Skip to content

Commit

Permalink
Clarify disclosure path through payload hashes
Browse files Browse the repository at this point in the history
  • Loading branch information
cabo committed Jul 20, 2024
1 parent 00524ed commit f59de82
Showing 1 changed file with 12 additions and 1 deletion.
13 changes: 12 additions & 1 deletion draft-birkholz-cose-tsa-tst-header-parameter.md
Original file line number Diff line number Diff line change
Expand Up @@ -173,7 +173,18 @@ As part of the signature verification, the receiver MUST make sure that the mess

# Security Considerations

The security considerations made in {{-TSA}} as well as those of {{-countersign}} apply. In the Timestamp, then COSE (TTC) sequence of operation, the TSA is given an opaque identifier for the payload, but the content of the payload is not revealed.
The security considerations made in {{-TSA}} as well as those of {{-countersign}} apply.

In the "Timestamp, then COSE" (TTC) sequence of operation, the TSA is
given an opaque identifier (a cryptographic hash value) for the
payload.
While this means that the content of the payload is not directly
revealed, to prevent comparison with known payloads or disclosure of
identical payloads being used over time, the payload would need to be
armored, e.g., with a nonce that is shared with the recipient of the
header parameter but not the TSA.
Such a mechanism can be employed inside the ones described in this
specification, but is out of scope for this document.

# IANA Considerations

Expand Down

0 comments on commit f59de82

Please sign in to comment.