Open jakubkoci opened 3 days ago
In case it helps, my (very own) interpretation is as depicted in this diagram:
You can also have a look at existing implementations. I am familiar with these two in python:
Thanks @carez
I found that DIDComm spec mentions 2.3 Key Derivation for ECDH-1PU Key Agreement for ECDH-1PU and that actually mentions tag
exactly as your diagram depicts.
But, there is no mention of tag
in the spec for ECDH-ES I found 4.6 Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES)
So, maybe it's just an incorrect copy-paste of the sentence from ECDH-1PU to ECDH-ES.
I also found a mention of the tag
in Authenticated encryption part of Understanding JSON Web Encryption (JWE).
I don't understand how to use a
tag
in key derivation/wrapping algorithm as described in sections:There is a mention
"As per this requirement, the JWE building must first encrypt the payload, then use the resulting
tag
as part of the key derivation process when wrapping thecek
."But I don't see any information on how that tag should be used in derivation of
kek
or wrapping ofcek
withkek
. Am I missing something?