<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ochkas-cose-ascon-00" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Ascon-AEAD128 for JOSE and COSE</title>

    <author initials="D." surname="Ochkas" fullname="Dmytro Ochkas">
      <organization>IMT Atlantique</organization>
      <address>
        <email>dmytro.ochkas@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="H." surname="Le Bouder" fullname="Hélène Le Bouder">
      <organization>IMT Atlantique</organization>
      <address>
        <email>helene.le-bouder@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization>IMT Atlantique</organization>
      <address>
        <email>alexander.pelov@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2025" month="January" day="08"/>

    <area>General</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 88?>

<t>This document describes JSON Object Signing and Encryption (JOSE) and
CBOR Object Signing and Encryption (COSE) serializations with Ascon which
received a lot of attention in the area of lightweight cryptography.</t>

<t>In 2019, as a part of CAESAR competition, Ascon-128 and Ascon-128a were
selected as the first choice for the lightweight authenticated encryption <xref target="asconv1.2-caesar"></xref>.
After, in 2023, National Institute of Standards and Technology (NIST) selected
Ascon family of cryptographic algorithms to be the standard for lightweight
cryptography <xref target="asconv1.2-nist"></xref>. This recognition make it particularly interesting to use Ascon with
COSE and JOSE structures.</t>

<t>This document does not define any new cryptography, only
serializations of existing cryptographic systems described in
<xref target="NIST.SP.800-232"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 105?>

<section anchor="intro"><name>Introduction</name>

<t>Constrained networks such as Internet of Things (IoT) networks most of the
time are characterized by the limited computational power and autonomy.
In this context, the choice of suitable cryptographic algorithms that provide
a robust security without consuming large amount of resources is essential.
As a winner of lightweight cryptography standardization process conducted by
NIST, Ascon family of cryptographic algorithms is a perfect candidate for
the described situation.</t>

<t>Ascon-Based Lightweight Cryptography Standards for Constrained Devices
<xref target="NIST.SP.800-232"/> introduces a suite of algorithms to provide Authenticated
Encryption with Associated Data (AEAD), a hash function, and two eXtendable
Output Functions (XOFs).</t>

<t>This document focuses on the AEAD part of Ascon standard. It enables the
usage of Ascon-AEAD128 with JOSE and COSE for the content encryption.</t>

</section>
<section anchor="need"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="algos"><name>Ascon algorithms</name>

<t>In the scope of this document, only the authenticated encryption Ascon
is allowed for. Ascon's encryption and decryption algorithms are parametrized
by the key length k, the rate r, and the internal round numbers a and b.
<xref target="NIST.SP.800-232"/> specifies the Ascon-AEAD128 algorithm with the following parameters:</t>

<texttable title="Ascon-AEAD128 parameters" anchor="asconaeadparams">
      <ttcol align='left'>Key Length, k</ttcol>
      <ttcol align='left'>Rate, r</ttcol>
      <ttcol align='left'>Outer permutation rounds, a</ttcol>
      <ttcol align='left'>Inner permutation rounds, b</ttcol>
      <c>128</c>
      <c>128</c>
      <c>12</c>
      <c>8</c>
</texttable>

<t>Thus, this document requests the registration of the Ascon-AEAD128 algorithm in <xref target="IANA.cose"/>:</t>

<texttable title="COSE Algorithms for Ascon" anchor="cosealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>alg</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>TBD (requested assignment XXX)</c>
      <c>CBOR Object Encryption Algorithm for Ascon-AEAD128</c>
</texttable>

<t>In COSE, keys may be obtained from either a key structure or a recipient structure <xref target="RFC9052"/>.</t>

<t>When using a COSE key for this algorithm, the following checks are made:</t>

<t><list style="symbols">
  <t>The "kty" field MUST be present, and it MUST be "Symmetric".</t>
  <t>If the "alg" field is present, it MUST match the Ascon-AEAD128 algorithm being used.</t>
  <t>If the "key_ops" field is present, it MUST include "encrypt" when encrypting.</t>
  <t>If the "key_ops" field is present, it MUST include "decrypt" when decrypting.</t>
</list></t>

<t>Also, this document requests the registration of the Ascon-AEAD128 algorithm in <xref target="IANA.jose"/>:</t>

<texttable title="JOSE Algorithms for Ascon" anchor="josealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>enc</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128</c>
      <c>JSON Object Encryption Algorithm for Ascon-AEAD128</c>
</texttable>

<t>Implementations that are encrypting or decrypting MUST validate that the key type, key length,
and algorithm are correct and appropriate for the entities involved.</t>

</section>
<section anchor="iv"><name>IV Header Parameter</name>

<t>Unlike some common AEAD algorithms, Ascon distinguishes between the notion
of initialization vector (IV) and nonce (N). While N is the input argument
for the Ascon encryption/decryption functions, IV is the constant defined
for each Ascon algorithm and is based on its parameters.</t>

<t>However, <xref target="IANA.cose"/> does not define a separate header parameter to specify Nonce.
Thus, in COSE, whenever Full Initialization Vector Header Parameter (Name: IV,
Label: 5) or Partial Initialization Vector Header Parameter (Name: Partial IV, Label: 6) is
specified it MUST refer to the N argument of the corresponding Ascon function.</t>

<t>On the other hand, JSON Web Signature and Encryption Header Parameters registry
at <xref target="IANA.jose"/> defines both Nonce Header Parameter ("nonce") and Initialization
Vector Header Parameter ("iv"). That is, in JOSE, both "nonce" and "iv"
parameters MUST refer to the N argument of the corresponding Ascon function.
There SHOULD NOT be "nonce" and "iv" parameters specified at the same time.
In case, "nonce" and "iv" parameters are specified simultaneously, Nonce Header
Parameter MUST take precedence.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The security considerations for <xref target="RFC7516"/>, <xref target="RFC7517"/> and <xref target="RFC9053"/> apply to
this specification as well.</t>

<t>According to the most recent security analysis publications, Ascon did not show any
security vulnerabilities so far and the best attacks target the initialization of Ascon
reduced to 7 (out of 12) rounds, concluding that Ascon has a security margin of 5 rounds
(42 % of the 12 rounds).</t>

<t>Refer to the Ascon's List of Published Analysis section at <xref target="asconv1.2-nist"></xref> for more details.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to add the following entries to the COSE Algorithms
Registry. The following completed registration templates are
provided as described in <xref target="RFC9052"/> and <xref target="RFC9053"/>.</t>

<section anchor="ascon-aead128-for-cose"><name>Ascon-AEAD128 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128</t>
  <t>Value: TBD (requested assignment 35)</t>
  <t>Description: CBOR Object Encryption Algorithm with Ascon-AEAD128</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: FIPS XXX</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
</section>
<section anchor="new-jose-algorithms"><name>New JOSE Algorithms</name>

<t>IANA is requested to add the following entries to the JSON Web
Signature and Encryption Algorithms Registry. The following
completed registration templates are provided as described in
<xref target="RFC7518"/>.</t>

<section anchor="ascon-aead128-for-jose"><name>Ascon-AEAD128 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128</t>
  <t>Algorithm Description: Ascon-AEAD128 as described in FIPS XXX.</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): FIPS XXX</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>

<reference anchor="RFC7518">
  <front>
    <title>JSON Web Algorithms (JWA)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7518"/>
  <seriesInfo name="DOI" value="10.17487/RFC7518"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
  <front>
    <title>JSON Object Signing and Encryption (JOSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="asconv1.2-caesar" target="https://competitions.cr.yp.to/round3/asconv12.pdf">
  <front>
    <title>Ascon v1.2, Submission to Round 3 of the CAESAR competition</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="asconv1.2-nist" target="https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf">
  <front>
    <title>Ascon v1.2, Submission to Final Round of the NIST Lightweight Cryptography project</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NIST.SP.800-232" target="https://doi.org/10.6028/NIST.SP.800-232.ipd">
  <front>
    <title>Ascon-Based Lightweight Cryptography Standards for Constrained Devices</title>
    <author initials="M. S." surname="Turan" fullname="Meltem Sönmez Turan">
      <organization></organization>
    </author>
    <author initials="K. A." surname="McKay" fullname="Kerry A. McKay">
      <organization></organization>
    </author>
    <author initials="J." surname="Kang" fullname="Jinkeon Kang">
      <organization></organization>
    </author>
    <author initials="J." surname="Kelsey" fullname="John Kelsey">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/NIST.SP.800-232"/>
</reference>


    </references>

</references>


<?line 262?>

<section anchor="xmp"><name>Examples</name>

<t>This appendix provides some examples of various Ascon-AEAD128 Encryptions with COSE and JOSE</t>

<section anchor="cose"><name>COSE</name>

<section anchor="simple-ascon-aead128-encryption"><name>Simple Ascon-AEAD128 Encryption</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "AAD": "8367456E637279707443A1010140",
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "Encrypt0": "d08344a1011823a1055000000000000000000000000000000000582436ba4da1fa787205e5fff06fd4b645c637c02b505046fb242984864e1f6875c4ae5c9557",
  "Encrypt0_diag": "16([h'A1011823', {5: h'00000000000000000000000000000000'}, h'36BA4DA1FA787205E5FFF06FD4B645C637C02B505046FB242984864E1F6875C4AE5C9557'])"  
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-hkdf-sha-256"><name>Direct Ascon-AEAD128 Encryption with HKDF-SHA-256</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "AAD": "8367456E637279707443A1010140",
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "6F75722D736563726574",
    "kty": "Symmetric"
  },
  "salt": "61616262636364646565666667676868",
  "Encrypt": "d8608444a1011823a105500000000000000000000000000000000058247b09f4de6d93b6779163d978efa2d7eaac699acad60a6a9779168b5569d57ef92d3102bf818343a10129a2044a6f75722d73656372657433506161626263636464656566666767686840",
  "Encrypt_diag": "96([h'A1011823', {5: h'00000000000000000000000000000000'}, h'7B09F4DE6D93B6779163D978EFA2D7EAAC699ACAD60A6A9779168B5569D57EF92D3102BF', [[h'A10129', {4: h'6F75722D736563726574', -20: h'61616262636364646565666667676868'}, h'']]])"
}
]]></artwork></figure>

</section>
</section>
<section anchor="jose"><name>JOSE</name>

<section anchor="direct-compact-jwe-structure-using-ascon-aead128"><name>Direct Compact JWE structure using Ascon-AEAD128</name>

<figure><artwork><![CDATA[
{
  "plaintext": "546869732069732074686520636f6e74656e742e",
  "nonce": "00000000000000000000000000000000",
  "protected": {
    "alg":"dir",
    "enc":"Ascon-AEAD128"
  },
  "CEK": "849B57219DAE48DE646D07DBB533566E",
  "jwe": "eyJhbGciOiJkaXIiLCJlbmMiOiJBc2Nvbi1BRUFEMTI4In0..AAAAAAAAAAAAAAAAAAAAAA.XjkRZmV9Dy0lpQp_4yUYIY1CGN8.zUqKLKMQnqjXFY258aNMgw"
}


]]></artwork></figure>

<t>TODO:</t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

