impersonation, as discussed
in <xref target="kci"/>.</t>
      </section>
      <section anchor="metadata-protection">
        <name>Metadata Protection</name>
        <t>The authenticated modes of HPKE (PSK, Auth, and AuthPSK) require that the recipient
know what key material to use for the sender.  This can be signaled in
applications by sending the PSK ID (<tt>psk_id</tt> above) and/or the sender's public
key (<tt>pkS</tt>).  However, these values themselves might be considered sensitive,
since, in a given application context, they might identify the sender.</t>
        <t>An application that wishes to protect these metadata values without requiring
further provisioning of keys can use an additional instance of HPKE, using the
unauthenticated Base mode.  Where the application might have sent <tt>(psk_id, pkS,
enc, ciphertext)</tt> before, it would now send <tt>(enc2, ciphertext2, enc, ciphertext)</tt>,
where <tt>(enc2, ciphertext2)</tt> represent the encryption of the <tt>psk_id</tt> and <tt>pkS</tt>
values.</t>
        <t>The cost of this approach is an additional KEM operation each for the sender and
the recipient.  A potential lower-cost approach (involving only symmetric
operations) would be available if the nonce-protection schemes in <xref target="BNT19"/>
could be extended to cover other metadata.  However, this construction would
require further analysis.</t>
      </section>
    </section>
    <section anchor="message-encoding">
      <name>Message Encoding</name>
      <t>This document does not specify a wire format encoding for HPKE messages. Applications
that adopt HPKE must therefore specify an unambiguous encoding mechanism that includes,
minimally: the encapsulated value <tt>enc</tt>, ciphertext value(s) (and order if there are
multiple), and any info values that are not implicit. One example of a non-implicit
value is the recipient public key used for encapsulation, which may be needed if a
recipient has more than one public key.</t>
      <t>The AEAD interface used in this document is based on <xref target="RFC5116"/>, which produces and
consumes a single ciphertext value. As discussed in <xref target="RFC5116"/>, this ciphertext value
contains the encrypted plaintext as well as any authentication data, encoded in a manner
described by the individual AEAD scheme. Some implementations are not structured in this
way, instead providing a separate ciphertext and authentication tag. When such
AEAD implementations are used in HPKE implementations, the HPKE implementation must combine
these inputs into a single ciphertext value within <tt>Seal()</tt> and parse them out within
<tt>Open()</tt>, where the parsing details are defined by the AEAD scheme. For example, with
the AES-GCM schemes specified in this document, the GCM authentication tag is placed in
the last Nt bytes of the ciphertext output.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA has created three new registries:</t>
      <ul spacing="normal">
        <li>
          <t>HPKE KEM Identifiers</t>
        </li>
        <li>
          <t>HPKE KDF Identifiers</t>
        </li>
        <li>
          <t>HPKE AEAD Identifiers</t>
        </li>
      </ul>
      <t>All these registries are under "Hybrid Public Key
Encryption", and administered under a Specification Required policy <xref target="RFC8126"/></t>
      <section anchor="kem-template">
        <name>KEM Identifiers</name>
        <t>The "HPKE KEM Identifiers" registry lists identifiers for key encapsulation
algorithms defined for use with HPKE.  These identifiers are two-byte values,
so the maximum possible value is 0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>KEM: The name of the algorithm</t>
          </li>
          <li>
            <t>Nsecret: The length in bytes of a KEM shared secret produced by the algorithm</t>
          </li>
          <li>
            <t>Nenc: The length in bytes of an encoded encapsulated key produced by the algorithm</t>
          </li>
          <li>
            <t>Npk: The length in bytes of an encoded public key for the algorithm</t>
          </li>
          <li>
            <t>Nsk: The length in bytes of an encoded private key for the algorithm</t>
          </li>
          <li>
            <t>Auth: A boolean indicating if this algorithm provides the <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt> interface</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="kemid-values"/></t>
      </section>
      <section anchor="kdf-identifiers">
        <name>KDF Identifiers</name>
        <t>The "HPKE KDF Identifiers" registry lists identifiers for key derivation
functions defined for use with HPKE.  These identifiers are two-byte values,
so the maximum possible value is 0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>KDF: The name of the algorithm</t>
          </li>
          <li>
            <t>Nh: The output size of the Extract function in bytes</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="kdfid-values"/></t>
      </section>
      <section anchor="aead-identifiers">
        <name>AEAD Identifiers</name>
        <t>The "HPKE AEAD Identifiers" registry lists identifiers for authenticated
encryption with associated data (AEAD) algorithms defined for use with HPKE.
These identifiers are two-byte values, so the maximum possible value is
0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>AEAD: The name of the algorithm</t>
          </li>
          <li>
            <t>Nk: The length in bytes of a key for this algorithm</t>
          </li>
          <li>
            <t>Nn: The length in bytes of a nonce for this algorithm</t>
          </li>
          <li>
            <t>Nt: The length in bytes of an authentication tag for this algorithm</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="aeadid-values"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CS01" target="https://eprint.iacr.org/2001/108">
          <front>
            <title>Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack</title>
            <author initials="R." surname="Cramer" fullname="Ronald Cramer">
              <organization/>
            </author>
            <author initials="V." surname="Shoup" fullname="Victor Shoup">
              <organization/>
            </author>
            <date year="2001"/>
          </front>
        </reference>
        <reference anchor="HHK06" target="https://eprint.iacr.org/2006/265">
          <front>
            <title>Some (in)sufficient conditions for secure hybrid encryption</title>
            <author initials="J." surname="Herranz" fullname="Javier Herranz">
              <organization/>
            </author>
            <author initials="D." surname="Hofheinz" fullname="Dennis Hofheinz">
              <organization/>
            </author>
            <author initials="E." surname="Kiltz" fullname="Eike Kiltz">
              <organization/>
            </author>
            <date year="2006"/>
          </front>
        </reference>
        <reference anchor="GAP" target="https://link.springer.com/content/pdf/10.1007/3-540-44586-2_8.pdf">
          <front>
            <title>The Gap-Problems - a New Class of Problems for the Security of Cryptographic Schemes</title>
            <author initials="T." surname="Okamoto" fullname="Tatsuaki Okamoto">
              <organization/>
            </author>
            <author initials="D." surname="Pointcheval" fullname="David Pointcheval">
              <organization/>
            </author>
            <date year="2001"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-540-44586-9"/>
        </reference>
        <reference anchor="ANSI">
          <front>
            <title>ANSI X9.63 Public Key Cryptography for the Financial Services Industry -- Key Agreement and Key Transport Using Elliptic Curve Cryptography</title>
            <author>
              <organization>American National Standards Institute</organization>
            </author>
            <date year="2001"/>
          </front>
        </reference>
        <reference anchor="IEEE1363">
          <front>
            <title>IEEE 1363a, Standard Specifications for Public Key Cryptography - Amendment 1 -- Additional Techniques"</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2004"/>
          </front>
        </reference>
        <reference anchor="ISO">
          <front>
            <title>ISO/IEC 18033-2, Information Technology - Security Techniques - Encryption Algorithms - Part 2 -- Asymmetric Ciphers</title>
            <author>
              <organization>International Organization for Standardization / International Electrotechnical Commission</organization>
            </author>
            <date year="2006"/>
          </front>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="BHK09" target="https://eprint.iacr.org/2009/418">
          <front>
            <title>Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?</title>
            <author initials="" surname="Mihir Bellare">
              <organization>University of California San Diego</organization>
            </author>
            <author initials="" surname="Dennis Hofheinz">
              <organization>CWI Amsterdam</organization>
            </author>
            <author initials="" surname="Eike Kiltz">
              <organization>CWI Amsterdam</organization>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="SigncryptionDZ10">
          <front>
            <title>Practical Signcryption</title>
            <author>
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="Information Security and" value="Cryptography"/>
          <seriesInfo name="DOI" value="10.1007/978-3-540-89411-7"/>
          <seriesInfo name="ISBN" value="[&quot;9783540894094&quot;, &quot;9783540894117&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="HPKEAnalysis" target="https://eprint.iacr.org/2020/243">
          <front>
            <title>An Analysis of Hybrid Public Key Encryption</title>
            <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
              <organization>Inria Paris</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ABHKLR20" target="https://eprint.iacr.org/2020/1499">
          <front>
            <title>Analysing the HPKE Standard</title>
            <author initials="J." surname="Alwen" fullname="Joël Alwen">
              <organization>Wickr</organization>
            </author>
            <author initials="B." surname="Blanchet" fullname="Bruno Blanchet">
              <organization>Inria Paris</organization>
            </author>
            <author initials="E." surname="Hauck" fullname="Eduard Hauck">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <author initials="E." surname="Kiltz" fullname="Eike Kiltz">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
              <organization>Inria Paris</organization>
            </author>
            <author initials="D." surname="Riepel" fullname="Doreen Riepel">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="MAEA10" target="https://ieeexplore.ieee.org/abstract/document/5604194/">
          <front>
            <title>A Comparison of the Standardized Versions of ECIES</title>
            <author initials="V." surname="Gayoso Martinez" fullname="V. Gayoso Martinez">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="F." surname="Hernandez Alvarez" fullname="F. Hernandez Alvarez">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="L." surname="Hernandez Encinas" fullname="L. Hernandez Encinas">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="C." surname="Sanchez Avila" fullname="C. Sanchez Avila">
              <organization>Polytechnic University, Madrid, Spain</organization>
            </author>
            <date year="2010"/>
          </front>
        </reference>
        <reference anchor="BNT19" target="http://dx.doi.org/10.1007/978-3-030-26948-7_9">
          <front>
            <title>Nonces Are Noticed: AEAD Revisited</title>
            <author initials="M." surname="Bellare" fullname="Mihir Bellare">
              <organization>University of California, San Diego</organization>
            </author>
            <author initials="R." surname="Ng" fullname="Ruth Ng">
              <organization>University of California, San Diego</organization>
            </author>
            <author initials="B." surname="Tackmann" fullname="Björn Tackmann">
              <organization>IBM Research</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="IMB">
          <front>
            <title>Authentication and authenticated key exchanges</title>
            <author fullname="Whitfield Diffie" initials="W." surname="Diffie">
              <organization/>
            </author>
            <author fullname="Paul C. Van Oorschot" initials="P." surname="Van Oorschot">
              <organization/>
            </author>
            <author fullname="Michael J. Wiener" initials="M." surname="Wiener">
              <organization/>
            </author>
            <date month="June" year="1992"/>
          </front>
          <seriesInfo name="Designs, Codes and Cryptography" value="vol. 2, no. 2, pp. 107-125"/>
          <seriesInfo name="DOI" value="10.1007/bf00124891"/>
          <refcontent>Springer Science and Business Media LLC</refcontent>
        </reference>
        <reference anchor="LGR20" target="https://eprint.iacr.org/2020/1491">
          <front>
            <title>Partitioning Oracle Attacks</title>
            <author initials="J." surname="Len" fullname="Julia Len">
              <organization>Cornell Tech</organization>
            </author>
            <author initials="P." surname="Grubbs" fullname="Paul Grubbs">
              <organization>Cornell Tech</organization>
            </author>
            <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
              <organization>Cornell Tech</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TestVectors" target="https://github.com/cfrg/draft-irtf-cfrg-hpke/blob/5f503c564da00b0687b3de75f1dfbdfc4079ad31/test-vectors.json">
          <front>
            <title>HPKE Test Vectors</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="keyagreement">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NISTCurves">
          <front>
            <title>Digital signature standard (DSS)</title>
            <author>
              <organization/>
            </author>
            <date year="2013"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.186-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NaCl" target="https://nacl.cr.yp.to/box.html">
          <front>
            <title>Public-key authenticated encryption: crypto_box</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="RFC1421">
          <front>
            <title>Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures</title>
            <author fullname="J. Linn" initials="J." surname="Linn"/>
            <date month="February" year="1993"/>
            <abstract>
              <t>This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1421"/>
          <seriesInfo name="DOI" value="10.17487/RFC1421"/>
        </reference>
        <reference anchor="I-D.ietf-mls-protocol">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benjamin Beurdouche" initials="B." surname="Beurdouche">
              <organization>Inria &amp; Mozilla</organization>
            </author>
            <author fullname="Raphael Robert" initials="R." surname="Robert">
              <organization>Phoenix R&amp;D</organization>
            </author>
            <author fullname="Jon Millican" initials="J." surname="Millican">
              <organization>Meta Platforms</organization>
            </author>
            <author fullname="Emad Omara" initials="E." surname="Omara">
              <organization>Google</organization>
            </author>
            <author fullname="Katriel Cohn-Gordon" initials="K." surname="Cohn-Gordon">
              <organization>University of Oxford</organization>
            </author>
            <date day="27" month="March" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages.  Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time.  In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mls-protocol-20"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-23"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC8439">
          <front>
            <title>ChaCha20 and Poly1305 for IETF Protocols</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This document defines the ChaCha20 stream cipher as well as the use of the Poly1305 authenticator, both as stand-alone algorithms and as a "combined mode", or Authenticated Encryption with Associated Data (AEAD) algorithm.</t>
              <t>RFC 7539, the predecessor of this document, was meant to serve as a stable reference and an implementation guide. It was a product of the Crypto Forum Research Group (CFRG). This document merges the errata filed against RFC 7539 and adds a little text to the Security Considerations section.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8439"/>
          <seriesInfo name="DOI" value="10.17487/RFC8439"/>
        </reference>
        <reference anchor="BJM97">
          <front>
            <title>Key agreement protocols and their security analysis: Extended Abstract</title>
            <author fullname="Simon Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="Don Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="Alfred Menezes" initials="A." surname="Menezes">
              <organization/>
            </author>
            <date year="1997"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 30-45"/>
          <seriesInfo name="DOI" value="10.1007/bfb0024447"/>
          <seriesInfo name="ISBN" value="[&quot;9783540639275&quot;, &quot;9783540696681&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="RFC8696">
          <front>
            <title>Using Pre-Shared Key (PSK) in the Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="December" year="2019"/>
            <abstract>
              <t>The invention of a large-scale quantum computer would pose a serious challenge for the cryptographic algorithms that are widely deployed today. The Cryptographic Message Syntax (CMS) supports key transport and key agreement algorithms that could be broken by the invention of such a quantum computer. By storing communications that are protected with the CMS today, someone could decrypt them in the future when a large-scale quantum computer becomes available. Once quantum-secure key management algorithms are available, the CMS will be extended to support the new algorithms if the existing syntax does not accommodate them. This document describes a mechanism to protect today's communication from the future invention of a large-scale quantum computer by mixing the output of key transport and key agreement algorithms with a pre-shared key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8696"/>
          <seriesInfo name="DOI" value="10.17487/RFC8696"/>
        </reference>
        <reference anchor="RFC8937">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author fullname="C. Cremers" initials="C." surname="Cremers"/>
            <author fullname="L. Garratt" initials="L." surname="Garratt"/>
            <author fullname="S. Smyshlyaev" initials="S." surname="Smyshlyaev"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="RFC8467">
          <front>
            <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8467"/>
          <seriesInfo name="DOI" value="10.17487/RFC8467"/>
        </reference>
      </references>
    </references>
    <?line 1814?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joël Alwen, Jean-Philippe Aumasson, David
Benjamin, Benjamin Beurdouche, Bruno Blanchet, Frank Denis, Stephen Farrell,
Scott Fluhrer, Eduard Hauck, Scott Hollenbeck, Kevin Jacobs, Burt Kaliski, Eike
Kiltz, Julia Len, John Mattsson, Christopher Patton, Doreen Riepel, Raphael
Robert, Michael Rosenberg, Michael Scott, Martin Thomson, Steven Valdez, Riad
Wahby, and other contributors in the CFRG for helpful feedback that greatly
improved this document.</t>
    </section>
    <section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>Each section below contains test vectors for a single HPKE ciphersuite and
contains the following values:</t>
      <ol spacing="normal" type="1"><li>
          <t>Configuration information and private key material: This includes the <tt>mode</tt>, <tt>info</tt> string, HPKE
ciphersuite identifiers (<tt>kem_id</tt>, <tt>kdf_id</tt>, <tt>aead_id</tt>), and all
sender, recipient, and ephemeral key material. For each role X,
where X is one of S, R, or E, as sender, recipient, and ephemeral,
respectively, key pairs are generated as <tt>(skX, pkX) = DeriveKeyPair(ikmX)</tt>.
Each key pair <tt>(skX, pkX)</tt> is written in its serialized form, where
<tt>skXm = SerializePrivateKey(skX)</tt> and <tt>pkXm = SerializePublicKey(pkX)</tt>.
For applicable modes, the shared PSK and PSK identifier are also included.</t>
        </li>
        <li>
          <t>Context creation intermediate values and outputs: This includes the
KEM outputs <tt>enc</tt> and <tt>shared_secret</tt> used to create the context, along
with intermediate values <tt>key_schedule_context</tt> and <tt>secret</tt> computed
in the KeySchedule function in <xref target="encryption-context"/>. The outputs
include the context values <tt>key</tt>, <tt>base_nonce</tt>, and <tt>exporter_secret</tt>.</t>
        </li>
        <li>
          <t>Encryption test vectors: A fixed plaintext message is encrypted using
different sequence numbers and AAD values using the context computed in (2).
Each test vector lists the sequence number and corresponding nonce computed
with <tt>base_nonce</tt>, the plaintext message <tt>pt</tt>, AAD <tt>aad</tt>, and output
ciphertext <tt>ct</tt>.</t>
        </li>
        <li>
          <t>Export test vectors: Several exported values of the same length with differing
context parameters are computed using the context computed in (2). Each test
vector lists the <tt>exporter_context</tt>, output length <tt>L</tt>, and resulting export
value.</t>
        </li>
      </ol>
      <t>These test vectors are also available in JSON format at <xref target="TestVectors"/>.</t>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-aes-128-gcm">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, AES-128-GCM</name>
        <section anchor="base-setup-information">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
7268600d403fce431561aef583ee1613527cff655c1343f29812e66706df3234
pkEm:
37fda3567bdbd628e88668c3c8d7e97d1d1253b6d4ea6d44c150f741f1bf4431
skEm:
52c4a758a802cd8b936eceea314432798d5baf2d7e9235dc084ab1b9cfa2f736
ikmR:
6db9df30aa07dd42ee5e8181afdb977e538f5e1fec8a06223f33f7013e525037
pkRm:
3948cfe0ad1ddb695d780e59077195da6c56506b027329794ab02bca80815c4d
skRm:
4612c550263fc8ad58375df3f557aac531d26850903e55a9f23f21d8534e8ac8
enc:
37fda3567bdbd628e88668c3c8d7e97d1d1253b6d4ea6d44c150f741f1bf4431
shared_secret:
fe0e18c9f024ce43799ae393c7e8fe8fce9d218875e8227b0187c04e7d2ea1fc
key_schedule_context: 00725611c9d98c07c03f60095cd32d400d8347d45ed670
97bbad50fc56da742d07cb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
12fff91991e93b48de37e7daddb52981084bd8aa64289c3788471d9a9712f397
key: 4531685d41d65f03dc48f6b8302c05b0
base_nonce: 56d890e5accaaf011cff4b7d
exporter_secret:
45ff1c2e220db587171952c0592d5f5ebe103f1561a2614e38f2ffd47e99e3f8
]]></artwork>
          <section anchor="encryptions">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 56d890e5accaaf011cff4b7d
ct: f938558b5d72f1a23810b4be2ab4f84331acc02fc97babc53a52ae8218a355a9
6d8770ac83d07bea87e13c512a

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 56d890e5accaaf011cff4b7c
ct: af2d7e9ac9ae7e270f46ba1f975be53c09f8d875bdc8535458c2494e8a6eab25
1c03d0c22a56b8ca42c2063b84

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 56d890e5accaaf011cff4b7f
ct: 498dfcabd92e8acedc281e85af1cb4e3e31c7dc394a1ca20e173cb7251649158
8d96a19ad4a683518973dcc180

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 56d890e5accaaf011cff4b79
ct: 583bd32bc67a5994bb8ceaca813d369bca7b2a42408cddef5e22f880b631215a
09fc0012bc69fccaa251c0246d

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 56d890e5accaaf011cff4b82
ct: 7175db9717964058640a3a11fb9007941a5d1757fda1a6935c805c21af32505b
f106deefec4a49ac38d71c9e0a

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 56d890e5accaaf011cff4a7d
ct: 957f9800542b0b8891badb026d79cc54597cb2d225b54c00c5238c25d05c30e3
fbeda97d2e0e1aba483a2df9f2
]]></artwork>
          </section>
          <section anchor="exported-values">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
3853fe2b4035195a573ffc53856e77058e15d9ea064de3e59f4961d0095250ee

exporter_context: 00
L: 32
exported_value:
2e8f0b54673c7029649d4eb9d5e33bf1872cf76d623ff164ac185da9e88c21a5

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
e9e43065102c3836401bed8c3c3c75ae46be1639869391d62c61f1ec7af54931
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
78628c354e46f3e169bd231be7b2ff1c77aa302460a26dbfa15515684c00130b
pkEm:
0ad0950d9fb9588e59690b74f1237ecdf1d775cd60be2eca57af5a4b0471c91b
skEm:
463426a9ffb42bb17dbe6044b9abd1d4e4d95f9041cef0e99d7824eef2b6f588
ikmR:
d4a09d09f575fef425905d2ab396c1449141463f698f8efdb7accfaff8995098
pkRm:
9fed7e8c17387560e92cc6462a68049657246a09bfa8ade7aefe589672016366
skRm:
c5eb01eb457fe6c6f57577c5413b931550a162c71a03ac8d196babbd4e5ce0fd
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
0ad0950d9fb9588e59690b74f1237ecdf1d775cd60be2eca57af5a4b0471c91b
shared_secret:
727699f009ffe3c076315019c69648366b69171439bd7dd0807743bde76986cd
key_schedule_context: 01e78d5cf6190d275863411ff5edd0dece5d39fa48e04e
ec1ed9b71be34729d18ccb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
3728ab0b024b383b0381e432b47cced1496d2516957a76e2a9f5c8cb947afca4
key: 15026dba546e3ae05836fc7de5a7bb26
base_nonce: 9518635eba129d5ce0914555
exporter_secret:
3d76025dbbedc49448ec3f9080a1abab6b06e91c0b11ad23c912f043a0ee7655
]]></artwork>
          <section anchor="encryptions-1">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 9518635eba129d5ce0914555
ct: e52c6fed7f758d0cf7145689f21bc1be6ec9ea097fef4e959440012f4feb73fb
611b946199e681f4cfc34db8ea

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 9518635eba129d5ce0914554
ct: 49f3b19b28a9ea9f43e8c71204c00d4a490ee7f61387b6719db765e948123b45
b61633ef059ba22cd62437c8ba

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 9518635eba129d5ce0914557
ct: 257ca6a08473dc851fde45afd598cc83e326ddd0abe1ef23baa3baa4dd8cde99
fce2c1e8ce687b0b47ead1adc9

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 9518635eba129d5ce0914551
ct: a71d73a2cd8128fcccbd328b9684d70096e073b59b40b55e6419c9c68ae21069
c847e2a70f5d8fb821ce3dfb1c

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 9518635eba129d5ce09145aa
ct: 55f84b030b7f7197f7d7d552365b6b932df5ec1abacd30241cb4bc4ccea27bd2
b518766adfa0fb1b71170e9392

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 9518635eba129d5ce0914455
ct: c5bf246d4a790a12dcc9eed5eae525081e6fb541d5849e9ce8abd92a3bc15517
76bea16b4a518f23e237c14b59
]]></artwork>
          </section>
          <section anchor="exported-values-1">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
dff17af354c8b41673567db6259fd6029967b4e1aad13023c2ae5df8f4f43bf6

exporter_context: 00
L: 32
exported_value:
6a847261d8207fe596befb52928463881ab493da345b10e1dcc645e3b94e2d95

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
8aff52b45a1be3a734bc7a41e20b4e055ad4c4d22104b0c20285a7c4302401cd
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
6e6d8f200ea2fb20c30b003a8b4f433d2f4ed4c2658d5bc8ce2fef718059c9f7
pkEm:
23fb952571a14a25e3d678140cd0e5eb47a0961bb18afcf85896e5453c312e76
skEm:
ff4442ef24fbc3c1ff86375b0be1e77e88a0de1e79b30896d73411c5ff4c3518
ikmR:
f1d4a30a4cef8d6d4e3b016e6fd3799ea057db4f345472ed302a67ce1c20cdec
pkRm:
1632d5c2f71c2b38d0a8fcc359355200caa8b1ffdf28618080466c909cb69b2e
skRm:
fdea67cf831f1ca98d8e27b1f6abeb5b7745e9d35348b80fa407ff6958f9137e
ikmS:
94b020ce91d73fca4649006c7e7329a67b40c55e9e93cc907d282bbbff386f58
pkSm:
8b0c70873dc5aecb7f9ee4e62406a397b350e57012be45cf53b7105ae731790b
skSm:
dc4a146313cce60a278a5323d321f051c5707e9c45ba21a3479fecdf76fc69dd
enc:
23fb952571a14a25e3d678140cd0e5eb47a0961bb18afcf85896e5453c312e76
shared_secret:
2d6db4cf719dc7293fcbf3fa64690708e44e2bebc81f84608677958c0d4448a7
key_schedule_context: 02725611c9d98c07c03f60095cd32d400d8347d45ed670
97bbad50fc56da742d07cb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
56c62333d9d9f7767f5b083fdfce0aa7e57e301b74029bb0cffa7331385f1dda
key: b062cb2c4dd4bca0ad7c7a12bbc341e6
base_nonce: a1bc314c1942ade7051ffed0
exporter_secret:
ee1a093e6e1c393c162ea98fdf20560c75909653550540a2700511b65c88c6f1
]]></artwork>
          <section anchor="encryptions-2">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: a1bc314c1942ade7051ffed0
ct: 5fd92cc9d46dbf8943e72a07e42f363ed5f721212cd90bcfd072bfd9f44e06b8
0fd17824947496e21b680c141b

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: a1bc314c1942ade7051ffed1
ct: d3736bb256c19bfa93d79e8f80b7971262cb7c887e35c26370cfed62254369a1
b52e3d505b79dd699f002bc8ed

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: a1bc314c1942ade7051ffed2
ct: 122175cfd5678e04894e4ff8789e85dd381df48dcaf970d52057df2c9acc3b12
1313a2bfeaa986050f82d93645

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: a1bc314c1942ade7051ffed4
ct: dae12318660cf963c7bcbef0f39d64de3bf178cf9e585e756654043cc5059873
bc8af190b72afc43d1e0135ada

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: a1bc314c1942ade7051ffe2f
ct: 55d53d85fe4d9e1e97903101eab0b4865ef20cef28765a47f840ff99625b7d69
dee927df1defa66a036fc58ff2

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: a1bc314c1942ade7051fffd0
ct: 42fa248a0e67ccca688f2b1d13ba4ba84755acf764bd797c8f7ba3b9b1dc3330
326f8d172fef6003c79ec72319
]]></artwork>
          </section>
          <section anchor="exported-values-2">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
28c70088017d70c896a8420f04702c5a321d9cbf0279fba899b59e51bac72c85

exporter_context: 00
L: 32
exported_value:
25dfc004b0892be1888c3914977aa9c9bbaf2c7471708a49e1195af48a6f29ce

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
5a0131813abc9a522cad678eb6bafaabc43389934adb8097d23c5ff68059eb64
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
4303619085a20ebcf18edd22782952b8a7161e1dbae6e46e143a52a96127cf84
pkEm:
820818d3c23993492cc5623ab437a48a0a7ca3e9639c140fe1e33811eb844b7c
skEm:
14de82a5897b613616a00c39b87429df35bc2b426bcfd73febcb45e903490768
ikmR:
4b16221f3b269a88e207270b5e1de28cb01f847841b344b8314d6a622fe5ee90
pkRm:
1d11a3cd247ae48e901939659bd4d79b6b959e1f3e7d66663fbc9412dd4e0976
skRm:
cb29a95649dc5656c2d054c1aa0d3df0493155e9d5da6d7e344ed8b6a64a9423
ikmS:
62f77dcf5df0dd7eac54eac9f654f426d4161ec850cc65c54f8b65d2e0b4e345
pkSm:
2bfb2eb18fcad1af0e4f99142a1c474ae74e21b9425fc5c589382c69b50cc57e
skSm:
fc1c87d2f3832adb178b431fce2ac77c7ca2fd680f3406c77b5ecdf818b119f4
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
820818d3c23993492cc5623ab437a48a0a7ca3e9639c140fe1e33811eb844b7c
shared_secret:
f9d0e870aba28d04709b2680cb8185466c6a6ff1d6e9d1091d5bf5e10ce3a577
key_schedule_context: 03e78d5cf6190d275863411ff5edd0dece5d39fa48e04e
ec1ed9b71be34729d18ccb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
5f96c55e4108c6691829aaabaa7d539c0b41d7c72aae94ae289752f056b6cec4
key: 1364ead92c47aa7becfa95203037b19a
base_nonce: 99d8b5c54669807e9fc70df1
exporter_secret:
f048d55eacbf60f9c6154bd4021774d1075ebf963c6adc71fa846f183ab2dde6
]]></artwork>
          <section anchor="encryptions-3">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 99d8b5c54669807e9fc70df1
ct: a84c64df1e11d8fd11450039d4fe64ff0c8a99fca0bd72c2d4c3e0400bc14a40
f27e45e141a24001697737533e

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 99d8b5c54669807e9fc70df0
ct: 4d19303b848f424fc3c3beca249b2c6de0a34083b8e909b6aa4c3688505c05ff
e0c8f57a0a4c5ab9da127435d9

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 99d8b5c54669807e9fc70df3
ct: 0c085a365fbfa63409943b00a3127abce6e45991bc653f182a80120868fc507e
9e4d5e37bcc384fc8f14153b24

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 99d8b5c54669807e9fc70df5
ct: 000a3cd3a3523bf7d9796830b1cd987e841a8bae6561ebb6791a3f0e34e89a4f
b539faeee3428b8bbc082d2c1a

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 99d8b5c54669807e9fc70d0e
ct: 576d39dd2d4cc77d1a14a51d5c5f9d5e77586c3d8d2ab33bdec6379e28ce5c50
2f0b1cbd09047cf9eb9269bb52

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 99d8b5c54669807e9fc70cf1
ct: 13239bab72e25e9fd5bb09695d23c90a24595158b99127505c8a9ff9f127e0d6
57f71af59d67d4f4971da028f9
]]></artwork>
          </section>
          <section anchor="exported-values-3">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
08f7e20644bb9b8af54ad66d2067457c5f9fcb2a23d9f6cb4445c0797b330067

exporter_context: 00
L: 32
exported_value:
52e51ff7d436557ced5265ff8b94ce69cf7583f49cdb374e6aad801fc063b010

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
a30c20370c026bbea4dca51cb63761695132d342bae33a6a11527d3e7679436d
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-chacha20poly1305">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, ChaCha20Poly1305</name>
        <section anchor="base-setup-information-1">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
909a9b35d3dc4713a5e72a4da274b55d3d3821a37e5d099e74a647db583a904b
pkEm:
1afa08d3dec047a643885163f1180476fa7ddb54c6a8029ea33f95796bf2ac4a
skEm:
f4ec9b33b792c372c1d2c2063507b684ef925b8c75a42dbcbf57d63ccd381600
ikmR:
1ac01f181fdf9f352797655161c58b75c656a6cc2716dcb66372da835542e1df
pkRm:
4310ee97d88cc1f088a5576c77ab0cf5c3ac797f3d95139c6c84b5429c59662a
skRm:
8057991eef8f1f1af18f4a9491d16a1ce333f695d4db8e38da75975c4478e0fb
enc:
1afa08d3dec047a643885163f1180476fa7ddb54c6a8029ea33f95796bf2ac4a
shared_secret:
0bbe78490412b4bbea4812666f7916932b828bba79942424abb65244930d69a7
key_schedule_context: 00431df6cd95e11ff49d7013563baf7f11588c75a6611e
e2a4404a49306ae4cfc5b69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
5b9cd775e64b437a2335cf499361b2e0d5e444d5cb41a8a53336d8fe402282c6
key:
ad2744de8e17f4ebba575b3f5f5a8fa1f69c2a07f6e7500bc60ca6e3e3ec1c91
base_nonce: 5c4d98150661b848853b547f
exporter_secret:
a3b010d4994890e2c6968a36f64470d3c824c8f5029942feb11e7a74b2921922
]]></artwork>
          <section anchor="encryptions-4">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 5c4d98150661b848853b547f
ct: 1c5250d8034ec2b784ba2cfd69dbdb8af406cfe3ff938e131f0def8c8b60b4db
21993c62ce81883d2dd1b51a28

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 5c4d98150661b848853b547e
ct: 6b53c051e4199c518de79594e1c4ab18b96f081549d45ce015be002090bb119e
85285337cc95ba5f59992dc98c

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 5c4d98150661b848853b547d
ct: 71146bd6795ccc9c49ce25dda112a48f202ad220559502cef1f34271e0cb4b02
b4f10ecac6f48c32f878fae86b

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 5c4d98150661b848853b547b
ct: 63357a2aa291f5a4e5f27db6baa2af8cf77427c7c1a909e0b37214dd47db122b
b153495ff0b02e9e54a50dbe16

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 5c4d98150661b848853b5480
ct: 18ab939d63ddec9f6ac2b60d61d36a7375d2070c9b683861110757062c52b888
0a5f6b3936da9cd6c23ef2a95c

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 5c4d98150661b848853b557f
ct: 7a4a13e9ef23978e2c520fd4d2e757514ae160cd0cd05e556ef692370ca53076
214c0c40d4c728d6ed9e727a5b
]]></artwork>
          </section>
          <section anchor="exported-values-4">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
4bbd6243b8bb54cec311fac9df81841b6fd61f56538a775e7c80a9f40160606e

exporter_context: 00
L: 32
exported_value:
8c1df14732580e5501b00f82b10a1647b40713191b7c1240ac80e2b68808ba69

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
5acb09211139c43b3090489a9da433e8a30ee7188ba8b0a9a1ccf0c229283e53
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-1">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
35706a0b09fb26fb45c39c2f5079c709c7cf98e43afa973f14d88ece7e29c2e3
pkEm:
2261299c3f40a9afc133b969a97f05e95be2c514e54f3de26cbe5644ac735b04
skEm:
0c35fdf49df7aa01cd330049332c40411ebba36e0c718ebc3edf5845795f6321
ikmR:
26b923eade72941c8a85b09986cdfa3f1296852261adedc52d58d2930269812b
pkRm:
13640af826b722fc04feaa4de2f28fbd5ecc03623b317834e7ff4120dbe73062
skRm:
77d114e0212be51cb1d76fa99dd41cfd4d0166b08caa09074430a6c59ef17879
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
2261299c3f40a9afc133b969a97f05e95be2c514e54f3de26cbe5644ac735b04
shared_secret:
4be079c5e77779d0215b3f689595d59e3e9b0455d55662d1f3666ec606e50ea7
key_schedule_context: 016870c4c76ca38ae43efbec0f2377d109499d7ce73f4a
9e1ec37f21d3d063b97cb69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
16974354c497c9bd24c000ceed693779b604f1944975b18c442d373663f4a8cc
key:
600d2fdb0313a7e5c86a9ce9221cd95bed069862421744cfb4ab9d7203a9c019
base_nonce: 112e0465562045b7368653e7
exporter_secret:
73b506dc8b6b4269027f80b0362def5cbb57ee50eed0c2873dac9181f453c5ac
]]></artwork>
          <section anchor="encryptions-5">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 112e0465562045b7368653e7
ct: 4a177f9c0d6f15cfdf533fb65bf84aecdc6ab16b8b85b4cf65a370e07fc1d78d
28fb073214525276f4a89608ff

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 112e0465562045b7368653e6
ct: 5c3cabae2f0b3e124d8d864c116fd8f20f3f56fda988c3573b40b09997fd6c76
9e77c8eda6cda4f947f5b704a8

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 112e0465562045b7368653e5
ct: 14958900b44bdae9cbe5a528bf933c5c990dbb8e282e6e495adf8205d19da9eb
270e3a6f1e0613ab7e757962a4

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 112e0465562045b7368653e3
ct: c2a7bc09ddb853cf2effb6e8d058e346f7fe0fb3476528c80db6b698415c5f8c
50b68a9a355609e96d2117f8d3

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 112e0465562045b736865318
ct: 2414d0788e4bc39a59a26d7bd5d78e111c317d44c37bd5a4c2a1235f2ddc2085
c487d406490e75210c958724a7

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 112e0465562045b7368652e7
ct: c567ae1c3f0f75abe1dd9e4532b422600ed4a6e5b9484dafb1e43ab9f5fd662b
28c00e2e81d3cde955dae7e218
]]></artwork>
          </section>
          <section anchor="exported-values-5">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
813c1bfc516c99076ae0f466671f0ba5ff244a41699f7b2417e4c59d46d39f40

exporter_context: 00
L: 32
exported_value:
2745cf3d5bb65c333658732954ee7af49eb895ce77f8022873a62a13c94cb4e1

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
ad40e3ae14f21c99bfdebc20ae14ab86f4ca2dc9a4799d200f43a25f99fa78ae
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-1">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
938d3daa5a8904540bc24f48ae90eed3f4f7f11839560597b55e7c9598c996c0
pkEm:
f7674cc8cd7baa5872d1f33dbaffe3314239f6197ddf5ded1746760bfc847e0e
skEm:
c94619e1af28971c8fa7957192b7e62a71ca2dcdde0a7cc4a8a9e741d600ab13
ikmR:
64835d5ee64aa7aad57c6f2e4f758f7696617f8829e70bc9ac7a5ef95d1c756c
pkRm:
1a478716d63cb2e16786ee93004486dc151e988b34b475043d3e0175bdb01c44
skRm:
3ca22a6d1cda1bb9480949ec5329d3bf0b080ca4c45879c95eddb55c70b80b82
ikmS:
9d8f94537d5a3ddef71234c0baedfad4ca6861634d0b94c3007fed557ad17df6
pkSm:
f0f4f9e96c54aeed3f323de8534fffd7e0577e4ce269896716bcb95643c8712b
skSm:
2def0cb58ffcf83d1062dd085c8aceca7f4c0c3fd05912d847b61f3e54121f05
enc:
f7674cc8cd7baa5872d1f33dbaffe3314239f6197ddf5ded1746760bfc847e0e
shared_secret:
d2d67828c8bc9fa661cf15a31b3ebf1febe0cafef7abfaaca580aaf6d471e3eb
key_schedule_context: 02431df6cd95e11ff49d7013563baf7f11588c75a6611e
e2a4404a49306ae4cfc5b69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
3022dfc0a81d6e09a2e6daeeb605bb1ebb9ac49535540d9a4c6560064a6c6da8
key:
b071fd1136680600eb447a845a967d35e9db20749cdf9ce098bcc4deef4b1356
base_nonce: d20577dff16d7cea2c4bf780
exporter_secret:
be2d93b82071318cdb88510037cf504344151f2f9b9da8ab48974d40a2251dd7
]]></artwork>
          <section anchor="encryptions-6">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: d20577dff16d7cea2c4bf780
ct: ab1a13c9d4f01a87ec3440dbd756e2677bd2ecf9df0ce7ed73869b98e00c09be
111cb9fdf077347aeb88e61bdf

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: d20577dff16d7cea2c4bf781
ct: 3265c7807ffff7fdace21659a2c6ccffee52a26d270c76468ed74202a65478bf
aedfff9c2b7634e24f10b71016

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: d20577dff16d7cea2c4bf782
ct: 3aadee86ad2a05081ea860033a9d09dbccb4acac2ded0891da40f51d4df19925
f7a767b076a5cbc9355c8fd35e

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: d20577dff16d7cea2c4bf784
ct: 502ecccd5c2be3506a081809cc58b43b94f77cbe37b8b31712d9e21c9e61aa69
46a8e922f54eae630f88eb8033

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: d20577dff16d7cea2c4bf77f
ct: 652e597ba20f3d9241cda61f33937298b1169e6adf72974bbe454297502eb4be
132e1c5064702fc165c2ddbde8

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: d20577dff16d7cea2c4bf680
ct: 3be14e8b3bbd1028cf2b7d0a691dbbeff71321e7dec92d3c2cfb30a0994ab246
af76168480285a60037b4ba13a
]]></artwork>
          </section>
          <section anchor="exported-values-6">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
070cffafd89b67b7f0eeb800235303a223e6ff9d1e774dce8eac585c8688c872

exporter_context: 00
L: 32
exported_value:
2852e728568d40ddb0edde284d36a4359c56558bb2fb8837cd3d92e46a3a14a8

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
1df39dc5dd60edcbf5f9ae804e15ada66e885b28ed7929116f768369a3f950ee
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-1">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
49d6eac8c6c558c953a0a252929a818745bb08cd3d29e15f9f5db5eb2e7d4b84
pkEm:
656a2e00dc9990fd189e6e473459392df556e9a2758754a09db3f51179a3fc02
skEm:
5e6dd73e82b856339572b7245d3cbb073a7561c0bee52873490e305cbb710410
ikmR:
f3304ddcf15848488271f12b75ecaf72301faabf6ad283654a14c398832eb184
pkRm:
a5099431c35c491ec62ca91df1525d6349cb8aa170c51f9581f8627be6334851
skRm:
7b36a42822e75bf3362dfabbe474b3016236408becb83b859a6909e22803cb0c
ikmS:
20ade1d5203de1aadfb261c4700b6432e260d0d317be6ebbb8d7fffb1f86ad9d
pkSm:
3ac5bd4dd66ff9f2740bef0d6ccb66daa77bff7849d7895182b07fb74d087c45
skSm:
90761c5b0a7ef0985ed66687ad708b921d9803d51637c8d1cb72d03ed0f64418
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
656a2e00dc9990fd189e6e473459392df556e9a2758754a09db3f51179a3fc02
shared_secret:
86a6c0ed17714f11d2951747e660857a5fd7616c933ef03207808b7a7123fe67
key_schedule_context: 036870c4c76ca38ae43efbec0f2377d109499d7ce73f4a
9e1ec37f21d3d063b97cb69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
22670daee17530c9564001d0a7e740e80d0bcc7ae15349f472fcc9e057cbc259
key:
49c7e6d7d2d257aded2a746fe6a9bf12d4de8007c4862b1fdffe8c35fb65054c
base_nonce: abac79931e8c1bcb8a23960a
exporter_secret:
7c6cc1bb98993cd93e2599322247a58fd41fdecd3db895fb4c5fd8d6bbe606b5
]]></artwork>
          <section anchor="encryptions-7">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: abac79931e8c1bcb8a23960a
ct: 9aa52e29274fc6172e38a4461361d2342585d3aeec67fb3b721ecd63f059577c
7fe886be0ede01456ebc67d597

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: abac79931e8c1bcb8a23960b
ct: 59460bacdbe7a920ef2806a74937d5a691d6d5062d7daafcad7db7e4d8c649ad
ffe575c1889c5c2e3a49af8e3e

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: abac79931e8c1bcb8a239608
ct: 5688ff6a03ba26ae936044a5c800f286fb5d1eccdd2a0f268f6ff9773b511693
18d1a1466bb36263415071db00

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: abac79931e8c1bcb8a23960e
ct: d936b7a01f5c7dc4c3dc04e322cc694684ee18dd71719196874e5235aed3cfb0
6cadcd3bc7da0877488d7c551d

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: abac79931e8c1bcb8a2396f5
ct: 4d4c462f7b9b637eaf1f4e15e325b7bc629c0af6e3073422c86064cc3c98cff8
7300f054fd56dd57dc34358beb

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: abac79931e8c1bcb8a23970a
ct: 9b7f84224922d2a9edd7b2c2057f3bcf3a547f17570575e626202e593bfdd99e
9878a1af9e41ded58c7fb77d2f
]]></artwork>
          </section>
          <section anchor="exported-values-7">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
c23ebd4e7a0ad06a5dddf779f65004ce9481069ce0f0e6dd51a04539ddcbd5cd

exporter_context: 00
L: 32
exported_value:
ed7ff5ca40a3d84561067ebc8e01702bc36cf1eb99d42a92004642b9dfaadd37

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
d3bae066aa8da27d527d85c040f7dd6ccb60221c902ee36a82f70bcd62a60ee4
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha256-aes-128-gcm">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA256, AES-128-GCM</name>
        <section anchor="base-setup-information-2">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
4270e54ffd08d79d5928020af4686d8f6b7d35dbe470265f1f5aa22816ce860e
pkEm: 04a92719c6195d5085104f469a8b9814d5838ff72b60501e2c4466e5e67b32
5ac98536d7b61a1af4b78e5b7f951c0900be863c403ce65c9bfcb9382657222d18c4
skEm:
4995788ef4b9d6132b249ce59a77281493eb39af373d236a1fe415cb0c2d7beb
ikmR:
668b37171f1072f3cf12ea8a236a45df23fc13b82af3609ad1e354f6ef817550
pkRm: 04fe8c19ce0905191ebc298a9245792531f26f0cece2460639e8bc39cb7f70
6a826a779b4cf969b8a0e539c7f62fb3d30ad6aa8f80e30f1d128aafd68a2ce72ea0
skRm:
f3ce7fdae57e1a310d87f1ebbde6f328be0a99cdbcadf4d6589cf29de4b8ffd2
enc: 04a92719c6195d5085104f469a8b9814d5838ff72b60501e2c4466e5e67b325
ac98536d7b61a1af4b78e5b7f951c0900be863c403ce65c9bfcb9382657222d18c4
shared_secret:
c0d26aeab536609a572b07695d933b589dcf363ff9d93c93adea537aeabb8cb8
key_schedule_context: 00b88d4e6d91759e65e87c470e8b9141113e9ad5f0c8ce
efc1e088c82e6980500798e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
2eb7b6bf138f6b5aff857414a058a3f1750054a9ba1f72c2cf0684a6f20b10e1
key: 868c066ef58aae6dc589b6cfdd18f97e
base_nonce: 4e0bc5018beba4bf004cca59
exporter_secret:
14ad94af484a7ad3ef40e9f3be99ecc6fa9036df9d4920548424df127ee0d99f
]]></artwork>
          <section anchor="encryptions-8">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 4e0bc5018beba4bf004cca59
ct: 5ad590bb8baa577f8619db35a36311226a896e7342a6d836d8b7bcd2f20b6c7f
9076ac232e3ab2523f39513434

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 4e0bc5018beba4bf004cca58
ct: fa6f037b47fc21826b610172ca9637e82d6e5801eb31cbd3748271affd4ecb06
646e0329cbdf3c3cd655b28e82

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 4e0bc5018beba4bf004cca5b
ct: 895cabfac50ce6c6eb02ffe6c048bf53b7f7be9a91fc559402cbc5b8dcaeb52b
2ccc93e466c28fb55fed7a7fec

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 4e0bc5018beba4bf004cca5d
ct: 8787491ee8df99bc99a246c4b3216d3d57ab5076e18fa27133f520703bc70ec9
99dd36ce042e44f0c3169a6a8f

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 4e0bc5018beba4bf004ccaa6
ct: 2ad71c85bf3f45c6eca301426289854b31448bcf8a8ccb1deef3ebd87f60848a
a53c538c30a4dac71d619ee2cd

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 4e0bc5018beba4bf004ccb59
ct: 10f179686aa2caec1758c8e554513f16472bd0a11e2a907dde0b212cbe87d74f
367f8ffe5e41cd3e9962a6afb2
]]></artwork>
          </section>
          <section anchor="exported-values-8">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
5e9bc3d236e1911d95e65b576a8a86d478fb827e8bdfe77b741b289890490d4d

exporter_context: 00
L: 32
exported_value:
6cff87658931bda83dc857e6353efe4987a201b849658d9b047aab4cf216e796

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
d8f1ea7942adbba7412c6d431c62d01371ea476b823eb697e1f6e6cae1dab85a
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-2">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
2afa611d8b1a7b321c761b483b6a053579afa4f767450d3ad0f84a39fda587a6
pkEm: 04305d35563527bce037773d79a13deabed0e8e7cde61eecee403496959e89
e4d0ca701726696d1485137ccb5341b3c1c7aaee90a4a02449725e744b1193b53b5f
skEm:
57427244f6cc016cddf1c19c8973b4060aa13579b4c067fd5d93a5d74e32a90f
ikmR:
d42ef874c1913d9568c9405407c805baddaffd0898a00f1e84e154fa787b2429
pkRm: 040d97419ae99f13007a93996648b2674e5260a8ebd2b822e84899cd52d874
46ea394ca76223b76639eccdf00e1967db10ade37db4e7db476261fcc8df97c5ffd1
skRm:
438d8bcef33b89e0e9ae5eb0957c353c25a94584b0dd59c991372a75b43cb661
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04305d35563527bce037773d79a13deabed0e8e7cde61eecee403496959e89e
4d0ca701726696d1485137ccb5341b3c1c7aaee90a4a02449725e744b1193b53b5f
shared_secret:
2e783ad86a1beae03b5749e0f3f5e9bb19cb7eb382f2fb2dd64c99f15ae0661b
key_schedule_context: 01b873cdf2dff4c1434988053b7a775e980dd2039ea24f
950b26b056ccedcb933198e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
f2f534e55931c62eeb2188c1f53450354a725183937e68c85e68d6b267504d26
key: 55d9eb9d26911d4c514a990fa8d57048
base_nonce: b595dc6b2d7e2ed23af529b1
exporter_secret:
895a723a1eab809804973a53c0ee18ece29b25a7555a4808277ad2651d66d705
]]></artwork>
          <section anchor="encryptions-9">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: b595dc6b2d7e2ed23af529b1
ct: 90c4deb5b75318530194e4bb62f890b019b1397bbf9d0d6eb918890e1fb2be1a
c2603193b60a49c2126b75d0eb

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: b595dc6b2d7e2ed23af529b0
ct: 9e223384a3620f4a75b5a52f546b7262d8826dea18db5a365feb8b997180b22d
72dc1287f7089a1073a7102c27

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: b595dc6b2d7e2ed23af529b3
ct: adf9f6000773035023be7d415e13f84c1cb32a24339a32eb81df02be9ddc6abc
880dd81cceb7c1d0c7781465b2

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: b595dc6b2d7e2ed23af529b5
ct: 1f4cc9b7013d65511b1f69c050b7bd8bbd5a5c16ece82b238fec4f30ba2400e7
ca8ee482ac5253cffb5c3dc577

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: b595dc6b2d7e2ed23af5294e
ct: cdc541253111ed7a424eea5134dc14fc5e8293ab3b537668b8656789628e4589
4e5bb873c968e3b7cdcbb654a4

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: b595dc6b2d7e2ed23af528b1
ct: faf985208858b1253b97b60aecd28bc18737b58d1242370e7703ec33b73a4c31
a1afee300e349adef9015bbbfd
]]></artwork>
          </section>
          <section anchor="exported-values-9">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
a115a59bf4dd8dc49332d6a0093af8efca1bcbfd3627d850173f5c4a55d0c185

exporter_context: 00
L: 32
exported_value:
4517eaede0669b16aac7c92d5762dd459c301fa10e02237cd5aeb9be969430c4

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
164e02144d44b607a7722e58b0f4156e67c0c2874d74cf71da6ca48a4cbdc5e0
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-2">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
798d82a8d9ea19dbc7f2c6dfa54e8a6706f7cdc119db0813dacf8440ab37c857
pkEm: 042224f3ea800f7ec55c03f29fc9865f6ee27004f818fcbdc6dc68932c1e52
e15b79e264a98f2c535ef06745f3d308624414153b22c7332bc1e691cb4af4d53454
skEm:
6b8de0873aed0c1b2d09b8c7ed54cbf24fdf1dfc7a47fa501f918810642d7b91
ikmR:
7bc93bde8890d1fb55220e7f3b0c107ae7e6eda35ca4040bb6651284bf0747ee
pkRm: 04423e363e1cd54ce7b7573110ac121399acbc9ed815fae03b72ffbd4c18b0
1836835c5a09513f28fc971b7266cfde2e96afe84bb0f266920e82c4f53b36e1a78d
skRm:
d929ab4be2e59f6954d6bedd93e638f02d4046cef21115b00cdda2acb2a4440e
ikmS:
874baa0dcf93595a24a45a7f042e0d22d368747daaa7e19f80a802af19204ba8
pkSm: 04a817a0902bf28e036d66add5d544cc3a0457eab150f104285df1e293b5c1
0eef8651213e43d9cd9086c80b309df22cf37609f58c1127f7607e85f210b2804f73
skSm:
1120ac99fb1fccc1e8230502d245719d1b217fe20505c7648795139d177f0de9
enc: 042224f3ea800f7ec55c03f29fc9865f6ee27004f818fcbdc6dc68932c1e52e
15b79e264a98f2c535ef06745f3d308624414153b22c7332bc1e691cb4af4d53454
shared_secret:
d4aea336439aadf68f9348880aa358086f1480e7c167b6ef15453ba69b94b44f
key_schedule_context: 02b88d4e6d91759e65e87c470e8b9141113e9ad5f0c8ce
efc1e088c82e6980500798e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
fd0a93c7c6f6b1b0dd6a822d7b16f6c61c83d98ad88426df4613c3581a2319f1
key: 19aa8472b3fdc530392b0e54ca17c0f5
base_nonce: b390052d26b67a5b8a8fcaa4
exporter_secret:
f152759972660eb0e1db880835abd5de1c39c8e9cd269f6f082ed80e28acb164
]]></artwork>
          <section anchor="encryptions-10">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: b390052d26b67a5b8a8fcaa4
ct: 82ffc8c44760db691a07c5627e5fc2c08e7a86979ee79b494a17cc3405446ac2
bdb8f265db4a099ed3289ffe19

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: b390052d26b67a5b8a8fcaa5
ct: b0a705a54532c7b4f5907de51c13dffe1e08d55ee9ba59686114b05945494d96
725b239468f1229e3966aa1250

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: b390052d26b67a5b8a8fcaa6
ct: 8dc805680e3271a801790833ed74473710157645584f06d1b53ad439078d880b
23e25256663178271c80ee8b7c

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: b390052d26b67a5b8a8fcaa0
ct: 04c8f7aae1584b61aa5816382cb0b834a5d744f420e6dffb5ddcec633a21b8b3
472820930c1ea9258b035937a2

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: b390052d26b67a5b8a8fca5b
ct: 4a319462eaedee37248b4d985f64f4f863d31913fe9e30b6e13136053b69fe5d
70853c84c60a84bb5495d5a678

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: b390052d26b67a5b8a8fcba4
ct: 28e874512f8940fafc7d06135e7589f6b4198bc0f3a1c64702e72c9e6abaf9f0
5cb0d2f11b03a517898815c934
]]></artwork>
          </section>
          <section anchor="exported-values-10">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
837e49c3ff629250c8d80d3c3fb957725ed481e59e2feb57afd9fe9a8c7c4497

exporter_context: 00
L: 32
exported_value:
594213f9018d614b82007a7021c3135bda7b380da4acd9ab27165c508640dbda

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
14fe634f95ca0d86e15247cca7de7ba9b73c9b9deb6437e1c832daf7291b79d5
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-2">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
3c1fceb477ec954c8d58ef3249e4bb4c38241b5925b95f7486e4d9f1d0d35fbb
pkEm: 046a1de3fc26a3d43f4e4ba97dbe24f7e99181136129c48fbe872d4743e2b1
31357ed4f29a7b317dc22509c7b00991ae990bf65f8b236700c82ab7c11a84511401
skEm:
36f771e411cf9cf72f0701ef2b991ce9743645b472e835fe234fb4d6eb2ff5a0
ikmR:
abcc2da5b3fa81d8aabd91f7f800a8ccf60ec37b1b585a5d1d1ac77f258b6cca
pkRm: 04d824d7e897897c172ac8a9e862e4bd820133b8d090a9b188b8233a64dfbc
5f725aa0aa52c8462ab7c9188f1c4872f0c99087a867e8a773a13df48a627058e1b3
skRm:
bdf4e2e587afdf0930644a0c45053889ebcadeca662d7c755a353d5b4e2a8394
ikmS:
6262031f040a9db853edd6f91d2272596eabbc78a2ed2bd643f770ecd0f19b82
pkSm: 049f158c750e55d8d5ad13ede66cf6e79801634b7acadcad72044eac2ae1d0
480069133d6488bf73863fa988c4ba8bde1c2e948b761274802b4d8012af4f13af9e
skSm:
b0ed8721db6185435898650f7a677affce925aba7975a582653c4cb13c72d240
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 046a1de3fc26a3d43f4e4ba97dbe24f7e99181136129c48fbe872d4743e2b13
1357ed4f29a7b317dc22509c7b00991ae990bf65f8b236700c82ab7c11a84511401
shared_secret:
d4c27698391db126f1612d9e91a767f10b9b19aa17e1695549203f0df7d9aebe
key_schedule_context: 03b873cdf2dff4c1434988053b7a775e980dd2039ea24f
950b26b056ccedcb933198e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
3bf9d4c7955da2740414e73081fa74d6f6f2b4b9645d0685219813ce99a2f270
key: 4d567121d67fae1227d90e11585988fb
base_nonce: 67c9d05330ca21e5116ecda6
exporter_secret:
3f479020ae186788e4dfd4a42a21d24f3faabb224dd4f91c2b2e5e9524ca27b2
]]></artwork>
          <section anchor="encryptions-11">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 67c9d05330ca21e5116ecda6
ct: b9f36d58d9eb101629a3e5a7b63d2ee4af42b3644209ab37e0a272d44365407d
b8e655c72e4fa46f4ff81b9246

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 67c9d05330ca21e5116ecda7
ct: 51788c4e5d56276771032749d015d3eea651af0c7bb8e3da669effffed299ea1
f641df621af65579c10fc09736

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 67c9d05330ca21e5116ecda4
ct: 3b5a2be002e7b29927f06442947e1cf709b9f8508b03823127387223d7127034
71c266efc355f1bc2036f3027c

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 67c9d05330ca21e5116ecda2
ct: 8ddbf1242fe5c7d61e1675496f3bfdb4d90205b3dfbc1b12aab41395d71a8211
8e095c484103107cf4face5123

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 67c9d05330ca21e5116ecd59
ct: 6de25ceadeaec572fbaa25eda2558b73c383fe55106abaec24d518ef6724a7ce
698f83ecdc53e640fe214d2f42

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 67c9d05330ca21e5116ecca6
ct: f380e19d291e12c5e378b51feb5cd50f6d00df6cb2af8393794c4df342126c2e
29633fe7e8ce49587531affd4d
]]></artwork>
          </section>
          <section anchor="exported-values-11">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
595ce0eff405d4b3bb1d08308d70a4e77226ce11766e0a94c4fdb5d90025c978

exporter_context: 00
L: 32
exported_value:
110472ee0ae328f57ef7332a9886a1992d2c45b9b8d5abc9424ff68630f7d38d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
18ee4d001a9d83a4c67e76f88dd747766576cac438723bad0700a910a4d717e6
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha512-aes-128-gcm">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA512, AES-128-GCM</name>
        <section anchor="base-setup-information-3">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
4ab11a9dd78c39668f7038f921ffc0993b368171d3ddde8031501ee1e08c4c9a
pkEm: 0493ed86735bdfb978cc055c98b45695ad7ce61ce748f4dd63c525a3b8d53a
15565c6897888070070c1579db1f86aaa56deb8297e64db7e8924e72866f9a472580
skEm:
2292bf14bb6e15b8c81a0f45b7a6e93e32d830e48cca702e0affcfb4d07e1b5c
ikmR:
ea9ff7cc5b2705b188841c7ace169290ff312a9cb31467784ca92d7a2e6e1be8
pkRm: 04085aa5b665dc3826f9650ccbcc471be268c8ada866422f739e2d531d4a88
18a9466bc6b449357096232919ec4fe9070ccbac4aac30f4a1a53efcf7af90610edd
skRm:
3ac8530ad1b01885960fab38cf3cdc4f7aef121eaa239f222623614b4079fb38
enc: 0493ed86735bdfb978cc055c98b45695ad7ce61ce748f4dd63c525a3b8d53a1
5565c6897888070070c1579db1f86aaa56deb8297e64db7e8924e72866f9a472580
shared_secret:
02f584736390fc93f5b4ad039826a3fa08e9911bd1215a3db8e8791ba533cafd
key_schedule_context: 005b8a3617af7789ee716e7911c7e77f84cdc4cc46e60f
b7e19e4059f9aeadc00585e26874d1ddde76e551a7679cd47168c466f6e1f705cc93
74c192778a34fcd5ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: 0c7acdab61693f936c4c1256c78e7be30eebfe466812f9cc49f0b58dc970
328dfc03ea359be0250a471b1635a193d2dfa8cb23c90aa2e25025b892a725353eeb
key: 090ca96e5f8aa02b69fac360da50ddf9
base_nonce: 9c995e621bf9a20c5ca45546
exporter_secret: 4a7abb2ac43e6553f129b2c5750a7e82d149a76ed56dc342d7b
ca61e26d494f4855dff0d0165f27ce57756f7f16baca006539bb8e4518987ba61048
0ac03efa8
]]></artwork>
          <section anchor="encryptions-12">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 9c995e621bf9a20c5ca45546
ct: d3cf4984931484a080f74c1bb2a6782700dc1fef9abe8442e44a6f09044c8890
7200b332003543754eb51917ba

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 9c995e621bf9a20c5ca45547
ct: d14414555a47269dfead9fbf26abb303365e40709a4ed16eaefe1f2070f1ddeb
1bdd94d9e41186f124e0acc62d

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 9c995e621bf9a20c5ca45544
ct: 9bba136cade5c4069707ba91a61932e2cbedda2d9c7bdc33515aa01dd0e0f7e9
d3579bf4016dec37da4aafa800

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 9c995e621bf9a20c5ca45542
ct: a531c0655342be013bf32112951f8df1da643602f1866749519f5dcb09cc6843
2579de305a77e6864e862a7600

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 9c995e621bf9a20c5ca455b9
ct: be5da649469efbad0fb950366a82a73fefeda5f652ec7d3731fac6c4ffa21a70
04d2ab8a04e13621bd3629547d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 9c995e621bf9a20c5ca45446
ct: 62092672f5328a0dde095e57435edf7457ace60b26ee44c9291110ec135cb0e1
4b85594e4fea11247d937deb62
]]></artwork>
          </section>
          <section anchor="exported-values-12">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
a32186b8946f61aeead1c093fe614945f85833b165b28c46bf271abf16b57208

exporter_context: 00
L: 32
exported_value:
84998b304a0ea2f11809398755f0abd5f9d2c141d1822def79dd15c194803c2a

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
93fb9411430b2cfa2cf0bed448c46922a5be9beff20e2e621df7e4655852edbc
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-3">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
c11d883d6587f911d2ddbc2a0859d5b42fb13bf2c8e89ef408a25564893856f5
pkEm: 04a307934180ad5287f95525fe5bc6244285d7273c15e061f0f2efb211c350
57f3079f6e0abae200992610b25f48b63aacfcb669106ddee8aa023feed301901371
skEm:
a5901ff7d6931959c2755382ea40a4869b1dec3694ed3b009dda2d77dd488f18
ikmR:
75bfc2a3a3541170a54c0b06444e358d0ee2b4fb78a401fd399a47a33723b700
pkRm: 043f5266fba0742db649e1043102b8a5afd114465156719cea90373229aabd
d84d7f45dabfc1f55664b888a7e86d594853a6cccdc9b189b57839cbbe3b90b55873
skRm:
bc6f0b5e22429e5ff47d5969003f3cae0f4fec50e23602e880038364f33b8522
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04a307934180ad5287f95525fe5bc6244285d7273c15e061f0f2efb211c3505
7f3079f6e0abae200992610b25f48b63aacfcb669106ddee8aa023feed301901371
shared_secret:
2912aacc6eaebd71ff715ea50f6ef3a6637856b2a4c58ea61e0c3fc159e3bc16
key_schedule_context: 01713f73042575cebfd132f0cc4338523f8eae95c80a74
9f7cf3eb9436ff1c612ca62c37df27ca46d2cc162445a92c5f5fdc57bcde129ca7b1
f284b0c12297c037ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: ff2051d2128d5f3078de867143e076262ce1d0aecafc3fff3d607f1eaff0
5345c7d5ffcb3202cdecb3d1a2f7da20592a237747b6e855390cbe2109d3e6ac70c2
key: 0b910ba8d9cfa17e5f50c211cb32839a
base_nonce: 0c29e714eb52de5b7415a1b7
exporter_secret: 50c0a182b6f94b4c0bd955c4aa20df01f282cc12c43065a0812
fe4d4352790171ed2b2c4756ad7f5a730ba336c8f1edd0089d8331192058c385bae3
9c7cc8b57
]]></artwork>
          <section anchor="encryptions-13">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 0c29e714eb52de5b7415a1b7
ct: 57624b6e320d4aba0afd11f548780772932f502e2ba2a8068676b2a0d3b5129a
45b9faa88de39e8306da41d4cc

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 0c29e714eb52de5b7415a1b6
ct: 159d6b4c24bacaf2f5049b7863536d8f3ffede76302dace42080820fa51925d4
e1c72a64f87b14291a3057e00a

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 0c29e714eb52de5b7415a1b5
ct: bd24140859c99bf0055075e9c460032581dd1726d52cf980d308e9b20083ca62
e700b17892bcf7fa82bac751d0

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 0c29e714eb52de5b7415a1b3
ct: 93ddd55f82e9aaaa3cfc06840575f09d80160b20538125c2549932977d1238dd
e8126a4a91118faf8632f62cb8

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 0c29e714eb52de5b7415a148
ct: 377a98a3c34bf716581b05a6b3fdc257f245856384d5f2241c8840571c52f5c8
5c21138a4a81655edab8fe227d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 0c29e714eb52de5b7415a0b7
ct: cc161f5a179831d456d119d2f2c19a6817289c75d1c61cd37ac8a450acd9efba
02e0ac00d128c17855931ff69a
]]></artwork>
          </section>
          <section anchor="exported-values-13">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
8158bea21a6700d37022bb7802866edca30ebf2078273757b656ef7fc2e428cf

exporter_context: 00
L: 32
exported_value:
6a348ba6e0e72bb3ef22479214a139ef8dac57be34509a61087a12565473da8d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
2f6d4f7a18ec48de1ef4469f596aada4afdf6d79b037ed3c07e0118f8723bffc
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-3">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
6bb031aa9197562da0b44e737db2b9e61f6c3ea1138c37de28fc37ac29bc7350
pkEm: 04fec59fa9f76f5d0f6c1660bb179cb314ed97953c53a60ab38f8e6ace60fd
59178084d0dd66e0f79172992d4ddb2e91172ce24949bcebfff158dcc417f2c6e9c6
skEm:
93cddd5288e7ef4884c8fe321d075df01501b993ff49ffab8184116f39b3c655
ikmR:
649a3f92edbb7a2516a0ade0b7dccc58a37240c4ba06f9726a952227b4adf6ff
pkRm: 04378bad519aab406e04d0e5608bcca809c02d6afd2272d4dd03e9357bd0ee
e8adf84c8deba3155c9cf9506d1d4c8bfefe3cf033a75716cc3cc07295100ec96276
skRm:
1ea4484be482bf25fdb2ed39e6a02ed9156b3e57dfb18dff82e4a048de990236
ikmS:
4d79b8691aab55a7265e8490a04bb3860ed64dece90953ad0dc43a6ea59b4bf2
pkSm: 0404d3c1f9fca22eb4a6d326125f0814c35593b1da8ea0d11a640730b215a2
59b9b98a34ad17e21617d19fe1d4fa39a4828bfdb306b729ec51c543caca3b2d9529
skSm:
02b266d66919f7b08f42ae0e7d97af4ca98b2dae3043bb7e0740ccadc1957579
enc: 04fec59fa9f76f5d0f6c1660bb179cb314ed97953c53a60ab38f8e6ace60fd5
9178084d0dd66e0f79172992d4ddb2e91172ce24949bcebfff158dcc417f2c6e9c6
shared_secret:
1ed49f6d7ada333d171cd63861a1cb700a1ec4236755a9cd5f9f8f67a2f8e7b3
key_schedule_context: 025b8a3617af7789ee716e7911c7e77f84cdc4cc46e60f
b7e19e4059f9aeadc00585e26874d1ddde76e551a7679cd47168c466f6e1f705cc93
74c192778a34fcd5ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: 9c846ba81ddbbd57bc26d99da6cf7ab956bb735ecd47fe21ed14241c7079
1b7484c1d06663d21a5d97bf1be70d56ab727f650c4f859c5ed3f71f8928b3c082dd
key: 9d4b1c83129f3de6db95faf3d539dcf1
base_nonce: ea4fd7a485ee5f1f4b62c1b7
exporter_secret: ca2410672369aae1afd6c2639f4fe34ca36d35410c090608d29
24f60def17f910d7928575434d7f991b1f19d3e8358b8278ff59ced0d5eed4774cec
72e12766e
]]></artwork>
          <section anchor="encryptions-14">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: ea4fd7a485ee5f1f4b62c1b7
ct: 2480179d880b5f458154b8bfe3c7e8732332de84aabf06fc440f6b31f169e154
157fa9eb44f2fa4d7b38a9236e

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: ea4fd7a485ee5f1f4b62c1b6
ct: 10cd81e3a816d29942b602a92884348171a31cbd0f042c3057c65cd93c540943
a5b05115bd520c09281061935b

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: ea4fd7a485ee5f1f4b62c1b5
ct: 920743a88d8cf6a09e1a3098e8be8edd09db136e9d543f215924043af8c7410f
68ce6aa64fd2b1a176e7f6b3fd

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: ea4fd7a485ee5f1f4b62c1b3
ct: 6b11380fcc708fc8589effb5b5e0394cbd441fa5e240b5500522150ca8265d65
ff55479405af936e2349119dcd

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: ea4fd7a485ee5f1f4b62c148
ct: d084eca50e7554bb97ba34c4482dfe32c9a2b7f3ab009c2d1b68ecbf97bee2d2
8cd94b6c829b96361f2701772d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: ea4fd7a485ee5f1f4b62c0b7
ct: 247da592cc4ce834a94de2c79f5730ee49342470a021e4a4bc2bb77c53b17413
e94d94f57b4fdaedcf97cfe7b1
]]></artwork>
          </section>
          <section anchor="exported-values-14">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
f03fbc82f321a0ab4840e487cb75d07aafd8e6f68485e4f7ff72b2f55ff24ad6

exporter_context: 00
L: 32
exported_value:
1ce0cadec0a8f060f4b5070c8f8888dcdfefc2e35819df0cd559928a11ff0891

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
70c405c707102fd0041ea716090753be47d68d238b111d542846bd0d84ba907c
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-3">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
37ae06a521cd555648c928d7af58ad2aa4a85e34b8cabd069e94ad55ab872cc8
pkEm: 04801740f4b1b35823f7fb2930eac2efc8c4893f34ba111c0bb976e3c7d5dc
0aef5a7ef0bf4057949a140285f774f1efc53b3860936b92279a11b68395d898d138
skEm:
778f2254ae5d661d5c7fca8c4a7495a25bd13f26258e459159f3899df0de76c1
ikmR:
7466024b7e2d2366c3914d7833718f13afb9e3e45bcfbb510594d614ddd9b4e7
pkRm: 04a4ca7af2fc2cce48edbf2f1700983e927743a4e85bb5035ad562043e25d9
a111cbf6f7385fac55edc5c9d2ca6ed351a5643de95c36748e11dbec98730f4d43e9
skRm:
00510a70fde67af487c093234fc4215c1cdec09579c4b30cc8e48cb530414d0e
ikmS:
ee27aaf99bf5cd8398e9de88ac09a82ac22cdb8d0905ab05c0f5fa12ba1709f3
pkSm: 04b59a4157a9720eb749c95f842a5e3e8acdccbe834426d405509ac3191e23
f2165b5bb1f07a6240dd567703ae75e13182ee0f69fc102145cdb5abf681ff126d60
skSm:
d743b20821e6326f7a26684a4beed7088b35e392114480ca9f6c325079dcf10b
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04801740f4b1b35823f7fb2930eac2efc8c4893f34ba111c0bb976e3c7d5dc0
aef5a7ef0bf4057949a140285f774f1efc53b3860936b92279a11b68395d898d138
shared_secret:
02bee8be0dda755846115db45071c0cf59c25722e015bde1c124de849c0fea52
key_schedule_context: 03713f73042575cebfd132f0cc4338523f8eae95c80a74
9f7cf3eb9436ff1c612ca62c37df27ca46d2cc162445a92c5f5fdc57bcde129ca7b1
f284b0c12297c037ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: 0f9df08908a6a3d06c8e934cd3f5313f9ebccd0986e316c0198bb48bed30
dc3db2f3baab94fd40c2c285c7288c77e2255401ee2d5884306addf4296b93c238b3
key: b68bb0e2fbf7431cedb46cc3b6f1fe9e
base_nonce: 76af62719d33d39a1cb6be9f
exporter_secret: 7f72308ae68c9a2b3862e686cb547b16d33d00fe482c770c471
7d8b54e9b1e547244c3602bdd86d5a788a8443befea0a7658002b23f1c96a62a6498
6fffc511a
]]></artwork>
          <section anchor="encryptions-15">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 76af62719d33d39a1cb6be9f
ct: 840669634db51e28df54f189329c1b727fd303ae413f003020aff5e26276aaa9
10fc4296828cb9d862c2fd7d16

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 76af62719d33d39a1cb6be9e
ct: d4680a48158d9a75fd09355878d6e33997a36ee01d4a8f22032b22373b795a94
1b7b9c5205ff99e0ff284beef4

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 76af62719d33d39a1cb6be9d
ct: c45eb6597de2bac929a0f5d404ba9d2dc1ea031880930f1fd7a283f0a0cbebb3
5eac1a9ee0d1225f5e0f181571

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 76af62719d33d39a1cb6be9b
ct: 4ee2482ad8d7d1e9b7e651c78b6ca26d3c5314d0711710ca62c2fd8bb8996d7d
8727c157538d5493da696b61f8

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 76af62719d33d39a1cb6be60
ct: 65596b731df010c76a915c6271a438056ce65696459432eeafdae7b4cadb6290
dd61e68edd4e40b659d2a8cbcc

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 76af62719d33d39a1cb6bf9f
ct: 9f659482ebc52f8303f9eac75656d807ec38ce2e50c72e3078cd13d86b30e3f8
90690a873277620f8a6a42d836
]]></artwork>
          </section>
          <section anchor="exported-values-15">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
c8c917e137a616d3d4e4c9fcd9c50202f366cb0d37862376bc79f9b72e8a8db9

exporter_context: 00
L: 32
exported_value:
33a5d4df232777008a06d0684f23bb891cfaef702f653c8601b6ad4d08dddddf

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
bed80f2e54f1285895c4a3f3b3625e6206f78f1ed329a0cfb5864f7c139b3c6a
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha256-chacha20poly1305">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA256, ChaCha20Poly1305</name>
        <section anchor="base-setup-information-4">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
f1f1a3bc95416871539ecb51c3a8f0cf608afb40fbbe305c0a72819d35c33f1f
pkEm: 04c07836a0206e04e31d8ae99bfd549380b072a1b1b82e563c935c09582782
4fc1559eac6fb9e3c70cd3193968994e7fe9781aa103f5b50e934b5b2f387e381291
skEm:
7550253e1147aae48839c1f8af80d2770fb7a4c763afe7d0afa7e0f42a5b3689
ikmR:
61092f3f56994dd424405899154a9918353e3e008171517ad576b900ddb275e7
pkRm: 04a697bffde9405c992883c5c439d6cc358170b51af72812333b015621dc0f
40bad9bb726f68a5c013806a790ec716ab8669f84f6b694596c2987cf35baba2a006
skRm:
a4d1c55836aa30f9b3fbb6ac98d338c877c2867dd3a77396d13f68d3ab150d3b
enc: 04c07836a0206e04e31d8ae99bfd549380b072a1b1b82e563c935c095827824
fc1559eac6fb9e3c70cd3193968994e7fe9781aa103f5b50e934b5b2f387e381291
shared_secret:
806520f82ef0b03c823b7fc524b6b55a088f566b9751b89551c170f4113bd850
key_schedule_context: 00b738cd703db7b4106e93b4621e9a19c89c838e559642
40e5d3f331aaf8b0d58b2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
fe891101629aa355aad68eff3cc5170d057eca0c7573f6575e91f9783e1d4506
key:
a8f45490a92a3b04d1dbf6cf2c3939ad8bfc9bfcb97c04bffe116730c9dfe3fc
base_nonce: 726b4390ed2209809f58c693
exporter_secret:
4f9bd9b3a8db7d7c3a5b9d44fdc1f6e37d5d77689ade5ec44a7242016e6aa205
]]></artwork>
          <section anchor="encryptions-16">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 726b4390ed2209809f58c693
ct: 6469c41c5c81d3aa85432531ecf6460ec945bde1eb428cb2fedf7a29f5a685b4
ccb0d057f03ea2952a27bb458b

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 726b4390ed2209809f58c692
ct: f1564199f7e0e110ec9c1bcdde332177fc35c1adf6e57f8d1df24022227ffa87
16862dbda2b1dc546c9d114374

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 726b4390ed2209809f58c691
ct: 39de89728bcb774269f882af8dc5369e4f3d6322d986e872b3a8d074c7c18e85
49ff3f85b6d6592ff87c3f310c

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 726b4390ed2209809f58c697
ct: bc104a14fbede0cc79eeb826ea0476ce87b9c928c36e5e34dc9b6905d91473ec
369a08b1a25d305dd45c6c5f80

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 726b4390ed2209809f58c66c
ct: 8f2814a2c548b3be50259713c6724009e092d37789f6856553d61df23ebc0792
35f710e6af3c3ca6eaba7c7c6c

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 726b4390ed2209809f58c793
ct: b45b69d419a9be7219d8c94365b89ad6951caf4576ea4774ea40e9b7047a09d6
537d1aa2f7c12d6ae4b729b4d0
]]></artwork>
          </section>
          <section anchor="exported-values-16">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
9b13c510416ac977b553bf1741018809c246a695f45eff6d3b0356dbefe1e660

exporter_context: 00
L: 32
exported_value:
6c8b7be3a20a5684edecb4253619d9051ce8583baf850e0cb53c402bdcaf8ebb

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
477a50d804c7c51941f69b8e32fe8288386ee1a84905fe4938d58972f24ac938
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-4">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
e1a4e1d50c4bfcf890f2b4c7d6b2d2aca61368eddc3c84162df2856843e1057a
pkEm: 04f336578b72ad7932fe867cc4d2d44a718a318037a0ec271163699cee653f
a805c1fec955e562663e0c2061bb96a87d78892bff0cc0bad7906c2d998ebe1a7246
skEm:
7d6e4e006cee68af9b3fdd583a0ee8962df9d59fab029997ee3f456cbc857904
ikmR:
ee51dec304abf993ef8fd52aacdd3b539108bbf6e491943266c1de89ec596a17
pkRm: 041eb8f4f20ab72661af369ff3231a733672fa26f385ffb959fd1bae46bfda
43ad55e2d573b880831381d9367417f554ce5b2134fbba5235b44db465feffc6189e
skRm:
12ecde2c8bc2d5d7ed2219c71f27e3943d92b344174436af833337c557c300b3
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04f336578b72ad7932fe867cc4d2d44a718a318037a0ec271163699cee653fa
805c1fec955e562663e0c2061bb96a87d78892bff0cc0bad7906c2d998ebe1a7246
shared_secret:
ac4f260dce4db6bf45435d9c92c0e11cfdd93743bd3075949975974cc2b3d79e
key_schedule_context: 01622b72afcc3795841596c67ea74400ca3b029374d7d5
640bda367c5d67b3fbeb2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
858c8087a1c056db5811e85802f375bb0c19b9983204a1575de4803575d23239
key:
6d61cb330b7771168c8619498e753f16198aad9566d1f1c6c70e2bc1a1a8b142
base_nonce: 0de7655fb65e1cd51a38864e
exporter_secret:
754ca00235b245e72d1f722a7718e7145bd113050a2aa3d89586d4cb7514bfdb
]]></artwork>
          <section anchor="encryptions-17">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 0de7655fb65e1cd51a38864e
ct: 21433eaff24d7706f3ed5b9b2e709b07230e2b11df1f2b1fe07b3c70d5948a53
d6fa5c8bed194020bd9df0877b

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 0de7655fb65e1cd51a38864f
ct: c74a764b4892072ea8c2c56b9bcd46c7f1e9ca8cb0a263f8b40c2ba59ac9c857
033f176019562218769d3e0452

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 0de7655fb65e1cd51a38864c
ct: dc8cd68863474d6e9cbb6a659335a86a54e036249d41acf909e738c847ff2bd3
6fe3fcacda4ededa7032c0a220

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 0de7655fb65e1cd51a38864a
ct: cd54a8576353b1b9df366cb0cc042e46eef6f4cf01e205fe7d47e306b2fdd90f
7185f289a26c613ca094e3be10

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 0de7655fb65e1cd51a3886b1
ct: 6324570c9d542c70c7e70570c1d8f4c52a89484746bf0625441890ededcc80c2
4ef2301c38bfd34d689d19f67d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 0de7655fb65e1cd51a38874e
ct: 1ea6326c8098ed0437a553c466550114fb2ca1412cca7de98709b9ccdf19206e
52c3d39180e2cf62b3e9f4baf4
]]></artwork>
          </section>
          <section anchor="exported-values-17">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
530bbc2f68f078dccc89cc371b4f4ade372c9472bafe4601a8432cbb934f528d

exporter_context: 00
L: 32
exported_value:
6e25075ddcc528c90ef9218f800ca3dfe1b8ff4042de5033133adb8bd54c401d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
6f6fbd0d1c7733f796461b3235a856cc34f676fe61ed509dfc18fa16efe6be78
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-4">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
0ecd212019008138a31f9104d5dba76b9f8e34d5b996041fff9e3df221dd0d5d
pkEm: 040d5176aedba55bc41709261e9195c5146bb62d783031280775f32e507d79
b5cbc5748b6be6359760c73cfe10ca19521af704ca6d91ff32fc0739527b9385d415
skEm:
085fd5d5e6ce6497c79df960cac93710006b76217d8bcfafbd2bb2c20ea03c42
ikmR:
d32236d8378b9563840653789eb7bc33c3c720e537391727bf1c812d0eac110f
pkRm: 0444f6ee41818d9fe0f8265bffd016b7e2dd3964d610d0f7514244a60dbb7a
11ece876bb110a97a2ac6a9542d7344bf7d2bd59345e3e75e497f7416cf38d296233
skRm:
3cb2c125b8c5a81d165a333048f5dcae29a2ab2072625adad66dbb0f48689af9
ikmS:
0e6be0851283f9327295fd49858a8c8908ea9783212945eef6c598ee0a3cedbb
pkSm: 04265529a04d4f46ab6fa3af4943774a9f1127821656a75a35fade898a9a1b
014f64d874e88cddb24c1c3d79004d3a587db67670ca357ff4fba7e8b56ec013b98b
skSm:
39b19402e742d48d319d24d68e494daa4492817342e593285944830320912519
enc: 040d5176aedba55bc41709261e9195c5146bb62d783031280775f32e507d79b
5cbc5748b6be6359760c73cfe10ca19521af704ca6d91ff32fc0739527b9385d415
shared_secret:
1a45aa4792f4b166bfee7eeab0096c1a6e497480e2261b2a59aad12f2768d469
key_schedule_context: 02b738cd703db7b4106e93b4621e9a19c89c838e559642
40e5d3f331aaf8b0d58b2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
9193210815b87a4c5496c9d73e609a6c92665b5ea0d760866294906d089ebb57
key:
cf292f8a4313280a462ce55cde05b5aa5744fe4ca89a5d81b0146a5eaca8092d
base_nonce: 7e45c21e20e869ae00492123
exporter_secret:
dba6e307f71769ba11e2c687cc19592f9d436da0c81e772d7a8a9fd28e54355f
]]></artwork>
          <section anchor="encryptions-18">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 7e45c21e20e869ae00492123
ct: 25881f219935eec5ba70d7b421f13c35005734f3e4d959680270f55d71e2f5cb
3bd2daced2770bf3d9d4916872

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 7e45c21e20e869ae00492122
ct: 653f0036e52a376f5d2dd85b3204b55455b7835c231255ae098d09ed138719b9
7185129786338ab6543f753193

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 7e45c21e20e869ae00492121
ct: 60878706117f22180c788e62df6a595bc41906096a11a9513e84f0141e43239e
81a98d7a235abc64112fcb8ddd

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 7e45c21e20e869ae00492127
ct: 0f9094dd08240b5fa7a388b824d19d5b4b1e126cebfd67a062c32f9ba9f1f386
6cc38de7df2702626e2ab65c0f

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 7e45c21e20e869ae004921dc
ct: dd29319e08135c5f8401d6537a364e92172c0e3f095f3fd18923881d11c0a683
9345dd0b54acd0edd8f8344792

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 7e45c21e20e869ae00492023
ct: e2276ec5047bc4b6ed57d6da7da2fb47a77502f0a30f17d040247c73da336d72
2bc6c89adf68396a0912c6d152
]]></artwork>
          </section>
          <section anchor="exported-values-18">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
56c4d6c1d3a46c70fd8f4ecda5d27c70886e348efb51bd5edeaa39ff6ce34389

exporter_context: 00
L: 32
exported_value:
d2d3e48ed76832b6b3f28fa84be5f11f09533c0e3c71825a34fb0f1320891b51

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
eb0d312b6263995b4c7761e64b688c215ffd6043ff3bad2368c862784cbe6eff
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-4">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
f3a07f194703e321ef1f753a1b9fe27a498dfdfa309151d70bedd896c239c499
pkEm: 043539917ee26f8ae0aa5f784a387981b13de33124a3cde88b946720301831
10f331400115855808244ff0c5b6ca6104483ac95724481d41bdcd9f15b430ad16f6
skEm:
11b7e4de2d919240616a31ab14944cced79bc2372108bb98f6792e3b645fe546
ikmR:
1240e55a0a03548d7f963ef783b6a7362cb505e6b31dfd04c81d9b294543bfbd
pkRm: 04d383fd920c42d018b9d57fd73a01f1eee480008923f67d35169478e55d2e
8817068daf62a06b10e0aad4a9e429fa7f904481be96b79a9c231a33e956c20b81b6
skRm:
c29fc577b7e74d525c0043f1c27540a1248e4f2c8d297298e99010a92e94865c
ikmS:
ce2a0387a2eb8870a3a92c34a2975f0f3f271af4384d446c7dc1524a6c6c515a
pkSm: 0492cf8c9b144b742fe5a63d9a181a19d416f3ec8705f24308ad316564823c
344e018bd7c03a33c926bb271b28ef5bf28c0ca00abff249fee5ef7f33315ff34fdb
skSm:
53541bd995f874a67f8bfd8038afa67fd68876801f42ff47d0dc2a4deea067ae
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 043539917ee26f8ae0aa5f784a387981b13de33124a3cde88b9467203018311
0f331400115855808244ff0c5b6ca6104483ac95724481d41bdcd9f15b430ad16f6
shared_secret:
87584311791036a3019bc36803cdd42e9a8931a98b13c88835f2f8a9036a4fd6
key_schedule_context: 03622b72afcc3795841596c67ea74400ca3b029374d7d5
640bda367c5d67b3fbeb2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
fe52b4412590e825ea2603fa88e145b2ee014b942a774b55fab4f081301f16f4
key:
31e140c8856941315d4067239fdc4ebe077fbf45a6fc78a61e7a6c8b3bacb10a
base_nonce: 75838a8010d2e4760254dd56
exporter_secret:
600895965755db9c5027f25f039a6e3e506c35b3b7084ce33c4a48d59ee1f0e3
]]></artwork>
          <section anchor="encryptions-19">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 75838a8010d2e4760254dd56
ct: 9eadfa0f954835e7e920ffe56dec6b31a046271cf71fdda55db72926e1d8fae9
4cc6280fcfabd8db71eaa65c05

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 75838a8010d2e4760254dd57
ct: e357ad10d75240224d4095c9f6150a2ed2179c0f878e4f2db8ca95d365d174d0
59ff8c3eb38ea9a65cfc8eaeb8

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 75838a8010d2e4760254dd54
ct: 2fa56d00f8dd479d67a2ec3308325cf3bbccaf102a64ffccdb006bd7dcb93268
5b9a7b49cdc094a85fec1da5ef

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 75838a8010d2e4760254dd52
ct: 1fe9d6db14965003ed81a39abf240f9cd7c5a454bca0d69ef9a2de16d537364f
bbf110b9ef11fa4a7a0172f0ce

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 75838a8010d2e4760254dda9
ct: eaf4041a5c9122b22d1f8d698eeffe45d64b4ae33d0ddca3a4cdf4a5f595acc9
5a1a9334d06cc4d000df6aaad6

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 75838a8010d2e4760254dc56
ct: fb857f4185ce5286c1a52431867537204963ea66a3eee8d2a74419fd8751faee
066d08277ac7880473aa4143ba
]]></artwork>
          </section>
          <section anchor="exported-values-19">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
c52b4592cd33dd38b2a3613108ddda28dcf7f03d30f2a09703f758bfa8029c9a

exporter_context: 00
L: 32
exported_value:
2f03bebc577e5729e148554991787222b5c2a02b77e9b1ac380541f710e5a318

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
e01dd49e8bfc3d9216abc1be832f0418adf8b47a7b5a330a7436c31e33d765d7
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-521-hkdf-sha512-hkdf-sha512-aes-256-gcm">
        <name>DHKEM(P-521, HKDF-SHA512), HKDF-SHA512, AES-256-GCM</name>
        <section anchor="base-setup-information-5">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: 7f06ab8215105fc46aceeb2e3dc5028b44364f960426eb0d8e4026c2f8b5d7
e7a986688f1591abf5ab753c357a5d6f0440414b4ed4ede71317772ac98d9239f709
04
pkEm: 040138b385ca16bb0d5fa0c0665fbbd7e69e3ee29f63991d3e9b5fa740aab8
900aaeed46ed73a49055758425a0ce36507c54b29cc5b85a5cee6bae0cf1c21f2731
ece2013dc3fb7c8d21654bb161b463962ca19e8c654ff24c94dd2898de12051f1ed0
692237fb02b2f8d1dc1c73e9b366b529eb436e98a996ee522aef863dd5739d2f29b0
skEm: 014784c692da35df6ecde98ee43ac425dbdd0969c0c72b42f2e708ab9d5354
15a8569bdacfcc0a114c85b8e3f26acf4d68115f8c91a66178cdbd03b7bcc5291e37
4b
ikmR: 2ad954bbe39b7122529f7dde780bff626cd97f850d0784a432784e69d86ecc
aade43b6c10a8ffdb94bf943c6da479db137914ec835a7e715e36e45e29b587bab3b
f1
pkRm: 0401b45498c1714e2dce167d3caf162e45e0642afc7ed435df7902ccae0e84
ba0f7d373f646b7738bbbdca11ed91bdeae3cdcba3301f2457be452f271fa6837580
e661012af49583a62e48d44bed350c7118c0d8dc861c238c72a2bda17f64704f464b
57338e7f40b60959480c0e58e6559b190d81663ed816e523b6b6a418f66d2451ec64
skRm: 01462680369ae375e4b3791070a7458ed527842f6a98a79ff5e0d4cbde83c2
7196a3916956655523a6a2556a7af62c5cadabe2ef9da3760bb21e005202f7b24628
47
enc: 040138b385ca16bb0d5fa0c0665fbbd7e69e3ee29f63991d3e9b5fa740aab89
00aaeed46ed73a49055758425a0ce36507c54b29cc5b85a5cee6bae0cf1c21f2731e
ce2013dc3fb7c8d21654bb161b463962ca19e8c654ff24c94dd2898de12051f1ed06
92237fb02b2f8d1dc1c73e9b366b529eb436e98a996ee522aef863dd5739d2f29b0
shared_secret: 776ab421302f6eff7d7cb5cb1adaea0cd50872c71c2d63c30c4f1
d5e43653336fef33b103c67e7a98add2d3b66e2fda95b5b2a667aa9dac7e59cc1d46
d30e818
key_schedule_context: 0083a27c5b2358ab4dae1b2f5d8f57f10ccccc822a4733
26f543f239a70aee46347324e84e02d7651a10d08fb3dda739d22d50c53fbfa8122b
aacd0f9ae5913072ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 49fd9f53b0f93732555b2054edfdc0e3101000d75df714b98ce5aa295a37
f1b18dfa86a1c37286d805d3ea09a20b72f93c21e83955a1f01eb7c5eead563d21e7
key:
751e346ce8f0ddb2305c8a2a85c70d5cf559c53093656be636b9406d4d7d1b70
base_nonce: 55ff7a7d739c69f44b25447b
exporter_secret: e4ff9dfbc732a2b9c75823763c5ccc954a2c0648fc6de80a585
81252d0ee3215388a4455e69086b50b87eb28c169a52f42e71de4ca61c920e7bd24c
95cc3f992
]]></artwork>
          <section anchor="encryptions-20">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 55ff7a7d739c69f44b25447b
ct: 170f8beddfe949b75ef9c387e201baf4132fa7374593dfafa90768788b7b2b20
0aafcc6d80ea4c795a7c5b841a

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 55ff7a7d739c69f44b25447a
ct: d9ee248e220ca24ac00bbbe7e221a832e4f7fa64c4fbab3945b6f3af0c5ecd5e
16815b328be4954a05fd352256

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 55ff7a7d739c69f44b254479
ct: 142cf1e02d1f58d9285f2af7dcfa44f7c3f2d15c73d460c48c6e0e506a3144ba
e35284e7e221105b61d24e1c7a

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 55ff7a7d739c69f44b25447f
ct: 3bb3a5a07100e5a12805327bf3b152df728b1c1be75a9fd2cb2bf5eac0cca1fb
80addb37eb2a32938c7268e3e5

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 55ff7a7d739c69f44b254484
ct: 4f268d0930f8d50b8fd9d0f26657ba25b5cb08b308c92e33382f369c768b558e
113ac95a4c70dd60909ad1adc7

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 55ff7a7d739c69f44b25457b
ct: dbbfc44ae037864e75f136e8b4b4123351d480e6619ae0e0ae437f036f2f8f1e
f677686323977a1ccbb4b4f16a
]]></artwork>
          </section>
          <section anchor="exported-values-20">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
05e2e5bd9f0c30832b80a279ff211cc65eceb0d97001524085d609ead60d0412

exporter_context: 00
L: 32
exported_value:
fca69744bb537f5b7a1596dbf34eaa8d84bf2e3ee7f1a155d41bd3624aa92b63

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
f389beaac6fcf6c0d9376e20f97e364f0609a88f1bc76d7328e9104df8477013
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-5">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: f3ebfa9a69a924e672114fcd9e06fa9559e937f7eccce4181a2b506df53dbe
514be12f094bb28e01de19dd345b4f7ede5ad7eaa6b9c3019592ec68eaae9a14732c
e0
pkEm: 040085eff0835cc84351f32471d32aa453cdc1f6418eaaecf1c2824210eb1d
48d0768b368110fab21407c324b8bb4bec63f042cfa4d0868d19b760eb4beba1bff7
93b30036d2c614d55730bd2a40c718f9466faf4d5f8170d22b6df98dfe0c067d02b3
49ae4a142e0c03418f0a1479ff78a3db07ae2c2e89e5840f712c174ba2118e90fdcb
skEm: 012e5cfe0daf5fe2a1cd617f4c4bae7c86f1f527b3207f115e262a98cc6526
8ec88cb8645aec73b7aa0a472d0292502d1078e762646e0c093cf873243d12c39915
f6
ikmR: a2a2458705e278e574f835effecd18232f8a4c459e7550a09d44348ae5d3b1
ea9d95c51995e657ad6f7cae659f5e186126a471c017f8f5e41da9eba74d4e0473e1
79
pkRm: 04006917e049a2be7e1482759fb067ddb94e9c4f7f5976f655088dec452466
14ff924ed3b385fc2986c0ecc39d14f907bf837d7306aada59dd5889086125ecd038
ead400603394b5d81f89ebfd556a898cc1d6a027e143d199d3db845cb91c5289fb26
c5ff80832935b0e8dd08d37c6185a6f77683347e472d1edb6daa6bd7652fea628fae
skRm: 011bafd9c7a52e3e71afbdab0d2f31b03d998a0dc875dd7555c63560e142bd
e264428de03379863b4ec6138f813fa009927dc5d15f62314c56d4e7ff2b485753eb
72
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 040085eff0835cc84351f32471d32aa453cdc1f6418eaaecf1c2824210eb1d4
8d0768b368110fab21407c324b8bb4bec63f042cfa4d0868d19b760eb4beba1bff79
3b30036d2c614d55730bd2a40c718f9466faf4d5f8170d22b6df98dfe0c067d02b34
9ae4a142e0c03418f0a1479ff78a3db07ae2c2e89e5840f712c174ba2118e90fdcb
shared_secret: 0d52de997fdaa4797720e8b1bebd3df3d03c4cf38cc8c1398168d
36c3fc7626428c9c254dd3f9274450909c64a5b3acbe45e2d850a2fd69ac0605fe5c
8a057a5
key_schedule_context: 0124497637cf18d6fbcc16e9f652f00244c981726f293b
b7819861e85e50c94f0be30e022ab081e18e6f299fd3d3d976a4bc590f85bc7711bf
ce32ee1a7fb1c154ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 2cf425e26f65526afc0634a3dba4e28d980c1015130ce07c2ac7530d7a39
1a75e5a0db428b09f27ad4d975b4ad1e7f85800e03ffeea35e8cf3fe67b18d4a1345
key:
f764a5a4b17e5d1ffba6e699d65560497ebaea6eb0b0d9010a6d979e298a39ff
base_nonce: 479afdf3546ddba3a9841f38
exporter_secret: 5c3d4b65a13570502b93095ef196c42c8211a4a188c4590d358
63665c705bb140ecba6ce9256be3fad35b4378d41643867454612adfd0542a684b61
799bf293f
]]></artwork>
          <section anchor="encryptions-21">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 479afdf3546ddba3a9841f38
ct: de69e9d943a5d0b70be3359a19f317bd9aca4a2ebb4332a39bcdfc97d5fe62f3
a77702f4822c3be531aa7843a1

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 479afdf3546ddba3a9841f39
ct: 77a16162831f90de350fea9152cfc685ecfa10acb4f7994f41aed43fa5431f23
82d078ec88baec53943984553e

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 479afdf3546ddba3a9841f3a
ct: f1d48d09f126b9003b4c7d3fe6779c7c92173188a2bb7465ba43d899a6398a33
3914d2bb19fd769d53f3ec7336

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 479afdf3546ddba3a9841f3c
ct: 829b11c082b0178082cd595be6d73742a4721b9ac05f8d2ef8a7704a53022d82
bd0d8571f578c5c13b99eccff8

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 479afdf3546ddba3a9841fc7
ct: a3ee291e20f37021e82df14d41f3fbe98b27c43b318a36cacd8471a3b1051ab1
2ee055b62ded95b72a63199a3f

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 479afdf3546ddba3a9841e38
ct: eecc2173ce1ac14b27ee67041e90ed50b7809926e55861a579949c07f6d26137
bf9cf0d097f60b5fd2fbf348ec
]]></artwork>
          </section>
          <section anchor="exported-values-21">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
62691f0f971e34de38370bff24deb5a7d40ab628093d304be60946afcdb3a936

exporter_context: 00
L: 32
exported_value:
76083c6d1b6809da088584674327b39488eaf665f0731151128452e04ce81bff

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
0c7cfc0976e25ae7680cf909ae2de1859cd9b679610a14bec40d69b91785b2f6
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-5">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: fe1c589c2a05893895a537f38c7cb4300b5a7e8fef3d6ccb8f07a498029c61
e90262e009dc254c7f6235f9c6b2fd6aeff0a714db131b09258c16e217b7bd2aa619
b0
pkEm: 04017de12ede7f72cb101dab36a111265c97b3654816dcd6183f809d4b3d11
1fe759497f8aefdc5dbb40d3e6d21db15bdc60f15f2a420761bcaeef73b891c2b117
e9cf01e29320b799bbc86afdc5ea97d941ea1c5bd5ebeeac7a784b3bab524746f3e6
40ec26ee1bd91255f9330d974f845084637ee0e6fe9f505c5b87c86a4e1a6c3096dd
skEm: 0185f03560de87bb2c543ef03607f3c33ac09980000de25eabe3b224312946
330d2e65d192d3b4aa46ca92fc5ca50736b624402d95f6a80dc04d1f10ae95171372
61
ikmR: 8feea0438481fc0ecd470d6adfcda334a759c6b8650452c5a5dd9b2dd2cc9b
e33d2bb7ee64605fc07ab4664a58bb9a8de80defe510b6c97d2daf85b92cd4bb0a66
bf
pkRm: 04007d419b8834e7513d0e7cc66424a136ec5e11395ab353da324e3586673e
e73d53ab34f30a0b42a92d054d0db321b80f6217e655e304f72793767c4231785c4a
4a6e008f31b93b7a4f2b8cd12e5fe5a0523dc71353c66cbdad51c86b9e0bdfcd9a45
698f2dab1809ab1b0f88f54227232c858accc44d9a8d41775ac026341564a2d749f4
skRm: 013ef326940998544a899e15e1726548ff43bbdb23a8587aa3bef9d1b85733
8d87287df5667037b519d6a14661e9503cfc95a154d93566d8c84e95ce93ad05293a
0b
ikmS: 2f66a68b85ef04822b054ef521838c00c64f8b6226935593b69e13a1a2461a
4f1a74c10c836e87eed150c0db85d4e4f506cbb746149befac6f5c07dc48a615ef92
db
pkSm: 04015cc3636632ea9a3879e43240beae5d15a44fba819282fac26a19c989fa
fdd0f330b8521dff7dc393101b018c1e65b07be9f5fc9a28a1f450d6a541ee0d7622
1133001e8f0f6a05ab79f9b9bb9ccce142a453d59c5abebb5674839d935a3ca1a3fb
c328539a60b3bc3c05fed22838584a726b9c176796cad0169ba4093332cbd2dc3a9f
skSm: 001018584599625ff9953b9305849850d5e34bd789d4b81101139662fbea8b
6508ddb9d019b0d692e737f66beae3f1f783e744202aaf6fea01506c27287e359fe7
76
enc: 04017de12ede7f72cb101dab36a111265c97b3654816dcd6183f809d4b3d111
fe759497f8aefdc5dbb40d3e6d21db15bdc60f15f2a420761bcaeef73b891c2b117e
9cf01e29320b799bbc86afdc5ea97d941ea1c5bd5ebeeac7a784b3bab524746f3e64
0ec26ee1bd91255f9330d974f845084637ee0e6fe9f505c5b87c86a4e1a6c3096dd
shared_secret: 26648fa2a2deb0bfc56349a590fd4cb7108a51797b634694fc020
61e8d91b3576ac736a68bf848fe2a58dfb1956d266e68209a4d631e513badf8f4dcf
c00f30a
key_schedule_context: 0283a27c5b2358ab4dae1b2f5d8f57f10ccccc822a4733
26f543f239a70aee46347324e84e02d7651a10d08fb3dda739d22d50c53fbfa8122b
aacd0f9ae5913072ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 56b7acb7355d080922d2ddc227829c2276a0b456087654b3ac4b53828bd3
4af8cf54626f85af858a15a86eba73011665cc922bc59fd07d2975f356d2674db554
key:
01fced239845e53f0ec616e71777883a1f9fcab22a50f701bdeee17ad040e44d
base_nonce: 9752b85fe8c73eda183f9e80
exporter_secret: 80466a9d9cc5112ddad297e817e038801e15fa18152bc4dc010
a35d7f534089c87c98b4bacd7bbc6276c4002a74085adcd9019fca6139826b529256
9cfb7fe47
]]></artwork>
          <section anchor="encryptions-22">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 9752b85fe8c73eda183f9e80
ct: 0116aeb3a1c405c61b1ce47600b7ecd11d89b9c08c408b7e2d1e00a4d64696d1
2e6881dc61688209a8207427f9

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 9752b85fe8c73eda183f9e81
ct: 37ece0cf6741f443e9d73b9966dc0b228499bb21fbf313948327231e70a18380
e080529c0267f399ba7c539cc6

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 9752b85fe8c73eda183f9e82
ct: d17b045cac963e45d55fd3692ec17f100df66ac06d91f3b6af8efa7ed3c88955
50eb753bc801fe4bd27005b4bd

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 9752b85fe8c73eda183f9e84
ct: 50c523ae7c64cada96abea16ddf67a73d2914ec86a4cedb31a7e6257f7553ed2
44626ef79a57198192b2323384

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 9752b85fe8c73eda183f9e7f
ct: 53d422295a6ce8fcc51e6f69e252e7195e64abf49252f347d8c25534f1865a6a
17d949c65ce618ddc7d816111f

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 9752b85fe8c73eda183f9f80
ct: 0dfcfc22ea768880b4160fec27ab10c75fb27766c6bb97aed373a9b6eae35d31
afb08257401075cbb602ac5abb
]]></artwork>
          </section>
          <section anchor="exported-values-22">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
8d78748d632f95b8ce0c67d70f4ad1757e61e872b5941e146986804b3990154b

exporter_context: 00
L: 32
exported_value:
80a4753230900ea785b6c80775092801fe91183746479f9b04c305e1db9d1f4d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
620b176d737cf366bcc20d96adb54ec156978220879b67923689e6dca36210ed
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-5">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: 54272797b1fbc128a6967ff1fd606e0c67868f7762ce1421439cbc9e90ce1b
28d566e6c2acbce712e48eebf236696eb680849d6873e9959395b2931975d61d38bd
6c
pkEm: 04000a5096a6e6e002c83517b494bfc2e36bfb8632fae8068362852b70d0ff
71e560b15aff96741ecffb63d8ac3090c3769679009ac59a99a1feb4713c5f090fc0
dbed01ad73c45d29d369e36744e9ed37d12f80700c16d816485655169a5dd66e4ddf
27f2acffe0f56f7f77ea2b473b4bf0518b975d9527009a3d14e5a4957e3e8a9074f8
skEm: 003430af19716084efeced1241bb1a5625b6c826f11ef31649095eb2795261
9e36f62a79ea28001ac452fb20ddfbb66e62c6c0b1be03c0d28c97794a1fb638207a
83
ikmR: 3db434a8bc25b27eb0c590dc64997ab1378a99f52b2cb5a5a5b2fa540888f6
c0f09794c654f4468524e040e6b4eca2c9dcf229f908b9d318f960cc9e9baa92c5ee
e6
pkRm: 0401655b5d3b7cfafaba30851d25edc44c6dd17d99410efbed8591303b4dbe
ea8cb1045d5255f9a60384c3bbd4a3386ae6e6fab341dc1f8db0eed5f0ab1aaac6d7
838e00dadf8a1c2c64b48f89c633721e88369e54104b31368f26e35d04a442b0b428
510fb23caada686add16492f333b0f7ba74c391d779b788df2c38d7a7f4778009d91
skRm: 0053c0bc8c1db4e9e5c3e3158bfdd7fc716aef12db13c8515adf821dd692ba
3ca53041029128ee19c8556e345c4bcb840bb7fd789f97fe10f17f0e2c6c25280728
43
ikmS: 65d523d9b37e1273eb25ad0527d3a7bd33f67208dd1666d9904c6bc04969ae
5831a8b849e7ff642581f2c3e56be84609600d3c6bbdaded3f6989c37d2892b1e978
d5
pkSm: 040013761e97007293d57de70962876b4926f69a52680b4714bee1d4236aa9
6c19b840c57e80b14e91258f0a350e3f7ba59f3f091633aede4c7ec4fa8918323aa4
5d5901076dec8eeb22899fda9ab9e1960003ff0535f53c02c40f2ae4cdc6070a3870
b85b4bdd0bb77f1f889e7ee51f465a308f08c666ad3407f75dc046b2ff5a24dbe2ed
skSm: 003f64675fc8914ec9e2b3ecf13585b26dbaf3d5d805042ba487a5070b8c5a
c1d39b17e2161771cc1b4d0a3ba6e866f4ea4808684b56af2a49b5e5111146d45d93
26
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04000a5096a6e6e002c83517b494bfc2e36bfb8632fae8068362852b70d0ff7
1e560b15aff96741ecffb63d8ac3090c3769679009ac59a99a1feb4713c5f090fc0d
bed01ad73c45d29d369e36744e9ed37d12f80700c16d816485655169a5dd66e4ddf2
7f2acffe0f56f7f77ea2b473b4bf0518b975d9527009a3d14e5a4957e3e8a9074f8
shared_secret: 9e1d5f62cb38229f57f68948a0fbc1264499910cce50ec62cb241
88c5b0a98868f3c1cfa8c5baa97b3f24db3cdd30df6e04eae83dc4347be8a981066c
3b5b945
key_schedule_context: 0324497637cf18d6fbcc16e9f652f00244c981726f293b
b7819861e85e50c94f0be30e022ab081e18e6f299fd3d3d976a4bc590f85bc7711bf
ce32ee1a7fb1c154ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 50a57775958037a04098e0054576cd3bc084d0d08d29548ba4befa5676b9
1eb4dcd0752813a052c9a930d0aba6ca10b89dd690b64032dc635dece35d1bf4645c
key:
1316ed34bd52374854ed0e5cb0394ca0a79b2d8ce7f15d5104f21acdfb594286
base_nonce: d9c64ec8deb8a0647fafe8ff
exporter_secret: 6cb00ff99aebb2e4a05042ce0d048326dd2c03acd61a601b103
8a65398406a96ab8b5da3187412b2324089ea16ba4ff7e6f4fe55d281fc8ae5f2049
032b69ebd
]]></artwork>
          <section anchor="encryptions-23">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: d9c64ec8deb8a0647fafe8ff
ct: 942a2a92e0817cf032ce61abccf4f3a7c5d21b794ed943227e07b7df2d6dd92c
9b8a9371949e65cca262448ab7

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: d9c64ec8deb8a0647fafe8fe
ct: c0a83b5ec3d7933a090f681717290337b4fede5bfaa0a40ec29f93acad742888
a1513c649104c391c78d1d7f29

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: d9c64ec8deb8a0647fafe8fd
ct: 2847b2e0ce0b9da8fca7b0e81ff389d1682ee1b388ed09579b145058b5af6a93
a85dd50d9f417dc88f2c785312

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: d9c64ec8deb8a0647fafe8fb
ct: fbd9948ab9ac4a9cb9e295c07273600e6a111a3a89241d3e2178f39d532a2ec5
c15b9b0c6937ac84c88e0ca76f

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: d9c64ec8deb8a0647fafe800
ct: 63113a870131b567db8f39a11b4541eafbd2d3cf3a9bf9e5c1cfcb41e52f9027
310b82a4868215959131694d15

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: d9c64ec8deb8a0647fafe9ff
ct: 24f9d8dadd2107376ccd143f70f9bafcd2b21d8117d45ff327e9a78f603a3260
6e42a6a8bdb57a852591d20907
]]></artwork>
          </section>
          <section anchor="exported-values-23">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
a39502ef5ca116aa1317bd9583dd52f15b0502b71d900fc8a622d19623d0cb5d

exporter_context: 00
L: 32
exported_value:
749eda112c4cfdd6671d84595f12cd13198fc3ef93ed72369178f344fe6e09c3

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
f8b4e72cefbff4ca6c4eabb8c0383287082cfcbb953d900aed4959afd0017095
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-export-only-aead">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, Export-Only AEAD</name>
        <section anchor="base-setup-information-6">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
55bc245ee4efda25d38f2d54d5bb6665291b99f8108a8c4b686c2b14893ea5d9
pkEm:
e5e8f9bfff6c2f29791fc351d2c25ce1299aa5eaca78a757c0b4fb4bcd830918
skEm:
095182b502f1f91f63ba584c7c3ec473d617b8b4c2cec3fad5af7fa6748165ed
ikmR:
683ae0da1d22181e74ed2e503ebf82840deb1d5e872cade20f4b458d99783e31
pkRm:
194141ca6c3c3beb4792cd97ba0ea1faff09d98435012345766ee33aae2d7664
skRm:
33d196c830a12f9ac65d6e565a590d80f04ee9b19c83c87f2c170d972a812848
enc:
e5e8f9bfff6c2f29791fc351d2c25ce1299aa5eaca78a757c0b4fb4bcd830918
shared_secret:
e81716ce8f73141d4f25ee9098efc968c91e5b8ce52ffff59d64039e82918b66
key_schedule_context: 009bd09219212a8cf27c6bb5d54998c5240793a70ca0a8
92234bd5e082bc619b6a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
04d64e0620aa047e9ab833b0ebcd4ff026cefbe44338fd7d1a93548102ee01af
key:
base_nonce:
exporter_secret:
79dc8e0509cf4a3364ca027e5a0138235281611ca910e435e8ed58167c72f79b
]]></artwork>
          <section anchor="exported-values-24">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
7a36221bd56d50fb51ee65edfd98d06a23c4dc87085aa5866cb7087244bd2a36

exporter_context: 00
L: 32
exported_value:
d5535b87099c6c3ce80dc112a2671c6ec8e811a2f284f948cec6dd1708ee33f0

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
ffaabc85a776136ca0c378e5d084c9140ab552b78f039d2e8775f26efff4c70e
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-6">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
c51211a8799f6b8a0021fcba673d9c4067a98ebc6794232e5b06cb9febcbbdf5
pkEm:
d3805a97cbcd5f08babd21221d3e6b362a700572d14f9bbeb94ec078d051ae3d
skEm:
1d72396121a6a826549776ef1a9d2f3a2907fc6a38902fa4e401afdb0392e627
ikmR:
5e0516b1b29c0e13386529da16525210c796f7d647c37eac118023a6aa9eb89a
pkRm:
d53af36ea5f58f8868bb4a1333ed4cc47e7a63b0040eb54c77b9c8ec456da824
skRm:
98f304d4ecb312689690b113973c61ffe0aa7c13f2fbe365e48f3ed09e5a6a0c
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
d3805a97cbcd5f08babd21221d3e6b362a700572d14f9bbeb94ec078d051ae3d
shared_secret:
024573db58c887decb4c57b6ed39f2c9a09c85600a8a0ecb11cac24c6aaec195
key_schedule_context: 01446fb1fe2632a0a338f0a85ed1f3a0ac475bdea2cd72
f8c713b3a46ee737379a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
638b94532e0d0bf812cf294f36b97a5bdcb0299df36e22b7bb6858e3c113080b
key:
base_nonce:
exporter_secret:
04261818aeae99d6aba5101bd35ddf3271d909a756adcef0d41389d9ed9ab153
]]></artwork>
          <section anchor="exported-values-25">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
be6c76955334376aa23e936be013ba8bbae90ae74ed995c1c6157e6f08dd5316

exporter_context: 00
L: 32
exported_value:
1721ed2aa852f84d44ad020c2e2be4e2e6375098bf48775a533505fd56a3f416

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
7c9d79876a288507b81a5a52365a7d39cc0fa3f07e34172984f96fec07c44cba
]]></artwork>
          </section>
        </section>
        <section anchor="auth-setup-information-6">
          <name>Auth Setup Information</name>
          <artwork><![CDATA[
mode: 2
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
43b078912a54b591a7b09b16ce89a1955a9dd60b29fb611e044260046e8b061b
pkEm:
5ac1671a55c5c3875a8afe74664aa8bc68830be9ded0c5f633cd96400e8b5c05
skEm:
83d3f217071bbf600ba6f081f6e4005d27b97c8001f55cb5ff6ea3bbea1d9295
ikmR:
fc9407ae72ed614901ebf44257fb540f617284b5361cfecd620bafc4aba36f73
pkRm:
ffd7ac24694cb17939d95feb7c4c6539bb31621deb9b96d715a64abdd9d14b10
skRm:
ed88cda0e91ca5da64b6ad7fc34a10f096fa92f0b9ceff9d2c55124304ed8b4a
ikmS:
2ff4c37a17b2e54046a076bf5fea9c3d59250d54d0dc8572bc5f7c046307040c
pkSm:
89eb1feae431159a5250c5186f72a15962c8d0debd20a8389d8b6e4996e14306
skSm:
c85f136e06d72d28314f0e34b10aadc8d297e9d71d45a5662c2b7c3b9f9f9405
enc:
5ac1671a55c5c3875a8afe74664aa8bc68830be9ded0c5f633cd96400e8b5c05
shared_secret:
e204156fd17fd65b132d53a0558cd67b7c0d7095ee494b00f47d686eb78f8fb3
key_schedule_context: 029bd09219212a8cf27c6bb5d54998c5240793a70ca0a8
92234bd5e082bc619b6a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
355e7ef17f438db43152b7fb45a0e2f49a8bf8956d5dddfec1758c0f0eb1b5d5
key:
base_nonce:
exporter_secret:
276d87e5cb0655c7d3dad95e76e6fc02746739eb9d968955ccf8a6346c97509e
]]></artwork>
          <section anchor="exported-values-26">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
83c1bac00a45ed4cb6bd8a6007d2ce4ec501f55e485c5642bd01bf6b6d7d6f0a

exporter_context: 00
L: 32
exported_value:
08a1d1ad2af3ef5bc40232a64f920650eb9b1034fac3892f729f7949621bf06e

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
ff3b0e37a9954247fea53f251b799e2edd35aac7152c5795751a3da424feca73
]]></artwork>
          </section>
        </section>
        <section anchor="authpsk-setup-information-6">
          <name>AuthPSK Setup Information</name>
          <artwork><![CDATA[
mode: 3
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
94efae91e96811a3a49fd1b20eb0344d68ead6ac01922c2360779aa172487f40
pkEm:
81cbf4bd7eee97dd0b600252a1c964ea186846252abb340be47087cc78f3d87c
skEm:
a2b43f5c67d0d560ee04de0122c765ea5165e328410844db97f74595761bbb81
ikmR:
4dfde6fadfe5cb50fced4034e84e6d3a104aa4bf2971360032c1c0580e286663
pkRm:
f47cd9d6993d2e2234eb122b425accfb486ee80f89607b087094e9f413253c2d
skRm:
c4962a7f97d773a47bdf40db4b01dc6a56797c9e0deaab45f4ea3aa9b1d72904
ikmS:
26c12fef8d71d13bbbf08ce8157a283d5e67ecf0f345366b0e90341911110f1b
pkSm:
29a5bf3867a6128bbdf8e070abe7fe70ca5e07b629eba5819af73810ee20112f
skSm:
6175b2830c5743dff5b7568a7e20edb1fe477fb0487ca21d6433365be90234d0
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
81cbf4bd7eee97dd0b600252a1c964ea186846252abb340be47087cc78f3d87c
shared_secret:
d69246bcd767e579b1eec80956d7e7dfbd2902dad920556f0de69bd54054a2d1
key_schedule_context: 03446fb1fe2632a0a338f0a85ed1f3a0ac475bdea2cd72
f8c713b3a46ee737379a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
c15c5bec374f2087c241d3533c6ec48e1c60a21dd00085619b2ffdd84a7918c3
key:
base_nonce:
exporter_secret:
695b1faa479c0e0518b6414c3b46e8ef5caea04c0a192246843765ae6a8a78e0
]]></artwork>
          <section anchor="exported-values-27">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
dafd8beb94c5802535c22ff4c1af8946c98df2c417e187c6ccafe45335810b58

exporter_context: 00
L: 32
exported_value:
7346bb0b56caf457bcc1aa63c1b97d9834644bdacac8f72dbbe3463e4e46b0dd

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
84f3466bd5a03bde6444324e63d7560e7ac790da4e5bbab01e7c4d575728c34a
]]></artwork>
          </section>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
