Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating Traffic Secrets #92

Open
tireddy2 opened this issue Feb 6, 2024 · 0 comments
Open

Updating Traffic Secrets #92

tireddy2 opened this issue Feb 6, 2024 · 0 comments

Comments

@tireddy2
Copy link
Collaborator

tireddy2 commented Feb 6, 2024

The derivation of application_traffic_secret_N+1 looks complicated to me. I don't see a need to use SealBase and OpenBase.

We could use HPKE encap and decap functions to solve the problem. The secret from the encap function can be used as input to the HKDF-Expand-Label to derive application_traffic_secret_N+1.

a) The server generates pkR and skR
b) The client will receive pkR from the server.
c) Client uses Encap
shared_secret, enc = Encap(pkR)
d) Client sends enc to server
e) The server uses Decap
shared_secret = Decap(enc, skR)

application_traffic_secret_N+1 =
HKDF-Expand-Label(shared_secret,
"traffic up2", application_traffic_secret_N, Hash.length)

The proposed approach in future will also be compatible with PQC KEM.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant