<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ochkas-cose-ascon-02" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Ascon-AEAD128 for COSE and JOSE</title>

    <author initials="D." surname="Ochkas" fullname="Dmytro Ochkas">
      <organization>IMT Atlantique</organization>
      <address>
        <email>dmytro.ochkas@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="H." surname="Le Bouder" fullname="Hélène Le Bouder">
      <organization>IMT Atlantique</organization>
      <address>
        <email>helene.le-bouder@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization>IMT Atlantique</organization>
      <address>
        <email>alexander.pelov@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2025" month="September" day="09"/>

    <area>General</area>
    <workgroup>COSE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 88?>

<t>This document describes CBOR Object Signing and Encryption (COSE) and 
JSON Object Signing and Encryption (JOSE) serializations with Ascon which
is a NIST standard for lightweight cryptography.</t>

<t>In 2019, as a part of CAESAR competition, Ascon-128 and Ascon-128a were
selected as the first choice for the lightweight authenticated encryption <xref target="asconv1.2-caesar"/>.
After, in 2023, National Institute of Standards and Technology (NIST) selected
Ascon family of cryptographic algorithms to be the standard for lightweight
cryptography <xref target="asconv1.2-nist"/>. In August 2025, NIST Special Publication 800-232 was released,
defining Ascon-based lightweight cryptography standards for constrained
devices <xref target="NIST.SP.800-232"/>. This recognition makes it particularly interesting
to use Ascon with COSE and JOSE structures.</t>

<t>This document does not define any new cryptography, only
serializations of existing cryptographic systems described in
<xref target="NIST.SP.800-232"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 107?>

<section anchor="intro"><name>Introduction</name>

<t>Constrained networks such as Internet of Things (IoT) networks most of the
time are characterized by the limited computational power and autonomy.
In this context, the choice of suitable cryptographic algorithms that provide 
robust security without consuming large amount of resources is essential.
As a winner of the lightweight cryptography standardization process conducted by
NIST, Ascon family of cryptographic algorithms is a perfect candidate for
the described situation.</t>

<t>Ascon-Based Lightweight Cryptography Standards for Constrained Devices
<xref target="NIST.SP.800-232"/> introduces a suite of algorithms consisting of Authenticated
Encryption with Associated Data (AEAD), a hash function, and two eXtendable
Output Functions (XOFs).</t>

<t>This document focuses on the AEAD part of Ascon standard. It enables the
usage of Ascon-AEAD128 with COSE and JOSE for content encryption.</t>

</section>
<section anchor="need"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="algos"><name>Ascon algorithms</name>

<t>In the scope of this document, only the authenticated encryption scheme of the Ascon
family is allowed for, namely Ascon-AEAD128. Ascon-AEAD128.enc and Ascon-AEAD128.dec
algorithms are parametrized by the key size k, the nonce size n, the tag size t, the rate r, and the internal round numbers a and b.
<xref target="NIST.SP.800-232"/> specifies the Ascon-AEAD128 algorithm with the following parameters:</t>

<texttable title="Ascon-AEAD128 parameters" anchor="asconaeadparams">
      <ttcol align='left'>Key size, k</ttcol>
      <ttcol align='left'>Nonce size, n</ttcol>
      <ttcol align='left'>Tag size, t</ttcol>
      <ttcol align='left'>Rate, r</ttcol>
      <ttcol align='left'>Outer permutation rounds, a</ttcol>
      <ttcol align='left'>Inner permutation rounds, b</ttcol>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>12</c>
      <c>8</c>
</texttable>

<t>In addition, <xref target="NIST.SP.800-232"/> allows the tag truncation. The standard permits tag sizes λ, where 32 &lt;= λ &lt;= 128 bits.
Tags of less than 64 bits SHALL only be selected after a careful risk analysis.</t>

<t>Since COSE can be used in different scenarios, this document requests to register three variations of Ascon-AEAD128 in <xref target="IANA.cose"/> with
common tag sizes of 32, 64, and 128 bits (see <xref target="cosealgos"/>). Using the 32-bit variation is discouraged for typical scenarios and SHOULD be introduced only in extremely constrained use cases with justified security.</t>

<texttable title="COSE Algorithms for Ascon" anchor="cosealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>alg</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>TBD (requested assignment 35)</c>
      <c>Ascon-AEAD128 with 128-bit tag as the CBOR Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/64</c>
      <c>TBD (requested assignment 36)</c>
      <c>Ascon-AEAD128 with 64-bit tag as the CBOR Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/32</c>
      <c>TBD (requested assignment 37)</c>
      <c>Ascon-AEAD128 with 32-bit tag as the CBOR Object Encryption Algorithm</c>
</texttable>

<t>In COSE, keys may be obtained from either a key structure or a recipient structure <xref target="RFC9052"/>.</t>

<t>When using a COSE key for this algorithm, the following checks are made:</t>

<t><list style="symbols">
  <t>The "kty" field MUST be present, and it MUST be "Symmetric".</t>
  <t>If the "alg" field is present, it MUST match the variation of Ascon-AEAD128 algorithm being used.</t>
  <t>If the "key_ops" field is present, it MUST include "encrypt" when encrypting.</t>
  <t>If the "key_ops" field is present, it MUST include "decrypt" when decrypting.</t>
</list></t>

<t>COSE encryption and decryption with Ascon-AEAD128 is done in accordance with Section 5.3 of <xref target="RFC9052"/>.</t>

<t>Also, this document requests the registration of the Ascon-AEAD128 algorithms in <xref target="IANA.jose"/> with 64-, and 128-bit tags (see <xref target="josealgos"/>). Unlike COSE, there is no 32-bit tag variation since JSON Web Encryption (JWE) structure is not intended to be used in extremely constrained scenarios.</t>

<texttable title="JOSE Algorithms for Ascon" anchor="josealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>enc</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128 with 128-bit tag as the JSON Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/64</c>
      <c>Ascon-AEAD128/64</c>
      <c>Ascon-AEAD128 with 64-bit tag as the JSON Object Encryption Algorithm</c>
</texttable>

<t>JOSE encryption and decryption processes with Ascon-AEAD128 should follow Section 5 of <xref target="RFC7516"/>.</t>

<t>Implementations that are encrypting or decrypting MUST validate that the key type, key length,
and algorithm are correct and appropriate for the entities involved.</t>

</section>
<section anchor="iv"><name>IV Header Parameter</name>

<t>Unlike some common AEAD algorithms, Ascon distinguishes between the notion
of initialization vector (IV) and nonce (N). While N is the input argument
for the Ascon-AEAD128 encryption/decryption functions, IV is the constant defined
for each Ascon algorithm used as a part of state initialization.</t>

<t>However, <xref target="IANA.cose"/> does not define a separate header parameter to specify Nonce.
Thus, in COSE, whenever Full Initialization Vector Header Parameter (Name: IV,
Label: 5) or Partial Initialization Vector Header Parameter (Name: Partial IV, Label: 6) is
specified it SHALL refer to the N argument of the corresponding Ascon function.</t>

<t>On the other hand, JSON Web Signature and Encryption Header Parameters registry
at <xref target="IANA.jose"/> defines both Nonce Header Parameter ("nonce") and Initialization
Vector Header Parameter ("iv"). However, the "nonce" parameter is intended to be used
only with signatures. Therefore, in JOSE, "iv" parameters SHALL refer to the N argument
of the corresponding Ascon function. There SHOULD NOT be "nonce" parameters specified
while using Ascon for content encryption. In case "nonce" parameter is specified it MUST be ignored.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The security considerations for <xref target="NIST.SP.800-232"/>, <xref target="RFC7516"/>, <xref target="RFC7517"/> and <xref target="RFC9052"/> apply to
this specification as well.</t>

<t>According to the most recent security analysis publications, Ascon did not show any
security vulnerabilities so far and the best attacks target the initialization of Ascon
reduced to 7 (out of 12) rounds, concluding that Ascon has a security margin of 5 rounds
(42 % of the 12 rounds). More details are available at List of Published Analysis section of <xref target="asconv1.2-nist"/>.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to add the following entries to the COSE Algorithms
Registry. The following completed registration templates are
provided as described in <xref target="RFC9053"/>. The "Recommended" field
for Ascon-AEAD128/32 is set to "Filter Only" to discourage unreflected usage.</t>

<section anchor="ascon-aead128-for-cose"><name>Ascon-AEAD128 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128</t>
  <t>Value: TBD (requested assignment 35)</t>
  <t>Description: Ascon-AEAD128 with 128-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ascon-aead12864-for-cose"><name>Ascon-AEAD128/64 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128/64</t>
  <t>Value: TBD (requested assignment 36)</t>
  <t>Description: Ascon-AEAD128 with 64-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ascon-aead12832-for-cose"><name>Ascon-AEAD128/32 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128/32</t>
  <t>Value: TBD (requested assignment 37)</t>
  <t>Description: Ascon-AEAD128 with 32-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Filter Only</t>
</list></t>

</section>
</section>
<section anchor="new-jose-algorithms"><name>New JOSE Algorithms</name>

<t>IANA is requested to add the following entries to the JSON Web
Signature and Encryption Algorithms Registry. The following
completed registration templates are provided as described in
<xref target="RFC7518"/>.</t>

<section anchor="ascon-aead128-for-jose"><name>Ascon-AEAD128 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128</t>
  <t>Algorithm Description: Ascon-AEAD128 with 128-bit tag</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): NIST SP 800-232</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
<section anchor="ascon-aead12864-for-jose"><name>Ascon-AEAD128/64 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128/64</t>
  <t>Algorithm Description: Ascon-AEAD128 with 64-bit tag</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): NIST SP 800-232</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>

<reference anchor="RFC7518">
  <front>
    <title>JSON Web Algorithms (JWA)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7518"/>
  <seriesInfo name="DOI" value="10.17487/RFC7518"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
  <front>
    <title>JSON Object Signing and Encryption (JOSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="asconv1.2-caesar" target="https://competitions.cr.yp.to/round3/asconv12.pdf">
  <front>
    <title>Ascon v1.2, Submission to Round 3 of the CAESAR competition</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="asconv1.2-nist" target="https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf">
  <front>
    <title>Ascon v1.2, Submission to Final Round of the NIST Lightweight Cryptography project</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NIST.SP.800-232" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-232.pdf">
  <front>
    <title>Ascon-Based Lightweight Cryptography Standards for Constrained Devices</title>
    <author initials="M. S." surname="Turan" fullname="Meltem Sönmez Turan">
      <organization></organization>
    </author>
    <author initials="K. A." surname="McKay" fullname="Kerry A. McKay">
      <organization></organization>
    </author>
    <author initials="J." surname="Kang" fullname="Jinkeon Kang">
      <organization></organization>
    </author>
    <author initials="J." surname="Kelsey" fullname="John Kelsey">
      <organization></organization>
    </author>
    <date year="2025" month="August"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/NIST.SP.800-232"/>
</reference>


    </references>

</references>


<?line 315?>

<section anchor="xmp"><name>Examples</name>

<t>This appendix provides some examples of various Ascon-AEAD128 Encryptions with COSE and JOSE</t>

<section anchor="cose"><name>COSE</name>

<section anchor="simple-ascon-aead128-encryption"><name>Simple Ascon-AEAD128 encryption</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "Encrypt0_hex": "8344A1011823A1055000000000000000000000000000000000582461484F95FC36BD13D7EFCA1C370EE3B6A1125770C8878467D3AE466C7C6CC4F4918BAA96",
  "Encrypt0_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'61484F95FC36BD13D7EFCA1C370EE3B6A1125770C8878467D3AE466C7C6CC4F4918BAA96']"  
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-recipient"><name>Direct Ascon-AEAD128 encryption with recipient</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "abcdef",
    "kty": "Symmetric"
  },
  "Encrypt": "8444A1011823A10550000000000000000000000000000000005824D3468D9110A2C3005E82D48628CD462BBD8721FBABE883A7743F191AC81CA8D6BBED5E44818340A20125044661626364656640",
  "Encrypt_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'D3468D9110A2C3005E82D48628CD462BBD8721FBABE883A7743F191AC81CA8D6BBED5E44', [[h'', {1: -6, 4: h'616263646566'}, h'']]]"
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-hkdf-sha-256"><name>Direct Ascon-AEAD128 encryption with HKDF-SHA-256</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "abcdef",
    "kty": "Symmetric"
  },
  "salt": "abcdefghijlmnopq",
  "Encrypt": "8444A1011823A10550000000000000000000000000000000005824B80EA16F0EBCC9F25502EE1D992D23C4E7984E2919AD6C3E37581FB099DB5855F1490ECF818340A3012933506162636465666768696A6C6D6E6F7071044661626364656640",
  "Encrypt_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'B80EA16F0EBCC9F25502EE1D992D23C4E7984E2919AD6C3E37581FB099DB5855F1490ECF', [[h'', {1: -10, -20: h'6162636465666768696A6C6D6E6F7071', 4: h'616263646566'}, h'']]]"
}
]]></artwork></figure>

</section>
</section>
<section anchor="jose"><name>JOSE</name>

<t>The examples use the following plaintext and cek:</t>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E"
}
]]></artwork></figure>

<section anchor="jwe-structure-with-direct-ascon-aead128-encryption"><name>JWE structure with direct Ascon-AEAD128 encryption</name>

<figure><artwork><![CDATA[
{
  "protected": "eyJhbGciOiJkaXIiLCJlbmMiOiJBc2Nvbi1BRUFEMTI4In0", \* {"alg": "dir", "enc": "Ascon-AEAD128"} *\
  "aad": "g2dFbmNyeXB0Q6EBAUE",
  "encrypted_key": "",
  "iv": "AAAAAAAAAAAAAAAAAAAAAA",
  "tag": "EihrljYH6xrt08Ae9Slqzw",
  "ciphertext": "dMbnoonoAEUph2N4KWIj_i_L-oo"
}
]]></artwork></figure>

</section>
<section anchor="jwe-structure-with-ascon-aead128-encryption-and-aes-128-key-wrap"><name>JWE structure with Ascon-AEAD128 encryption and AES-128 Key Wrap</name>

<figure><artwork><![CDATA[
{
  "protected": "eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBc2Nvbi1BRUFEMTI4Iiwia2lkIjoiYWJjZGVmIn0", \* {"alg":"A128KW","enc":"Ascon-AEAD128","kid":"abcdef"} *\
  "aad": "g2dFbmNyeXB0Q6EBAUE",
  "header": {
    "alg": "A128KW",
    "kid": "abcdef"
  },
  "encrypted_key": "V4d7CMPzWA3ntHiL4gcN5EYoQJX2t-Gw",
  "iv": "AAAAAAAAAAAAAAAAAAAAAA",
  "tag": "9vY9jDG2LZOVmHsD6kHgkA",
  "ciphertext": "wZJfEzhC59fiqtnKtYpXqCi0-Xo"
}
]]></artwork></figure>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

