Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invariants on kdf_extract are too strict #62

Open
TWal opened this issue Sep 18, 2024 · 0 comments
Open

Invariants on kdf_extract are too strict #62

TWal opened this issue Sep 18, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@TWal
Copy link
Collaborator

TWal commented Sep 18, 2024

Currently, we require that salt has usage KdfExtractSaltKey or ikm has usage KdfExtractIkmKey. This is too strict and would prevent proving reasonable protocols, such as X3DH which is concatenating 3 or 4 DH shared secrets in ikm and salt is all-zeros, or HPKE which uses kdf_extract as a hash function (hence neither of the inputs are cryptographic keys). For this reason, the current HPKE proof in DY* in not spec-compliant because these kdf_extract have been omitted.

@TWal TWal added the bug Something isn't working label Sep 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant