You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, we require that salt has usage KdfExtractSaltKey or ikm has usage KdfExtractIkmKey. This is too strict and would prevent proving reasonable protocols, such as X3DH which is concatenating 3 or 4 DH shared secrets in ikm and salt is all-zeros, or HPKE which uses kdf_extract as a hash function (hence neither of the inputs are cryptographic keys). For this reason, the current HPKE proof in DY* in not spec-compliant because these kdf_extract have been omitted.
The text was updated successfully, but these errors were encountered:
Currently, we require that salt has usage
KdfExtractSaltKey
or ikm has usageKdfExtractIkmKey
. This is too strict and would prevent proving reasonable protocols, such as X3DH which is concatenating 3 or 4 DH shared secrets in ikm and salt is all-zeros, or HPKE which useskdf_extract
as a hash function (hence neither of the inputs are cryptographic keys). For this reason, the current HPKE proof in DY* in not spec-compliant because thesekdf_extract
have been omitted.The text was updated successfully, but these errors were encountered: