Identity Module for TLS Version 1.3
draft-urien-tls-im-04

Document Type Active Internet-Draft (individual)
Author Pascal Urien 
Last updated 2021-01-16
Stream (None)
Intended RFC status (None)
Formats plain text pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
TLS Working Group                                            P. Urien 
  Internet Draft                                          Telecom Paris 
  Intended status: Experimental                                         
                                                                        
                                                        January 16 2021 
  Expires: June 2021 
 
                    Identity Module for TLS Version 1.3 
                         draft-urien-tls-im-04.txt 
    
    
Abstract 
    
   TLS 1.3 will be deployed in the Internet of Things ecosystem. In 
   many IoT frameworks, TLS or DTLS protocols, based on pre-shared key 
   (PSK), are used for device authentication. So PSK tamper resistance, 
   is a critical market request, in order to prevent hijacking issues. 
   If DH exchange is used with certificate bound to DH ephemeral public 
   key, there is also a benefit to protect its signature procedure. The 
   TLS identity module (im) MAY be based on secure element; it realizes 
   some HKDF operations bound to PSK, and cryptographic signature if 
   certificates are used. Secure Element form factor could be 
   standalone chip, or embedded in SoC like eSIM. 
    
Requirements Language 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC 2119. 
    
Status of this Memo 
    
   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF). Note that other groups may also distribute 
   working documents as Internet-Drafts. The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/. 
    
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents 
   at any time. It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   This Internet-Draft will expire on June 2021. 
    
   . 

   Urien                       Expires June 2021            [Page 1] 


Copyright Notice 
    
   Copyright (c) 2021 IETF Trust and the persons identified as the 
   document authors. All rights reserved. 
    
   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (http://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document. Please review these documents 
   carefully, as they describe your rights and restrictions with 
   respect to this document. Code Components extracted from this 
   document must include Simplified BSD License text as described in 
   Section 4.e of the Trust Legal Provisions and are provided without 
   warranty as described in the Simplified BSD License. 
    
    

   Urien                      Expires June 2021            [page 2] 

 
                 Identity Module for TLS Version 1.3    January 2021 
 
Table of Contents 
   Abstract........................................................... 1 
   Requirements Language.............................................. 1 
   Status of this Memo................................................ 1 
   Copyright Notice................................................... 2 
   1 Overview......................................................... 5 
   2 Protecting the Key Schedule for PSK.............................. 5 
      2.1 Context..................................................... 5 
      2.2 Identity Module Procedures.................................. 6 
      2.3 KSGS: Keys Secure Generation and Storage.................... 6 
      2.4 Identity Module Key Procedures (IMKP)....................... 6 
          2.4.1 CETS: Client Early Traffic Secret .................... 6 
          2.4.2 EEMS: Early Exporter Master Secret ................... 7 
          2.4.3 HEDSK: HKDF-Extract from Derived Secret Key .......... 7 
          2.4.4 HBSK: HMAC from Binder Key Secret .................... 7 
   3. Asymmetric Signature............................................ 7 
      3.1 GENKEY...................................................... 8 
      3.2 GETPUB...................................................... 8 
      3.3 SIGN........................................................ 8 
   4 Optional Procedures.............................................. 8 
      4.1 GENDHE...................................................... 8 
      4.2 GETEPK...................................................... 8 
      4.3 RAND........................................................ 8 
   5 Identity Module Procedures Summary............................... 9 
Show full document text