Skip to content

Commit

Permalink
Merge pull request #35 from ietf-rats-wg/iesg-pw
Browse files Browse the repository at this point in the history
Elaborate on Section 3.2 of RFC 8725 (BCP225)...
  • Loading branch information
cabo authored Oct 18, 2024
2 parents befe1f3 + c7354c9 commit b8883ef
Showing 1 changed file with 10 additions and 1 deletion.
11 changes: 10 additions & 1 deletion draft-ietf-rats-uccs.md
Original file line number Diff line number Diff line change
Expand Up @@ -216,6 +216,15 @@ the "none" algorithm can be perfectly acceptable.
The security considerations discussed, e.g., in {{Sections 2.1, 3.1,
and 3.2 of RFC8725@-jwtbcp}} apply in an analogous way to the use of UCCS as
elaborated on in this document.
In particular, the need to "Use Appropriate Algorithms" ({{Section 3.2
of RFC8725@-jwtbcp}}) includes choosing appropriate cryptographic
algorithms for setting up and protecting the Secure Channel.
For instance, their cryptographic strength should be at least as
strong as any cryptographic keys the Secure Channel will be used for
to protect in transport.
{{tab-algsec}} in {{algsec}} provides references to some more security
considerations for specific cryptography choices that are discussed in
the COSE initial algorithms specification {{-cose-new-algs}}.

Secure Channels are often set up in a handshake protocol that mutually
derives a session key, where the handshake protocol establishes the
Expand Down Expand Up @@ -499,7 +508,7 @@ factors such as:
* Ensuring that appropriate protections are in place to address potential
traffic analysis attacks.

## Algorithm-specific Security Considerations
## Algorithm-specific Security Considerations {#algsec}

{{tab-algsec}} provides references to some security considerations of
specific cryptography choices that are discussed in {{-cose-new-algs}}.
Expand Down

0 comments on commit b8883ef

Please sign in to comment.