@techreport{ietf-core-oscore-key-limits-03, number = {draft-ietf-core-oscore-key-limits-03}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-core-oscore-key-limits/03/}, author = {Rikard Höglund and Marco Tiloca}, title = {{Key Usage Limits for OSCORE}}, pagetotal = 14, year = 2024, month = jul, day = 8, abstract = {Object Security for Constrained RESTful Environments (OSCORE) uses AEAD algorithms to ensure confidentiality and integrity of exchanged messages. Due to known issues allowing forgery attacks against AEAD algorithms, limits should be followed on the number of times a specific key is used for encryption or decryption. Among other reasons, approaching key usage limits requires updating the OSCORE keying material before communications can securely continue. This document defines how two OSCORE peers can follow these key usage limits and what steps they should take to preserve the security of their communications.}, }