<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-hpke-hpke-03" category="std" consensus="true" obsoletes="9180" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="HPKE">Hybrid Public Key Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-hpke-03"/>
    <author initials="R." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthik Bhargavan">
      <organization>Inria</organization>
      <address>
        <email>karthikeyan.bhargavan@inria.fr</email>
      </address>
    </author>
    <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
      <organization>Inria</organization>
      <address>
        <email>ietf@benjaminlipp.de</email>
      </address>
    </author>
    <author initials="C." surname="Wood" fullname="Christopher A. Wood">
      <organization/>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <workgroup>HPKE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 234?>

<t>This document describes a scheme for hybrid public key encryption (HPKE).  This
scheme provides a variant of public key encryption of arbitrary-sized plaintexts
for a recipient public key. It also includes a variant that authenticates
possession of a pre-shared key. HPKE works for any combination of an
asymmetric Key Encapsulation Mechanism (KEM), key derivation function (KDF), and authenticated encryption
with additional data (AEAD) encryption function. We provide instantiations of
the scheme using widely used and efficient primitives, such as Elliptic Curve
Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF),
and SHA2.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hpkewg/hpke"/>.</t>
    </note>
  </front>
  <middle>
    <?line 246?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Encryption schemes that combine asymmetric and symmetric algorithms have been
specified and practiced since the early days of public key cryptography, e.g.,
<xref target="RFC1421"/>. Combining the two yields the key management advantages of asymmetric
cryptography and the performance benefits of symmetric cryptography. The traditional
combination has been "encrypt the symmetric key with the public key." "Hybrid"
public key encryption (HPKE) schemes, specified here, take a different approach:
"generate the symmetric key and its encapsulation with the public key."
Specifically, encrypted messages convey a shared secret encapsulated with a
public key scheme, along with one or more arbitrary-sized ciphertexts encrypted
using that key. This type of public key encryption has many applications in
practice, including Messaging Layer Security <xref target="RFC9420"/>, TLS Encrypted
ClientHello <xref target="I-D.ietf-tls-esni"/>, and Oblivious HTTP <xref target="RFC9458"/>.</t>
      <t>Currently, there are numerous competing and non-interoperable standards and
variants for hybrid encryption, mostly variants on the Elliptic Curve Integrated Encryption Scheme (ECIES), including ANSI X9.63
(ECIES) <xref target="ANSI"/>, IEEE 1363a <xref target="IEEE1363"/>, ISO/IEC 18033-2 <xref target="ISO"/>, and SECG SEC 1
<xref target="SECG"/>.  See <xref target="MAEA10"/> for a thorough comparison.  All these existing
schemes have problems, e.g., because they rely on outdated primitives, lack
proofs of indistinguishable (adaptive) chosen-ciphertext attack (IND-CCA2) security, or fail to provide test vectors.</t>
      <t>This document defines an HPKE scheme that provides a subset
of the functions provided by the collection of schemes above but
specified with sufficient clarity that they can be interoperably
implemented. The HPKE construction defined herein is secure against (adaptive)
chosen ciphertext attacks (IND-CCA2-secure) under classical assumptions about
the underlying primitives <xref target="HPKEAnalysis"/> <xref target="ABHKLR20"/>. A summary of
these analyses is in <xref target="sec-properties"/>.</t>
    </section>
    <section anchor="requirements-notation">
      <name>Requirements Notation</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="notation">
      <name>Notation</name>
      <t>The following terms are used throughout this document to describe the
operations, roles, and behaviors of HPKE:</t>
      <ul spacing="normal">
        <li>
          <t><tt>(skX, pkX)</tt>: A key encapsulation mechanism (KEM) key pair used in role X,
where X is one of S, R, or E as sender, recipient, and ephemeral, respectively;
<tt>skX</tt> is the private key and <tt>pkX</tt> is the public key.</t>
        </li>
        <li>
          <t><tt>pk(skX)</tt>: The KEM public key corresponding to the KEM private key <tt>skX</tt>.</t>
        </li>
        <li>
          <t>Sender (S): Role of entity that sends an encrypted message.</t>
        </li>
        <li>
          <t>Recipient (R): Role of entity that receives an encrypted message.</t>
        </li>
        <li>
          <t>Ephemeral (E): Role of a fresh random value meant for one-time use.</t>
        </li>
        <li>
          <t><tt>I2OSP(n, w)</tt>: Convert non-negative integer <tt>n</tt> to a <tt>w</tt>-length,
big-endian byte string, as described in <xref target="RFC8017"/>.</t>
        </li>
        <li>
          <t><tt>OS2IP(x)</tt>: Convert byte string <tt>x</tt> to a non-negative integer, as
described in <xref target="RFC8017"/>, assuming big-endian byte order.</t>
        </li>
        <li>
          <t><tt>concat(x0, ..., xN)</tt>: Concatenation of byte strings.
<tt>concat(0x01, 0x0203, 0x040506) = 0x010203040506</tt>.</t>
        </li>
        <li>
          <t><tt>lengthPrefixed(x)</tt>: The two-byte length of the byte string <tt>x</tt>, concatenated
with <tt>x</tt> itself.  (<tt>lengthPrefixed(x) = concat(I2OSP(len(x), 2), x)</tt>)  It is
an error to call this function with an <tt>x</tt> value that is more than 65535 bytes
long.</t>
        </li>
        <li>
          <t><tt>random(n)</tt>: A pseudorandom byte string of length <tt>n</tt> bytes</t>
        </li>
        <li>
          <t><tt>xor(a,b)</tt>: XOR of byte strings; <tt>xor(0xF0F0, 0x1234) = 0xE2C4</tt>.
It is an error to call this function with two arguments of unequal
length.</t>
        </li>
      </ul>
    </section>
    <section anchor="base-crypto">
      <name>Cryptographic Dependencies</name>
      <t>HPKE variants rely on the following primitives:</t>
      <ul spacing="normal">
        <li>
          <t>A Key Encapsulation Mechanism (KEM); see <xref target="crypto-kem"/></t>
        </li>
        <li>
          <t>A Key Derivation Function (KDF); see <xref target="crypto-kdf"/></t>
        </li>
        <li>
          <t>An Authenticated Encryption with Associated Data (AEAD); see <xref target="crypto-aead"/></t>
        </li>
      </ul>
      <t>A <em>ciphersuite</em> is a triple (KEM, KDF, AEAD) containing a choice of algorithm
for each primitive.</t>
      <t>A set of algorithm identifiers for concrete instantiations of these
primitives is provided in <xref target="ciphersuites"/>.  Algorithm identifier
values are two bytes long.</t>
      <section anchor="crypto-kem">
        <name>Key Encapsulation Mechanisms</name>
        <t>A key encapsulation mechanism (KEM) provides the following functions:</t>
        <dl>
          <dt><tt>GenerateKeyPair()</tt>:</dt>
          <dd>
            <t>Randomized algorithm to generate a key pair <tt>(skX, pkX)</tt>.</t>
          </dd>
          <dt><tt>DeriveKeyPair(ikm)</tt>:</dt>
          <dd>
            <t>Deterministic algorithm to derive a key pair <tt>(skX,
pkX)</tt> from the byte string <tt>ikm</tt>, where <tt>ikm</tt> is an arbitrary-length byte
string (within the bounds in <xref target="input-limits"/>).  The <tt>ikm</tt> input SHOULD have
at least <tt>Nsk</tt> bytes of entropy.</t>
          </dd>
          <dt><tt>SerializePublicKey(pkX)</tt>:</dt>
          <dd>
            <t>Produce a byte string of length <tt>Npk</tt> encoding the
public key <tt>pkX</tt>.</t>
          </dd>
          <dt><tt>DeserializePublicKey(pkXm)</tt>:</dt>
          <dd>
            <t>Parse a byte string of length <tt>Npk</tt> to recover a
public key. This function can raise a <tt>DeserializeError</tt> error upon <tt>pkXm</tt>
deserialization failure.</t>
          </dd>
          <dt><tt>Encap(pkR)</tt>:</dt>
          <dd>
            <t>Randomized algorithm to generate an ephemeral, fixed-length
shared secret and a fixed-length encapsulation of that secret (also known as
the KEM ciphertext) that can be decapsulated by the holder of the private
key corresponding to <tt>pkR</tt>. This function can raise an <tt>EncapError</tt> on
encapsulation failure.</t>
          </dd>
          <dt><tt>Decap(enc, skR)</tt>:</dt>
          <dd>
            <t>Deterministic algorithm using the private key <tt>skR</tt> to
recover the shared secret) from the encapsulated secret <tt>enc</tt>. This function
can raise a <tt>DecapError</tt> on decapsulation failure.</t>
          </dd>
        </dl>
        <t>The notation <tt>pk(skX)</tt>, depending on its use and the KEM and its
implementation, is either the
computation of the public key using the private key, or just syntax
expressing the retrieval of the public key, assuming it is stored along
with the private key object.</t>
        <t>Each KEM is parameterized by the following constants (all measured in bytes):</t>
        <dl spacing="compact">
          <dt><tt>Nsecret</tt>:</dt>
          <dd>
            <t>The length of a KEM shared secret produced by this KEM.</t>
          </dd>
          <dt><tt>Nenc</tt>:</dt>
          <dd>
            <t>The length of an encapsulated secret produced by this KEM.</t>
          </dd>
          <dt><tt>Npk</tt>:</dt>
          <dd>
            <t>The length of an encoded public key for this KEM.</t>
          </dd>
          <dt><tt>Nsk</tt>:</dt>
          <dd>
            <t>The length of an encoded private key for this KEM.</t>
          </dd>
        </dl>
        <t>Beyond the above, a KEM MAY also expose the following functions, whose behavior
is detailed in <xref target="serializeprivatekey"/>:</t>
        <dl>
          <dt><tt>SerializePrivateKey(skX)</tt>:</dt>
          <dd>
            <t>Produce a byte string of length <tt>Nsk</tt> encoding the private
key <tt>skX</tt>.</t>
          </dd>
          <dt><tt>DeserializePrivateKey(skXm)</tt>:</dt>
          <dd>
            <t>Parse a byte string of length <tt>Nsk</tt> to recover a
private key. This function can raise a <tt>DeserializeError</tt> error upon <tt>skXm</tt>
deserialization failure.</t>
          </dd>
        </dl>
        <t>Senders and recipients MUST validate KEM inputs and outputs as described
in <xref target="kem-ids"/>.</t>
      </section>
      <section anchor="crypto-kdf">
        <name>Key Derivation Functions</name>
        <t>A key derivation function (KDF) is either
a one-stage KDF, with a single <tt>Derive</tt> function,
or a two-stage KDF, with <tt>Extract</tt> and <tt>Expand</tt> functions.</t>
        <t>A one-stage KDF provides the function:</t>
        <dl>
          <dt><tt>Derive(ikm, L)</tt>:</dt>
          <dd>
            <t>Derive an <tt>L</tt>-byte value from the input keying material
<tt>ikm</tt>.</t>
          </dd>
        </dl>
        <t>A two-stage KDF provides the functions:</t>
        <dl>
          <dt><tt>Extract(salt, ikm)</tt>:</dt>
          <dd>
            <t>Extract a pseudorandom key of fixed length <tt>Nh</tt> bytes
from input keying material <tt>ikm</tt> and an optional byte string
<tt>salt</tt>.</t>
          </dd>
          <dt><tt>Expand(prk, info, L)</tt>:</dt>
          <dd>
            <t>Expand a pseudorandom key <tt>prk</tt> using
optional string <tt>info</tt> into <tt>L</tt> bytes of output keying material.</t>
          </dd>
        </dl>
        <t>The <tt>Nh</tt> parameter indicates security strength of KDF, in bytes.
For a two-stage KDF, <tt>Nh</tt> is the output size of the <tt>Extract()</tt> function.</t>
        <t>Certain functions have a different structure depending on whether a one-stage or
two-stage KDF is being used.  For clarity, such functions will be described
twice in this document, once with the suffix <tt>_OneStage</tt> and once with the
suffix <tt>_TwoStage</tt>, representing the versions of the function to be used with a
one-stage or two-stage KDF, respectively.  For example, the <tt>Foo</tt> function would
be invoked by calling <tt>Foo_OneStage</tt> when using a one-stage KDF, and by calling
<tt>Foo_TwoStage</tt> when using a two-stage KDF.</t>
      </section>
      <section anchor="crypto-aead">
        <name>AEAD Encryption Algorithm</name>
        <t>An AEAD encryption algorithm <xref target="RFC5116"/> provides the functions:</t>
        <dl>
          <dt><tt>Seal(key, nonce, aad, pt)</tt>:</dt>
          <dd>
            <t>Encrypt and authenticate plaintext
<tt>pt</tt> with associated data <tt>aad</tt> using symmetric key <tt>key</tt> and nonce
<tt>nonce</tt>, yielding ciphertext and tag <tt>ct</tt>. This function
 can raise a <tt>MessageLimitReachedError</tt> upon failure.</t>
          </dd>
          <dt><tt>Open(key, nonce, aad, ct)</tt>:</dt>
          <dd>
            <t>Decrypt ciphertext and tag <tt>ct</tt> using
associated data <tt>aad</tt> with symmetric key <tt>key</tt> and nonce <tt>nonce</tt>,
returning plaintext message <tt>pt</tt>. This function can raise an
<tt>OpenError</tt> or <tt>MessageLimitReachedError</tt> upon failure.</t>
          </dd>
        </dl>
        <t>AEAD functions have the following parameters (all measured in bytes):</t>
        <dl spacing="compact">
          <dt><tt>Nk</tt>:</dt>
          <dd>
            <t>The length a key for this algorithm.</t>
          </dd>
          <dt><tt>Nn</tt>:</dt>
          <dd>
            <t>The length of a nonce for this algorithm.</t>
          </dd>
          <dt><tt>Nt</tt>:</dt>
          <dd>
            <t>The length of the authentication tag for this algorithm.</t>
          </dd>
        </dl>
      </section>
      <section anchor="crypto-domain">
        <name>Labeled Derivation Functions</name>
        <t>The following functions are defined to facilitate domain separation of
KDF calls as well as context binding:</t>
        <artwork><![CDATA[
# For use with one-stage KDFs
def LabeledDerive(ikm, label, context, L):
  labeled_ikm = concat(
    ikm,
    "HPKE-v1",
    suite_id,
    lengthPrefixed(label),
    I2OSP(L, 2),
    context,
  )
  return Derive(labeled_ikm, L)
]]></artwork>
        <artwork><![CDATA[
# For use with two-stage KDFs
def LabeledExtract(salt, label, ikm):
  labeled_ikm = concat("HPKE-v1", suite_id, label, ikm)
  return Extract(salt, labeled_ikm)

def LabeledExpand(prk, label, info, L):
  labeled_info = concat(I2OSP(L, 2), "HPKE-v1", suite_id,
                        label, info)
  return Expand(prk, labeled_info, L)
]]></artwork>
        <t>The value of <tt>suite_id</tt> depends on where the KDF is used; it is assumed
implicit from the implementation and not passed as a parameter. If used
inside a KEM algorithm, <tt>suite_id</tt> MUST start with "KEM" and identify
this KEM algorithm; if used in the remainder of HPKE, it MUST start with
"HPKE" and identify the entire ciphersuite in use. See sections <xref target="dhkem"/>
and <xref target="encryption-context"/> for details.</t>
      </section>
      <section anchor="dhkem">
        <name>DH-Based KEM (DHKEM)</name>
        <t>Suppose we are given a KDF, and a Diffie-Hellman (DH) group providing the
following operations:</t>
        <dl>
          <dt><tt>DH(skX, pkY)</tt>:</dt>
          <dd>
            <t>Perform a non-interactive Diffie-Hellman exchange using
the private key <tt>skX</tt> and public key <tt>pkY</tt> to produce a Diffie-Hellman shared
secret of length <tt>Ndh</tt>. This function can raise a <tt>ValidationError</tt> as described
in <xref target="validation"/>.</t>
          </dd>
        </dl>
        <t>A DH-based KEM is parameterized by the constants (in bytes):</t>
        <dl spacing="compact">
          <dt><tt>Ndh</tt>:</dt>
          <dd>
            <t>The length of the shared secret produced by <tt>DH()</tt>.</t>
          </dd>
          <dt><tt>Nsk</tt>:</dt>
          <dd>
            <t>The length of a Diffie-Hellman private key.</t>
          </dd>
        </dl>
        <t>Then we can construct a KEM that implements the interface defined in <xref target="crypto-kem"/>
called <tt>DHKEM(Group, KDF)</tt> in the following way, where <tt>Group</tt> denotes the
Diffie-Hellman group and <tt>KDF</tt> denotes the KDF. The function parameters <tt>pkR</tt> and <tt>pkS</tt>
are deserialized public keys, and <tt>enc</tt> is a serialized public key. Since
encapsulated shared secrets are Diffie-Hellman public keys in this KEM algorithm,
we use <tt>SerializePublicKey()</tt> and <tt>DeserializePublicKey()</tt> to encode and decode
them, respectively. <tt>Npk</tt> and <tt>Nenc</tt> are both equal to <tt>Ndh</tt>. <tt>GenerateKeyPair()</tt> produces a key pair
for the Diffie-Hellman group in use. <xref target="derive-key-pair"/> contains the
<tt>DeriveKeyPair()</tt> function specification for DHKEMs defined in this document.</t>
        <artwork><![CDATA[
# For use with one-stage KDFs
def ExtractAndExpand_OneStage(dh, kem_context):
  return LabeledDerive(dh, "shared_secret", kem_context, Nsecret)

# For use with two-stage KDFs
def ExtractAndExpand_TwoStage(dh, kem_context):
  eae_prk = LabeledExtract("", "eae_prk", dh)
  shared_secret = LabeledExpand(eae_prk, "shared_secret",
                                kem_context, Nsecret)
  return shared_secret

def Encap(pkR):
  skE, pkE = GenerateKeyPair()
  dh = DH(skE, pkR)
  enc = SerializePublicKey(pkE)

  pkRm = SerializePublicKey(pkR)
  kem_context = concat(enc, pkRm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret, enc

def Decap(enc, skR):
  pkE = DeserializePublicKey(enc)
  dh = DH(skR, pkE)

  pkRm = SerializePublicKey(pk(skR))
  kem_context = concat(enc, pkRm)

  shared_secret = ExtractAndExpand(dh, kem_context)
  return shared_secret
]]></artwork>
        <t>The implicit <tt>suite_id</tt> value used within <tt>LabeledExtract</tt>, <tt>LabeledExpand</tt>, and
<tt>LabeledDerive</tt> is defined as follows, where <tt>kem_id</tt> is defined in <xref target="kem-ids"/>:</t>
        <artwork><![CDATA[
suite_id = concat("KEM", I2OSP(kem_id, 2))
]]></artwork>
        <t>The KDF used in DHKEM can be equal to or different from the KDF used
in the remainder of HPKE, depending on the chosen variant.
Implementations MUST make sure to use the constants (<tt>Nh</tt>) and function
calls (<tt>LabeledExtract</tt>, <tt>LabeledExpand</tt>, and <tt>LabeledDerive</tt>) of the appropriate KDF when
implementing DHKEM. See <xref target="kdf-choice"/> for a comment on the choice of
a KDF for the remainder of HPKE, and <xref target="domain-separation"/> for the
rationale of the labels.</t>
        <t>For the variants of DHKEM defined in this document, the size <tt>Nsecret</tt> of the
KEM shared secret is equal to the output length of the hash function
underlying the KDF. For P-256, P-384, and P-521, the size <tt>Ndh</tt> of the
Diffie-Hellman shared secret is equal to 32, 48, and 66, respectively,
corresponding to the x-coordinate of the resulting elliptic curve point <xref target="IEEE1363"/>.
For X25519 and X448, the size <tt>Ndh</tt> is equal to 32 and 56, respectively
(see <xref section="5" sectionFormat="of" target="RFC7748"/>).</t>
      </section>
    </section>
    <section anchor="hpke">
      <name>Hybrid Public Key Encryption</name>
      <t>In this section, we define a few HPKE variants.  All variants take a
recipient public key and a sequence of plaintexts <tt>pt</tt> and produce an
encapsulated secret <tt>enc</tt> and a sequence of ciphertexts <tt>ct</tt>.  These outputs are
constructed so that only the holder of <tt>skR</tt> can decapsulate the key from
<tt>enc</tt> and decrypt the ciphertexts.  All the algorithms also take an
<tt>info</tt> parameter that can be used to influence the generation of keys
(e.g., to fold in identity information) and an <tt>aad</tt> parameter that
provides additional authenticated data to the AEAD algorithm in use.</t>
      <t>In addition to the base case of encrypting to a public key, we include a variant
that authenticates possession of a pre-shared key. The authenticated variant
contributes additional keying material to the encryption operation. The
following one-byte values will be used to distinguish between modes:</t>
      <table anchor="hpke-modes">
        <name>HPKE Modes</name>
        <thead>
          <tr>
            <th align="left">Mode</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mode_base</td>
            <td align="left">0x00</td>
          </tr>
          <tr>
            <td align="left">mode_psk</td>
            <td align="left">0x01</td>
          </tr>
          <tr>
            <td align="left">RESERVED</td>
            <td align="left">0x02</td>
          </tr>
          <tr>
            <td align="left">RESERVED</td>
            <td align="left">0x03</td>
          </tr>
        </tbody>
      </table>
      <t>(The values 0x02 and 0x03 were used in <xref target="RFC9180"/> to reflect additional
variants which have been removed from this specification.)</t>
      <t>Both variants follow the same basic two-step pattern:</t>
      <ol spacing="normal" type="1"><li>
          <t>Set up an encryption context that is shared between the sender
and the recipient.</t>
        </li>
        <li>
          <t>Use that context to encrypt or decrypt content.</t>
        </li>
      </ol>
      <t>A <em>context</em> is an implementation-specific structure that encodes
the AEAD algorithm and key in use, and manages the nonces used so
that the same nonce is not used with multiple plaintexts. It also
has an interface for exporting secret values, as described in
<xref target="hpke-export"/>. See <xref target="hpke-dem"/> for a description of this structure
and its interfaces. HPKE decryption fails when the underlying AEAD
decryption fails.</t>
      <t>The constructions described here presume that the relevant non-private
parameters (<tt>enc</tt>, <tt>psk_id</tt>, etc.) are transported between the sender and the
recipient by some application making use of HPKE. Moreover, a recipient with more
than one public key needs some way of determining which of its public keys was
used for the encapsulation operation. As an example, applications may send this
information alongside a ciphertext from the sender to the recipient. Specification of
such a mechanism is left to the application. See <xref target="message-encoding"/> for more
details.</t>
      <t>The procedures described in this section are laid out in a
Python-like pseudocode. The algorithms in use are left implicit.</t>
      <section anchor="encryption-context">
        <name>Creating the Encryption Context</name>
        <t>The variants of HPKE defined in this document share a common
key schedule that translates the protocol inputs into an encryption
context. The key schedule inputs are as follows:</t>
        <ul spacing="normal">
          <li>
            <t><tt>mode</tt> - A one-byte value indicating the HPKE mode, defined in <xref target="hpke-modes"/>.</t>
          </li>
          <li>
            <t><tt>shared_secret</tt> - A KEM shared secret generated for this transaction.</t>
          </li>
          <li>
            <t><tt>info</tt> - Application-supplied information (optional; default value
"").</t>
          </li>
          <li>
            <t><tt>psk</tt> - A pre-shared key (PSK) held by both the sender
and the recipient (optional; default value "").</t>
          </li>
          <li>
            <t><tt>psk_id</tt> - An identifier for the PSK (optional; default value "").</t>
          </li>
        </ul>
        <t>Senders and recipients MUST validate KEM inputs and outputs as described
in <xref target="kem-ids"/>.</t>
        <t>The <tt>info</tt> parameter used by HPKE is not related to the optional string <tt>info</tt>
used by the <tt>LabeledExpand()</tt> or <tt>Expand()</tt> functions detailed in <xref target="base-crypto"/>.</t>
        <t>The <tt>psk</tt> and <tt>psk_id</tt> parameters MUST appear together or not at all.
That is, if a non-default value is provided for one of them, then
the other MUST be set to a non-default value. This requirement is
encoded in <tt>VerifyPSKInputs()</tt> below.</t>
        <t>The <tt>psk</tt>, <tt>psk_id</tt>, and <tt>info</tt> parameters have maximum lengths that depend
on the KDF itself, on the definition of <tt>LabeledExtract()</tt>, and on the
constant labels used together with them. See <xref target="kdf-input-length"/> for
precise limits on these lengths.</t>
        <t>The <tt>key</tt>, <tt>base_nonce</tt>, and <tt>exporter_secret</tt> computed by the key schedule
have the property that they are only known to the holder of the recipient
private key, and the entity that used the KEM to generate <tt>shared_secret</tt> and
<tt>enc</tt>.</t>
        <t>The HPKE algorithm identifiers, i.e., the KEM <tt>kem_id</tt>, KDF <tt>kdf_id</tt>, and
AEAD <tt>aead_id</tt> 2-byte code points, as defined in <xref target="kemid-values"/>, <xref target="kdfid-values"/>,
and <xref target="aeadid-values"/>, respectively, are assumed implicit from the implementation
and not passed as parameters. The implicit <tt>suite_id</tt> value used within
<tt>LabeledExtract</tt>, <tt>LabeledExpand</tt>, and <tt>LabeledDerive</tt> is defined based on them as follows:</t>
        <artwork><![CDATA[
suite_id = concat(
  "HPKE",
  I2OSP(kem_id, 2),
  I2OSP(kdf_id, 2),
  I2OSP(aead_id, 2)
)
]]></artwork>
        <artwork><![CDATA[
default_psk = ""
default_psk_id = ""

def VerifyPSKInputs(mode, psk, psk_id):
  got_psk = (psk != default_psk)
  got_psk_id = (psk_id != default_psk_id)
  if got_psk != got_psk_id:
    raise Exception("Inconsistent PSK inputs")

  if got_psk and mode == mode_base:
    raise Exception("PSK input provided when not needed")
  if (not got_psk) and mode == mode_psk:
    raise Exception("Missing required PSK input")

# For use with a one-stage KDF
def CombineSecrets_OneStage(mode, shared_secret, info, psk, psk_id):
  secrets = concat(
    lengthPrefixed(psk),
    lengthPrefixed(shared_secret),
  )
  context = concat(
    mode,
    lengthPrefixed(psk_id),
    lengthPrefixed(info),
  )

  secret = LabeledDerive(secrets, "secret", context, Nk + Nn + Nh)

  key = secret[:Nk]
  base_nonce = secret[Nk:(Nk + Nn)]
  exporter_secret = secret[(Nk + Nn):]

  return (key, base_nonce, exporter_secret)

# For use with a two-stage KDF
def CombineSecrets_TwoStage(mode, shared_secret, info, psk, psk_id):
  psk_id_hash = LabeledExtract("", "psk_id_hash", psk_id)
  info_hash = LabeledExtract("", "info_hash", info)
  key_schedule_context = concat(mode, psk_id_hash, info_hash)

  secret = LabeledExtract(shared_secret, "secret", psk)

  key = LabeledExpand(secret, "key", key_schedule_context, Nk)
  base_nonce = LabeledExpand(secret, "base_nonce",
                             key_schedule_context, Nn)
  exporter_secret = LabeledExpand(secret, "exp",
                                  key_schedule_context, Nh)

  return (key, base_nonce, exporter_secret)

def KeySchedule<ROLE>(mode, shared_secret, info, psk, psk_id):
  VerifyPSKInputs(mode, psk, psk_id)

  key, base_nonce, exporter_secret =
    CombineSecrets(mode, shared_secret, info, psk, psk_id)

  return Context<ROLE>(key, base_nonce, 0, exporter_secret)
]]></artwork>
        <t>The <tt>ROLE</tt> template parameter is either S or R, depending on the role
of sender or recipient, respectively. The third parameter in the
<tt>Context&lt;ROLE&gt;</tt> refers to the sequence number, that is initialised with
a 0 value. See <xref target="hpke-dem"/> for a discussion of the key schedule output,
including the role-specific Context structure and its Application Programming Interface (API), and the
usage of the sequence number.</t>
        <t>Note that the <tt>key_schedule_context</tt> construction in <tt>KeySchedule()</tt> is
equivalent to serializing a structure of the following form in the TLS presentation
syntax:</t>
        <artwork><![CDATA[
struct {
    uint8 mode;
    opaque psk_id_hash[Nh];
    opaque info_hash[Nh];
} KeyScheduleContext;
]]></artwork>
        <section anchor="hpke-kem">
          <name>Encryption to a Public Key</name>
          <t>The most basic function of an HPKE scheme is to enable encryption
to the holder of a given KEM private key.  The <tt>SetupBaseS()</tt> and
<tt>SetupBaseR()</tt> procedures establish contexts that can be used to
encrypt and decrypt, respectively, for a given private key.</t>
          <t>The KEM shared secret is combined via the KDF
with information describing the key exchange, as well as the
explicit <tt>info</tt> parameter provided by the caller.</t>
          <t>The parameter <tt>pkR</tt> is a public key, and <tt>enc</tt> is an encapsulated
KEM shared secret.</t>
          <artwork><![CDATA[
def SetupBaseS(pkR, info):
  shared_secret, enc = Encap(pkR)
  return enc, KeyScheduleS(mode_base, shared_secret, info,
                           default_psk, default_psk_id)

def SetupBaseR(enc, skR, info):
  shared_secret = Decap(enc, skR)
  return KeyScheduleR(mode_base, shared_secret, info,
                      default_psk, default_psk_id)
]]></artwork>
        </section>
        <section anchor="mode-psk">
          <name>Authentication Using a Pre-Shared Key</name>
          <t>This variant extends the base mechanism by allowing the recipient to
authenticate that the sender possessed a given PSK. The PSK also
improves confidentiality guarantees in certain adversary models, as
described in more detail in <xref target="sec-properties"/>. We assume that both
parties have been provisioned with both the PSK value <tt>psk</tt> and another
byte string <tt>psk_id</tt> that is used to identify which PSK should be used.</t>
          <t>The primary difference from the base case is that the <tt>psk</tt> and <tt>psk_id</tt> values
are used as <tt>ikm</tt> inputs to the KDF (instead of using the empty string).</t>
          <t>The PSK MUST have at least 32 bytes of entropy and SHOULD be of length <tt>Nh</tt>
bytes or longer. See <xref target="security-psk"/> for a more detailed discussion.</t>
          <artwork><![CDATA[
def SetupPSKS(pkR, info, psk, psk_id):
  shared_secret, enc = Encap(pkR)
  return enc, KeyScheduleS(mode_psk, shared_secret, info, psk, psk_id)

def SetupPSKR(enc, skR, info, psk, psk_id):
  shared_secret = Decap(enc, skR)
  return KeyScheduleR(mode_psk, shared_secret, info, psk, psk_id)
]]></artwork>
        </section>
      </section>
      <section anchor="hpke-dem">
        <name>Encryption and Decryption</name>
        <t>HPKE allows multiple encryption operations to be done based on a
given setup transaction.  Since the public key operations involved
in setup are typically more expensive than symmetric encryption or
decryption, this allows applications to amortize the cost of the
public key operations, reducing the overall overhead.</t>
        <t>In order to avoid nonce reuse, however, this encryption must be
stateful. Each of the setup procedures above produces a role-specific
context object that stores the AEAD and secret export parameters.
The AEAD parameters consist of:</t>
        <ul spacing="normal">
          <li>
            <t>The AEAD algorithm in use</t>
          </li>
          <li>
            <t>A secret <tt>key</tt></t>
          </li>
          <li>
            <t>A base nonce <tt>base_nonce</tt></t>
          </li>
          <li>
            <t>A sequence number (initially 0)</t>
          </li>
        </ul>
        <t>The secret export parameters consist of:</t>
        <ul spacing="normal">
          <li>
            <t>The HPKE ciphersuite in use and</t>
          </li>
          <li>
            <t>An <tt>exporter_secret</tt> used for the secret export interface (see
<xref target="hpke-export"/>)</t>
          </li>
        </ul>
        <t>All these parameters except the AEAD sequence number are constant.
The sequence number provides nonce uniqueness: The nonce used for
each encryption or decryption operation is the result of XORing
<tt>base_nonce</tt> with the current sequence number, encoded as a big-endian
integer of the same length as <tt>base_nonce</tt>. Implementations MAY use a
sequence number that is shorter than the nonce length (padding on the left
with zero), but MUST raise an error if the sequence number overflows. The AEAD
algorithm produces ciphertext that is Nt bytes longer than the plaintext.
Nt = 16 for AEAD algorithms defined in this document.</t>
        <t>Additionally, each AEAD algorithm has a maximum plaintext length (P_MAX)
as specified in <xref target="RFC5116"/>. For AES-128-GCM and AES-256-GCM, P_MAX is
2^36 - 31 bytes. For ChaCha20Poly1305, P_MAX is 2^38 - 64 bytes.
Implementations MUST NOT encrypt plaintexts larger than P_MAX. Exceeding
either the sequence number limit or P_MAX for the AEAD in use results in
loss of confidentiality and integrity guarantees.</t>
        <t>Encryption is unidirectional from sender to recipient. The sender's
context can encrypt a plaintext <tt>pt</tt> with associated data <tt>aad</tt> as
follows:</t>
        <artwork><![CDATA[
def ContextS.Seal(aad, pt):
  ct = Seal(self.key, self.ComputeNonce(self.seq), aad, pt)
  self.IncrementSeq()
  return ct
]]></artwork>
        <t>The recipient's context can decrypt a ciphertext <tt>ct</tt> with associated
data <tt>aad</tt> as follows:</t>
        <artwork><![CDATA[
def ContextR.Open(aad, ct):
  pt = Open(self.key, self.ComputeNonce(self.seq), aad, ct)
  if pt == OpenError:
    raise OpenError
  self.IncrementSeq()
  return pt
]]></artwork>
        <t>Each encryption or decryption operation increments the sequence number for
the context in use. The per-message nonce and sequence number increment
details are as follows:</t>
        <artwork><![CDATA[
def Context<ROLE>.ComputeNonce(seq):
  seq_bytes = I2OSP(seq, Nn)
  return xor(self.base_nonce, seq_bytes)

def Context<ROLE>.IncrementSeq():
  if self.seq >= (1 << (8*Nn)) - 1:
    raise MessageLimitReachedError
  self.seq += 1
]]></artwork>
        <t>The sender's context MUST NOT be used for decryption. Similarly, the recipient's
context MUST NOT be used for encryption. Higher-level protocols reusing the HPKE
key exchange for more general purposes can derive separate keying material as
needed using use the secret export interface; see <xref target="hpke-export"/> and <xref target="bidirectional"/>
for more details.</t>
        <t>It is up to the application to ensure that encryptions and decryptions are
done in the proper sequence, so that encryption and decryption nonces align.
If <tt>ContextS.Seal()</tt> or <tt>ContextR.Open()</tt> would cause the <tt>seq</tt> parameter to
overflow, then the implementation MUST fail with an error. (In the pseudocode
above, <tt>Context&lt;ROLE&gt;.IncrementSeq()</tt> fails with an error when <tt>seq</tt> overflows,
which causes <tt>ContextS.Seal()</tt> and <tt>ContextR.Open()</tt> to fail accordingly.)
Note that the internal <tt>Seal()</tt> and <tt>Open()</tt> calls inside correspond to the
context's AEAD algorithm.</t>
        <t>In parallel or concurrent environments, the <tt>ComputeNonce()</tt>, <tt>Seal()</tt>, and
<tt>IncrementSeq()</tt> operations MUST be done as an atomic unit, e.g., by holding
a lock on <tt>ContextS</tt> for the duration of <tt>ContextS.Seal()</tt>. If other calls to
<tt>Seal()</tt> are interleaved before <tt>IncrementSeq()</tt> completes, this will result
in multiple encryptions with the same sequence number, and thus the same nonce.</t>
      </section>
      <section anchor="hpke-export">
        <name>Secret Export</name>
        <t>HPKE provides an interface for exporting secrets from the encryption context
using a variable-length pseudorandom function (PRF). This interface takes as input a context
string <tt>exporter_context</tt> and a desired length <tt>L</tt> in bytes, and produces
a secret derived from the internal exporter secret using the corresponding
KDF Expand function. For the KDFs defined in this specification, <tt>L</tt> has
a maximum value of <tt>255*Nh</tt>. Future specifications that define new KDFs
MUST specify a bound for <tt>L</tt>.</t>
        <t>The <tt>exporter_context</tt> parameter has a maximum length that depends on the KDF
itself, on the definition of <tt>LabeledExpand()</tt>, and on the constant labels
used together with them. See <xref target="kdf-input-length"/> for precise limits on this
length.</t>
        <artwork><![CDATA[
# For use with a one-stage KDF
def Context.Export_OneStage(exporter_context, L):
  return LabeledDerive(self.exporter_secret, "sec",
                       exporter_context, L)

# For use with a two-stage KDF
def Context.Export_TwoStage(exporter_context, L):
  return LabeledExpand(self.exporter_secret, "sec",
                       exporter_context, L)
]]></artwork>
        <t>Applications that do not use the encryption API in <xref target="hpke-dem"/> can use
the export-only AEAD ID <tt>0xFFFF</tt> when computing the key schedule. Such
applications can avoid computing the <tt>key</tt> and <tt>base_nonce</tt> values in the
key schedule, as they are not used by the Export interface described above.</t>
        <t>Unlike the similar TLS 1.3 exporter interface (see <xref section="7.5" sectionFormat="of" target="RFC8446"/>),
the HPKE export interface does not provide replay protection. While the resulting
secret will only be known to the sender and recipient, a replayed encapsulated
secret <tt>enc</tt> will produce an identical context, and thus the same exported
secrets. In particular, applications MUST NOT use exported secrets unless it is
safe for the same exported values to be used multiple times.  For example,
applications MUST NOT use an exported secret to derive a (key, nonce) pair for
AEAD encryption (as suggested in <xref section="9.8" sectionFormat="of" target="RFC9180"/>), since reuse of a
(key, nonce) pair harms security in most AEAD algorithms.  In such cases,
applications SHOULD incorporate a fresh recipient-provided nonce when deriving
values from an export context, as discussed in <xref section="4.4" sectionFormat="of" target="RFC9458"/> and
<xref target="bidirectional"/>.</t>
      </section>
    </section>
    <section anchor="single-shot-apis">
      <name>Single-Shot APIs</name>
      <section anchor="single-shot-encryption">
        <name>Encryption and Decryption</name>
        <t>In many cases, applications encrypt only a single message to a recipient's
public key.  This section provides templates for HPKE APIs that implement
stateless "single-shot" encryption and decryption using APIs specified in
<xref target="encryption-context"/> and <xref target="hpke-dem"/>:</t>
        <artwork><![CDATA[
def Seal<MODE>(pkR, info, aad, pt, ...):
  enc, ctx = Setup<MODE>S(pkR, info, ...)
  ct = ctx.Seal(aad, pt)
  return enc, ct

def Open<MODE>(enc, skR, info, aad, ct, ...):
  ctx = Setup<MODE>R(enc, skR, info, ...)
  return ctx.Open(aad, ct)
]]></artwork>
        <t>The <tt>MODE</tt> template parameter is either Base or PSK. The optional parameters
indicated by "..." depend on <tt>MODE</tt> and may be empty. For example, <tt>SetupBase()</tt> has no
additional parameters. <tt>SealPSK()</tt> and <tt>OpenPSK()</tt> would be implemented as follows:</t>
        <artwork><![CDATA[
def SealPSK(pkR, info, aad, pt, psk, psk_id):
  enc, ctx = SetupPSKS(pkR, info, psk, psk_id)
  ct = ctx.Seal(aad, pt)
  return enc, ct

def OpenPSK(enc, skR, info, aad, ct, psk, psk_id):
  ctx = SetupPSKR(enc, skR, info, psk, psk_id)
  return ctx.Open(aad, ct)
]]></artwork>
      </section>
      <section anchor="secret-export">
        <name>Secret Export</name>
        <t>Applications may also want to derive a secret known only to a given recipient.
This section provides templates for HPKE APIs that implement stateless
"single-shot" secret export using APIs specified in <xref target="hpke-export"/>:</t>
        <artwork><![CDATA[
def SendExport<MODE>(pkR, info, exporter_context, L, ...):
  enc, ctx = Setup<MODE>S(pkR, info, ...)
  exported = ctx.Export(exporter_context, L)
  return enc, exported

def ReceiveExport<MODE>(enc, skR, info, exporter_context, L, ...):
  ctx = Setup<MODE>R(enc, skR, info, ...)
  return ctx.Export(exporter_context, L)
]]></artwork>
        <t>As in <xref target="single-shot-encryption"/>, the <tt>MODE</tt> template parameter is either Base or PSK.
The optional parameters indicated by "..." depend on <tt>MODE</tt> and may be empty.</t>
        <t>Secrets exported using this single-shot API face the same replay risks discussed
in <xref target="hpke-export"/>.  Usage of exported secrets needs to be limited as described
in that section.</t>
      </section>
    </section>
    <section anchor="ciphersuites">
      <name>Algorithm Identifiers</name>
      <t>This section lists algorithm identifiers suitable for different HPKE configurations.
Future specifications may introduce new KEM, KDF, and AEAD algorithm identifiers
and retain the security guarantees presented in this document provided they adhere
to the security requirements in <xref target="kem-security"/>, <xref target="kdf-choice"/>, and <xref target="aead-security"/>,
respectively.</t>
      <section anchor="kem-ids">
        <name>Key Encapsulation Mechanisms (KEMs)</name>
        <table anchor="kemid-values">
          <name>KEM IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">Nsecret</th>
              <th align="left">Nenc</th>
              <th align="left">Npk</th>
              <th align="left">Nsk</th>
              <th align="left">Auth</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">yes</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0010</td>
              <td align="left">DHKEM(P-256, HKDF-SHA256)</td>
              <td align="left">32</td>
              <td align="left">65</td>
              <td align="left">65</td>
              <td align="left">32</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0011</td>
              <td align="left">DHKEM(P-384, HKDF-SHA384)</td>
              <td align="left">48</td>
              <td align="left">97</td>
              <td align="left">97</td>
              <td align="left">48</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0012</td>
              <td align="left">DHKEM(P-521, HKDF-SHA512)</td>
              <td align="left">64</td>
              <td align="left">133</td>
              <td align="left">133</td>
              <td align="left">66</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="NISTCurves"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0020</td>
              <td align="left">DHKEM(X25519, HKDF-SHA256)</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">32</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="RFC7748"/>, <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0021</td>
              <td align="left">DHKEM(X448, HKDF-SHA512)</td>
              <td align="left">64</td>
              <td align="left">56</td>
              <td align="left">56</td>
              <td align="left">56</td>
              <td align="left">yes</td>
              <td align="left">
                <xref target="RFC7748"/>, <xref target="RFC5869"/></td>
            </tr>
          </tbody>
        </table>
        <t>The <tt>Auth</tt> column indicates if the KEM algorithm provides the <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt>
interface defined in <xref target="RFC9180"/>.</t>
        <section anchor="serializepublickey-and-deserializepublickey">
          <name>SerializePublicKey and DeserializePublicKey</name>
          <t>For P-256, P-384, and P-521, the <tt>SerializePublicKey()</tt> function of the
KEM performs the uncompressed Elliptic-Curve-Point-to-Octet-String
conversion according to <xref target="SECG"/>. <tt>DeserializePublicKey()</tt> performs the
uncompressed Octet-String-to-Elliptic-Curve-Point conversion.</t>
          <t>For X25519 and X448, the <tt>SerializePublicKey()</tt> and <tt>DeserializePublicKey()</tt>
functions are the identity function, since these curves already use
fixed-length byte strings for public keys.</t>
          <t>Some deserialized public keys MUST be validated before they can be used. See
<xref target="validation"/> for specifics.</t>
        </section>
        <section anchor="serializeprivatekey">
          <name>SerializePrivateKey and DeserializePrivateKey</name>
          <t>As per <xref target="SECG"/>, P-256, P-384, and P-521 private keys are field elements in the
scalar field of the curve being used. For this section, and for
<xref target="derive-key-pair"/>, it is assumed that implementors of ECDH over these curves
use an integer representation of private keys that is compatible with the
<tt>OS2IP()</tt> function.</t>
          <t>For P-256, P-384, and P-521, the <tt>SerializePrivateKey()</tt> function of the KEM
performs the Field-Element-to-Octet-String conversion according to <xref target="SECG"/>. If
the private key is an integer outside the range <tt>[0, order-1]</tt>, where <tt>order</tt>
is the order of the curve being used, the private key MUST be reduced to its
representative in <tt>[0, order-1]</tt> before being serialized.
<tt>DeserializePrivateKey()</tt> performs the Octet-String-to-Field-Element conversion
according to <xref target="SECG"/>.</t>
          <t>For X25519 and X448, private keys are identical to their byte string
representation.</t>
          <t>To catch invalid keys early on, implementors of DHKEMs SHOULD check that
deserialized private keys are not equivalent to 0 (mod <tt>order</tt>), where <tt>order</tt>
is the order of the DH group. Note that this property is trivially true for X25519
and X448 groups, since clamped values can never be 0 (mod <tt>order</tt>).</t>
        </section>
        <section anchor="derive-key-pair">
          <name>DeriveKeyPair</name>
          <t>The keys that <tt>DeriveKeyPair()</tt> produces have only as much entropy as the provided
input keying material. For a given KEM, the <tt>ikm</tt> parameter given to <tt>DeriveKeyPair()</tt> SHOULD
have length at least <tt>Nsk</tt>, and SHOULD have at least <tt>Nsk</tt> bytes of entropy.</t>
          <t>All invocations of KDF functions (such as <tt>LabeledExtract</tt> or <tt>LabeledExpand</tt>) in any
DHKEM's <tt>DeriveKeyPair()</tt> function use the DHKEM's associated KDF (as opposed to
the ciphersuite's KDF).</t>
          <t>For P-256, P-384, and P-521, the <tt>DeriveKeyPair()</tt> function of the KEM performs
rejection sampling over field elements:</t>
          <artwork><![CDATA[
# For use with a one-stage KDF
def DeriveCandidate_OneStage(ikm, counter):
  return LabeledDerive(ikm, "candidate", I2OSP(counter, 1), Nsk)

# For use with a two-stage KDF
def DeriveCandidate_TwoStage(ikm, counter):
  # Note: dkp_prk may be derived once and cached
  dkp_prk = LabeledExtract("", "dkp_prk", ikm)
  return LabeledExpand(dkp_prk, "candidate",
                          I2OSP(counter, 1), Nsk)

def DeriveKeyPair(ikm):
  sk = 0
  counter = 0
  while sk == 0 or sk >= order:
    if counter > 255:
      raise DeriveKeyPairError
    bytes = DeriveCandidate(ikm, counter)
    bytes[0] = bytes[0] & bitmask
    sk = OS2IP(bytes)
    counter = counter + 1
  return (sk, pk(sk))
]]></artwork>
          <t><tt>order</tt> is the order of the curve being used (see Section D.1.2 of <xref target="NISTCurves"/>), and
is listed below for completeness.</t>
          <artwork><![CDATA[
P-256:
0xffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551

P-384:
0xffffffffffffffffffffffffffffffffffffffffffffffffc7634d81f4372ddf
  581a0db248b0a77aecec196accc52973

P-521:
0x01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
  fa51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb71e91386409
]]></artwork>
          <t><tt>bitmask</tt> is defined to be 0xFF for P-256 and P-384, and 0x01 for P-521.
The precise likelihood of <tt>DeriveKeyPair()</tt> failing with DeriveKeyPairError
depends on the group being used, but it is negligibly small in all cases.
See <xref target="api-errors"/> for information about dealing with such failures.</t>
          <t>For X25519 and X448, the <tt>DeriveKeyPair()</tt> function applies a KDF to the input:</t>
          <sourcecode type="pseudocode"><![CDATA[
# For use with a one-stage KDF
def DeriveKeyPair_OneStage(ikm):
  sk = LabeledDerive(ikm, "sk", "", Nsk)
  return (sk, pk(sk))

# For use with a two-stage KDF
def DeriveKeyPair_TwoStage(ikm):
  dkp_prk = LabeledExtract("", "dkp_prk", ikm)
  sk = LabeledExpand(dkp_prk, "sk", "", Nsk)
  return (sk, pk(sk))
]]></sourcecode>
          <t>The <tt>suite_id</tt> used implicitly in <tt>LabeledExtract()</tt> and <tt>LabeledExpand()</tt>
for <tt>DeriveKeyPair(ikm)</tt> is derived from the KEM identifier of the
DHKEM in use (see <xref target="kem-ids"/>), that is, based on the type of key
pair been generated for that DHKEM type.</t>
          <t>For all of the above instances of DHKEM, the <tt>GenerateKeyPair</tt> can be
implemented as <tt>DeriveKeyPair(random(Nsk))</tt>.</t>
        </section>
        <section anchor="validation">
          <name>Validation of Inputs and Outputs</name>
          <t>The following public keys are subject to validation if the group
requires public key validation: the sender MUST validate the recipient's
public key <tt>pkR</tt>; the recipient MUST validate the ephemeral public key
<tt>pkE</tt>. Validation failure yields a <tt>ValidationError</tt>.</t>
          <t>For P-256, P-384, and P-521, senders and recipients MUST perform partial
public key validation on all public key inputs, as defined in Section 5.6.2.3.4
of <xref target="keyagreement"/>. This includes checking that the coordinates are in the
correct range, that the point is on the curve, and that the point is not the
point at infinity. Additionally, senders and recipients MUST ensure the
Diffie-Hellman shared secret is not the point at infinity.</t>
          <t>For X25519 and X448, public keys and Diffie-Hellman outputs MUST be validated
as described in <xref target="RFC7748"/>. In particular, recipients MUST check whether
the Diffie-Hellman shared secret is the all-zero value and abort if so.</t>
        </section>
        <section anchor="future-kems">
          <name>Future KEMs</name>
          <t><xref target="kem-security"/> lists security requirements on a KEM used within HPKE.</t>
          <t>A KEM algorithm may support different encoding algorithms, with different output
lengths, for KEM public keys. Such KEM algorithms MUST specify only one encoding
algorithm whose output length is <tt>Npk</tt>.</t>
        </section>
      </section>
      <section anchor="kdf-ids">
        <name>Key Derivation Functions (KDFs)</name>
        <table anchor="kdfid-values">
          <name>KDF IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KDF</th>
              <th align="left">Nh</th>
              <th align="left">Two-Stage</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0001</td>
              <td align="left">HKDF-SHA256</td>
              <td align="left">32</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0002</td>
              <td align="left">HKDF-SHA384</td>
              <td align="left">48</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">HKDF-SHA512</td>
              <td align="left">64</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC5869"/></td>
            </tr>
          </tbody>
        </table>
        <section anchor="kdf-input-length">
          <name>Input Length Restrictions</name>
          <t>For one-stage KDFs, there is length limit of 65,535 bytes for the <tt>psk</tt>,
<tt>psk_id</tt>, <tt>info</tt> fields. This limitation arises because these fields are all
prefixed with a two-byte length when being used as KDF inputs. There is no
inherent length limitation on <tt>exporter_context</tt>.  If a one-stage KDF has an
input length limit, then implementations MUST limit the length of
<tt>exporter_context</tt> accordingly, so that the <tt>LabeledDerive</tt> call in
<tt>Context.Export</tt> does not overflow the input length limit.</t>
          <t>For two-stage KDFs, this document defines <tt>LabeledExtract()</tt> and <tt>LabeledExpand()</tt> based on the
KDFs listed above. These functions add prefixes to their respective
inputs <tt>ikm</tt> and <tt>info</tt> before calling the KDF's <tt>Extract()</tt> and <tt>Expand()</tt>
functions. This leads to a reduction of the maximum input length that
is available for the inputs <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, <tt>exporter_context</tt>,
<tt>ikm</tt>, i.e., the variable-length parameters provided by HPKE applications.
The following table lists the maximum allowed lengths of these parameters
for the KDFs defined in this document, as inclusive bounds in bytes:</t>
          <table anchor="input-limits">
            <name>Application Input Limits</name>
            <thead>
              <tr>
                <th align="left">Input</th>
                <th align="left">HKDF-SHA256</th>
                <th align="left">HKDF-SHA384</th>
                <th align="left">HKDF-SHA512</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">psk</td>
                <td align="left">2^{61} - 88</td>
                <td align="left">2^{125} - 152</td>
                <td align="left">2^{125} - 152</td>
              </tr>
              <tr>
                <td align="left">psk_id</td>
                <td align="left">2^{61} - 93</td>
                <td align="left">2^{125} - 157</td>
                <td align="left">2^{125} - 157</td>
              </tr>
              <tr>
                <td align="left">info</td>
                <td align="left">2^{61} - 91</td>
                <td align="left">2^{125} - 155</td>
                <td align="left">2^{125} - 155</td>
              </tr>
              <tr>
                <td align="left">exporter_context</td>
                <td align="left">2^{61} - 120</td>
                <td align="left">2^{125} - 200</td>
                <td align="left">2^{125} - 216</td>
              </tr>
              <tr>
                <td align="left">ikm (DeriveKeyPair)</td>
                <td align="left">2^{61} - 84</td>
                <td align="left">2^{125} - 148</td>
                <td align="left">2^{125} - 148</td>
              </tr>
            </tbody>
          </table>
          <t>This shows that the limits are only marginally smaller than the maximum
input length of the underlying hash function; these limits are large and
unlikely to be reached in practical applications. Future specifications
that define new KDFs MUST specify bounds for these variable-length
parameters.</t>
          <t>Since the above bounds are larger than any values used in practice, it may be
useful for implementations to impose a lower limit on the values they will
accept (for example, to avoid dynamic allocations). Implementations MUST
support <tt>info</tt> values of at least 64 bytes. Implementations SHOULD support
<tt>info</tt> values of at least 16384 bytes to accommodate protocols such as
Encrypted Client Hello <xref target="I-D.ietf-tls-esni"/>. Applications seeking
maximum interoperability with resource-constrained HPKE implementations
SHOULD NOT provide <tt>info</tt> values exceeding 64 bytes without confirmation that an
implementation supports larger <tt>info</tt> values.</t>
          <t>The values for <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, and <tt>ikm</tt>, which are inputs to
<tt>LabeledExtract()</tt>, were computed with the following expression:</t>
          <artwork><![CDATA[
max_size_hash_input - Nb - size_version_label -
    size_suite_id - size_input_label
]]></artwork>
          <t>The value for <tt>exporter_context</tt>, which is an input to <tt>LabeledExpand()</tt>,
was computed with the following expression:</t>
          <artwork><![CDATA[
max_size_hash_input - Nb - Nh - size_version_label -
    size_suite_id - size_input_label - 2 - 1
]]></artwork>
          <t>In these equations, <tt>max_size_hash_input</tt> is the maximum input length
of the underlying hash function in bytes, <tt>Nb</tt> is the block size of the
underlying hash function in bytes, <tt>size_version_label</tt> is the size
of "HPKE-v1" in bytes and equals 7, <tt>size_suite_id</tt> is the size of the
<tt>suite_id</tt> in bytes and equals 5 for DHKEM (relevant for <tt>ikm</tt>) and 10 for the
remainder of HPKE (relevant for <tt>psk</tt>, <tt>psk_id</tt>, <tt>info</tt>, and <tt>exporter_context</tt>),
and <tt>size_input_label</tt> is the size in bytes of the label used as parameter to
<tt>LabeledExtract()</tt> or <tt>LabeledExpand()</tt>, the maximum of which is 13
across all labels in this document.</t>
        </section>
      </section>
      <section anchor="aead-ids">
        <name>Authenticated Encryption with Associated Data (AEAD) Functions</name>
        <table anchor="aeadid-values">
          <name>AEAD IDs</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">AEAD</th>
              <th align="left">Nk</th>
              <th align="left">Nn</th>
              <th align="left">Nt</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0000</td>
              <td align="left">Reserved</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
            <tr>
              <td align="left">0x0001</td>
              <td align="left">AES-128-GCM</td>
              <td align="left">16</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="GCM"/></td>
            </tr>
            <tr>
              <td align="left">0x0002</td>
              <td align="left">AES-256-GCM</td>
              <td align="left">32</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="GCM"/></td>
            </tr>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">ChaCha20Poly1305</td>
              <td align="left">32</td>
              <td align="left">12</td>
              <td align="left">16</td>
              <td align="left">
                <xref target="RFC8439"/></td>
            </tr>
            <tr>
              <td align="left">0xFFFF</td>
              <td align="left">Export-only</td>
              <td align="left">0</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">RFC 9180</td>
            </tr>
          </tbody>
        </table>
        <t>The <tt>0xFFFF</tt> AEAD ID is reserved for applications that only use the Export
interface; see <xref target="hpke-export"/> for more details.</t>
      </section>
    </section>
    <section anchor="api-considerations">
      <name>API Considerations</name>
      <t>This section documents considerations for interfaces to implementations of HPKE.
This includes error handling considerations and recommendations that improve
interoperability when HPKE is used in applications.</t>
      <section anchor="auxiliary-authenticated-application-information">
        <name>Auxiliary Authenticated Application Information</name>
        <t>HPKE has two places at which applications can specify auxiliary authenticated information:
(1) during context construction via the Setup <tt>info</tt> parameter, and (2) during Context
operations, i.e., with the <tt>aad</tt> parameter for <tt>Open()</tt> and <tt>Seal()</tt>, and the <tt>exporter_context</tt> parameter
for <tt>Export()</tt>. Application information applicable to multiple operations on a single Context
should use the Setup <tt>info</tt> parameter. This avoids redundantly processing this information for
each Context operation. In contrast, application information that varies on a per-message basis
should be specified via the Context APIs (<tt>Seal()</tt>, <tt>Open()</tt>, or <tt>Export()</tt>).</t>
        <t>Applications that only use the single-shot APIs described in <xref target="single-shot-apis"/> should use the
Setup <tt>info</tt> parameter for specifying auxiliary authenticated information. Implementations which
only expose single-shot APIs should not allow applications to use both Setup <tt>info</tt> and Context
<tt>aad</tt> or <tt>exporter_context</tt> auxiliary information parameters.</t>
      </section>
      <section anchor="api-errors">
        <name>Errors</name>
        <t>The high-level, public HPKE APIs specified in this document are all fallible.
These include the Setup functions and all encryption context functions.
For example, <tt>Decap()</tt> can fail if the encapsulated secret <tt>enc</tt> is invalid,
and <tt>Open()</tt> may fail if ciphertext decryption fails. The explicit errors
generated throughout this specification, along with the conditions that
lead to each error, are as follows:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ValidationError</tt>: KEM input or output validation failure; <xref target="dhkem"/>.</t>
          </li>
          <li>
            <t><tt>DeserializeError</tt>: Public or private key deserialization failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>EncapError</tt>: <tt>Encap()</tt> failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>DecapError</tt>: <tt>Decap()</tt> failure; <xref target="base-crypto"/>.</t>
          </li>
          <li>
            <t><tt>OpenError</tt>: Context AEAD <tt>Open()</tt> failure; <xref target="base-crypto"/> and <xref target="hpke-dem"/>.</t>
          </li>
          <li>
            <t><tt>MessageLimitReachedError</tt>: Context AEAD sequence number overflow; <xref target="base-crypto"/> and <xref target="hpke-dem"/>.</t>
          </li>
          <li>
            <t><tt>DeriveKeyPairError</tt>: Key pair derivation failure; <xref target="derive-key-pair"/>.</t>
          </li>
        </ul>
        <t>Implicit errors may also occur. As an example, certain classes of failures,
e.g., malformed recipient public keys, may not yield explicit errors.
For example, for the DHKEM variant described in this specification,
the <tt>Encap()</tt> algorithm fails when given an invalid recipient public key.
However, other KEM algorithms may not have an efficient algorithm for verifying
the validity of public keys. As a result, an equivalent error may not manifest
until AEAD decryption at the recipient.</t>
        <t>The errors in this document are meant as a guide for implementors. They are not
an exhaustive list of all the errors an implementation might emit. For example,
future KEMs might have internal failure cases, or an implementation might run
out of memory.</t>
        <t>How these errors are expressed in an API or handled by applications is an
implementation-specific detail. For example, some implementations may abort or
panic upon a <tt>DeriveKeyPairError</tt> failure given that it only occurs with
negligible probability, whereas other implementations may retry the failed
DeriveKeyPair operation. See <xref target="derive-key-pair"/> for more information.
As another example, some implementations of the DHKEM specified in this document
may choose to transform <tt>ValidationError</tt> from <tt>DH()</tt> into an <tt>EncapError</tt> or
<tt>DecapError</tt> from <tt>Encap()</tt> or <tt>Decap()</tt>, respectively, whereas others may choose
to raise <tt>ValidationError</tt> unmodified.</t>
        <t>Applications using HPKE APIs should not assume that the errors here are complete,
nor should they assume certain classes of errors will always manifest the same way
for all ciphersuites. For example, the DHKEM specified in this document will emit
a <tt>DeserializationError</tt> or <tt>ValidationError</tt> if a KEM public key is invalid. However,
a new KEM might not have an efficient algorithm for determining whether or not a
public key is valid. In this case, an invalid public key might instead yield an
<tt>OpenError</tt> when trying to decrypt a ciphertext.</t>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <section anchor="sec-properties">
        <name>Security Properties</name>
        <t>HPKE has several security goals, depending on the mode of operation,
against active and adaptive attackers that can compromise partial
secrets of senders and recipients. The desired security goals are
detailed below:</t>
        <ul spacing="normal">
          <li>
            <t>Message secrecy: Confidentiality of the sender's messages against
chosen ciphertext attacks</t>
          </li>
          <li>
            <t>Export key secrecy: Indistinguishability of each export
secret from a uniformly random bitstring of equal length, i.e.,
<tt>Context.Export</tt> is a variable-length PRF</t>
          </li>
          <li>
            <t>Sender authentication: Proof of sender origin for the PSK mode</t>
          </li>
        </ul>
        <t>These security goals are expected to hold for any honest sender and
honest recipient keys, as well as if the honest sender and honest
recipient keys are the same.</t>
        <t>HPKE mitigates malleability problems (called benign malleability <xref target="SECG"/>) in prior
public key encryption standards based on ECIES by including all public keys in the
context of the key schedule.</t>
        <t>HPKE does not provide forward secrecy with respect to recipient compromise.
In the Base mode, the secrecy properties are only expected to
hold if the recipient private key <tt>skR</tt> is not compromised at any point
in time. In the PSK mode, the secrecy properties are
expected to hold if the recipient private key <tt>skR</tt> and the pre-shared key
are not both compromised at any point in time. See <xref target="non-goals"/> for more
details.</t>
        <t>Besides forward secrecy and key-compromise impersonation, which are highlighted
in this section because of their particular cryptographic importance, HPKE
has other non-goals that are described in <xref target="non-goals"/>: no tolerance of
message reordering or loss, no downgrade or replay prevention, no hiding of the
plaintext length, and no protection against bad ephemeral randomness. <xref target="non-goals"/>
suggests application-level mitigations for some of them.</t>
        <section anchor="computational-analysis">
          <name>Computational Analysis</name>
          <t>It is shown in <xref target="CS01"/> that a hybrid public key encryption scheme of
essentially the same form as the Base mode described here is
IND-CCA2-secure as long as the underlying KEM and AEAD schemes are
IND-CCA2-secure. Moreover, it is shown in <xref target="HHK06"/> that IND-CCA2 security
of the KEM and the data encapsulation mechanism are necessary conditions
to achieve IND-CCA2 security for hybrid public key encryption.
The main difference between the scheme proposed in <xref target="CS01"/>
and the Base mode in this document (both named HPKE) is that we interpose
some KDF calls between the KEM and the AEAD. Analyzing the HPKE Base mode
instantiation in this document therefore requires verifying that the
additional KDF calls do not cause the IND-CCA2 property to fail, as
well as verifying the additional export key secrecy property.</t>
          <t>A preliminary computational analysis of all HPKE modes has been done
in <xref target="HPKEAnalysis"/>, indicating asymptotic security for the case where
the KEM is DHKEM, the AEAD is any IND-CPA-secure and INT-CTXT-secure scheme,
and the DH group and KDF satisfy the following conditions:</t>
          <ul spacing="normal">
            <li>
              <t>DH group: The gap Diffie-Hellman (GDH) problem is hard in the
appropriate subgroup <xref target="GAP"/>.</t>
            </li>
            <li>
              <t><tt>Extract()</tt> and <tt>Expand()</tt>: <tt>Extract()</tt> can be modeled as a random oracle.
<tt>Expand()</tt> can be modeled as a pseudorandom function, wherein the first
argument is the key.</t>
            </li>
          </ul>
          <t>In particular, the KDFs and DH groups defined in this document (see
<xref target="kdf-ids"/> and <xref target="kem-ids"/>) satisfy these properties when used as
specified. The analysis in <xref target="HPKEAnalysis"/> demonstrates that under these
constraints, HPKE continues to provide IND-CCA2 security, and provides
the additional properties noted above. Also, the analysis confirms the
expected properties hold under the different key compromise cases
mentioned above. The analysis considers a sender that sends one message
using the encryption context, and additionally exports two independent
secrets using the secret export interface.</t>
          <t>The table below summarizes the main results from <xref target="HPKEAnalysis"/>. N/A
means that a property does not apply for the given mode, whereas <tt>Y</tt> means
the given mode satisfies the property.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Variant</th>
                <th align="center">Message Sec.</th>
                <th align="center">Export Sec.</th>
                <th align="center">Sender Auth.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Base</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">N/A</td>
              </tr>
              <tr>
                <td align="left">PSK</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
                <td align="center">Y</td>
              </tr>
            </tbody>
          </table>
          <t>If non-DH-based KEMs are to be used with HPKE, further analysis will be
necessary to prove their security. The results from <xref target="CS01"/> provide
some indication that any IND-CCA2-secure KEM will suffice here, but are
not conclusive given the differences in the schemes.</t>
        </section>
        <section anchor="post-quantum-security">
          <name>Post-Quantum Security</name>
          <t>All of <xref target="CS01"/>, <xref target="HPKEAnalysis"/>, and <xref target="ABHKLR20"/> are premised on
classical security models and assumptions, and do not consider
adversaries capable of quantum computation. A full proof of post-quantum
security would need to take appropriate security models and assumptions
into account, in addition to simply using a post-quantum KEM.</t>
          <t>In future work, the analysis from <xref target="ABHKLR20"/> can be extended to cover
HPKE's other modes and desired security properties.
The hybrid quantum-resistance property described above, which is achieved
by using the PSK mode, is not proven in <xref target="HPKEAnalysis"/> because
this analysis requires the random oracle model; in a quantum
setting, this model needs adaption to, for example, the quantum random
oracle model.</t>
        </section>
      </section>
      <section anchor="kem-security">
        <name>Security Requirements on a KEM Used within HPKE</name>
        <t>A KEM used within HPKE MUST allow HPKE to satisfy its desired security
properties described in <xref target="sec-properties"/>. <xref target="domain-separation"/> lists
requirements concerning domain separation.</t>
        <t>In particular, the KEM
shared secret MUST be a uniformly random byte string of length <tt>Nsecret</tt>.
This means, for instance, that it would not be sufficient if the KEM
shared secret is only uniformly random as an element of some set prior
to its encoding as a byte string.</t>
        <section anchor="encapdecap-interface">
          <name>Encap/Decap Interface</name>
          <t>As mentioned in <xref target="sec-considerations"/>, <xref target="CS01"/> provides some indications
that if the KEM's <tt>Encap()</tt>/<tt>Decap()</tt> interface (which is used in the Base
and PSK modes) is IND-CCA2-secure, HPKE is able to satisfy its desired
security properties. An appropriate definition of IND-CCA2 security for
KEMs can be found in <xref target="CS01"/> and <xref target="BHK09"/>.</t>
        </section>
        <section anchor="kem-key-reuse">
          <name>KEM Key Reuse</name>
          <t>An <tt>ikm</tt> input to <tt>DeriveKeyPair()</tt> (<xref target="derive-key-pair"/>) MUST NOT be
reused elsewhere, in particular not with <tt>DeriveKeyPair()</tt> of a
different KEM.</t>
          <t>Since a KEM key pair belonging to a sender or recipient works with all modes, it can
be used with multiple modes in parallel. HPKE is constructed to be
secure in such settings due to domain separation using the <tt>suite_id</tt>
variable. However, there is no formal proof of security at the time of
writing for using multiple modes in parallel; <xref target="HPKEAnalysis"/> and
<xref target="ABHKLR20"/> only analyze isolated modes.</t>
        </section>
      </section>
      <section anchor="kdf-choice">
        <name>Security Requirements on a KDF</name>
        <t>The choice of the KDF for HPKE SHOULD be made based on the security
level provided by the KEM and, if applicable, by the PSK. The KDF
SHOULD at least have the security level of the KEM and SHOULD
at least have the security level provided by the PSK.</t>
      </section>
      <section anchor="aead-security">
        <name>Security Requirements on an AEAD</name>
        <t>All AEADs MUST be IND-CCA2-secure, as is currently true for all AEADs
listed in <xref target="aead-ids"/>.</t>
      </section>
      <section anchor="security-psk">
        <name>Pre-Shared Key Recommendations</name>
        <t>In the PSK modes, the PSK MUST have at least 32 bytes of
entropy and SHOULD be of length <tt>Nh</tt> bytes or longer. Using a PSK longer than
32 bytes but shorter than <tt>Nh</tt> bytes is permitted.</t>
        <t>HPKE is specified to use HKDF as its key derivation function. HKDF is not
designed to slow down dictionary attacks (see <xref target="RFC5869"/>). Thus, HPKE's
PSK mechanism is not suitable for use with a low-entropy password as the
PSK: In scenarios in which the adversary knows the KEM shared secret
<tt>shared_secret</tt> and has access to an oracle that distinguishes between
a good and a wrong PSK, it can perform PSK-recovering attacks. This oracle
can be the decryption operation on a captured HPKE ciphertext or any other
recipient behavior that is observably different when using a wrong PSK.
The adversary knows the KEM shared secret <tt>shared_secret</tt> if it knows all
KEM private keys of one participant. In the PSK mode, this is trivially
the case if the adversary acts as the sender.</t>
        <t>To recover a lower entropy PSK, an attacker in this scenario can trivially
perform a dictionary attack. Given a set <tt>S</tt> of possible PSK values, the
attacker generates an HPKE ciphertext for each value in <tt>S</tt>, and submits
the resulting ciphertexts to the oracle to learn which PSK is being used by
the recipient. Further, because HPKE uses AEAD schemes that are not key-committing,
an attacker can mount a partitioning oracle attack <xref target="LGR20"/> that can recover
the PSK from a set of <tt>S</tt> possible PSK values, with |S| = m*k, in roughly
m + log k queries to the oracle using ciphertexts of length proportional to
k, the maximum message length in blocks. (Applying the multi-collision algorithm from
<xref target="LGR20"/> requires a small adaptation to the algorithm wherein the appropriate nonce
is computed for each candidate key. This modification adds one call to HKDF per key.
The number of partitioning oracle queries remains unchanged.) As a result, the PSK
must therefore be chosen with sufficient entropy so that m + log k is prohibitive for
attackers (e.g., 2^128). Future specifications can define new AEAD algorithms that
are key-committing.</t>
      </section>
      <section anchor="domain-separation">
        <name>Domain Separation</name>
        <t>HPKE allows combining a DHKEM variant <tt>DHKEM(Group, KDF')</tt> and a KDF
such that both KDFs are instantiated by the same KDF. By design, the
calls to <tt>Extract()</tt> and <tt>Expand()</tt> inside DHKEM and the remainder of
HPKE use separate input domains. This justifies modeling them as
independent functions even if instantiated by the same KDF.
This domain separation between DHKEM and the remainder of HPKE is achieved by
using prefix-free sets of <tt>suite_id</tt> values in <tt>LabeledExtract()</tt>,
<tt>LabeledExpand()</tt>, and LabeledDerive (<tt>KEM...</tt> in DHKEM and <tt>HPKE...</tt> in the remainder of HPKE).
Recall that a set is prefix-free if no element is a prefix of another within the
set.</t>
        <t>Separation between uses of the one-stage and two-stage KDFs is ensured by the
inclusion of the <tt>suite_id</tt> in <tt>LabeledExtract</tt>, <tt>LabeledExpand</tt>, and
<tt>LabeledDerive</tt>.</t>
        <t>Future KEM instantiations MUST ensure, should <tt>Extract()</tt>,
<tt>Expand()</tt>, and/or <tt>Derive()</tt> be used internally, that they can be modeled as functions
independent from the invocations of these functions in the
remainder of HPKE. One way to ensure this is by using <tt>LabeledExtract()</tt> /
<tt>LabeledExpand()</tt> / <tt>LabeledDerive()</tt> functions with a <tt>suite_id</tt> as defined in <xref target="base-crypto"/>,
which will ensure input domain separation, as outlined above.
Particular attention needs to
be paid if the KEM directly invokes functions that are used internally
in HPKE's <tt>Extract()</tt> or <tt>Expand()</tt>, such as <tt>Hash()</tt> and <tt>HMAC()</tt> in the case of HKDF.
It MUST be ensured that inputs to these invocations cannot collide with
inputs to the internal invocations of these functions inside <tt>Extract()</tt> or
<tt>Expand()</tt>. In HPKE's <tt>KeySchedule()</tt> this is avoided by using <tt>Extract()</tt> instead of
<tt>Hash()</tt> on the arbitrary-length inputs <tt>info</tt> and <tt>psk_id</tt>.</t>
        <t>The string literal "HPKE-v1" used in <tt>LabeledExtract()</tt> / <tt>LabeledExpand()</tt> / <tt>LabeledDerive()</tt>
ensures that any secrets derived in HPKE are bound to the scheme's name
and version, even when possibly derived from the same Diffie-Hellman or
KEM shared secret as in another scheme or version.</t>
      </section>
      <section anchor="non-goals">
        <name>Application Embedding and Non-Goals</name>
        <t>HPKE is designed to be a fairly low-level mechanism.  As a result, it assumes
that certain properties are provided by the application in which HPKE is
embedded and leaves certain security properties to be provided by other
mechanisms. Otherwise said, certain properties are out-of-scope for HPKE.</t>
        <section anchor="message-order-and-message-loss">
          <name>Message Order and Message Loss</name>
          <t>The primary requirement that HPKE imposes on applications is the requirement
that ciphertexts MUST be presented to <tt>ContextR.Open()</tt> in the same order in
which they were generated by <tt>ContextS.Seal()</tt>.  When the single-shot API is
used (see <xref target="single-shot-apis"/>), this is trivially true (since there is only
ever one ciphertext.  Applications that allow for multiple invocations of
<tt>Open()</tt> / <tt>Seal()</tt> on the same context MUST enforce the ordering property
described above.</t>
          <t>Ordering requirements of this character are usually fulfilled by providing a
sequence number in the framing of encrypted messages.  Whatever information is
used to determine the ordering of HPKE-encrypted messages SHOULD be included in
the AAD passed to <tt>ContextS.Seal()</tt> and <tt>ContextR.Open()</tt>.  The specifics of
this scheme are up to the application.</t>
          <t>HPKE is not tolerant of lost messages. Applications MUST be able to detect when
a message has been lost.  When an unrecoverable loss is detected, the application MUST discard
any associated HPKE context.</t>
        </section>
        <section anchor="downgrade-prevention">
          <name>Downgrade Prevention</name>
          <t>HPKE assumes that the sender and recipient agree on what algorithms to use.
Depending on how these algorithms are negotiated, it may be possible for an
intermediary to force the two parties to use suboptimal algorithms.</t>
        </section>
        <section anchor="replay-protection">
          <name>Replay Protection</name>
          <t>The requirement that ciphertexts be presented to the <tt>ContextR.Open()</tt> function
in the same order they were generated by <tt>ContextS.Seal()</tt> provides a degree of
replay protection within a stream of ciphertexts resulting from a given context.
HPKE provides no other replay protection.</t>
          <t>While a sender can guarantee the uniqueness of HPKE ciphertexts, a recipient
might receive the same ciphertext multiple times.  Unless the recipient takes
particular care to guarantee that replay is impossible, such as tracking all enc
values that are received, this can result in multiple contexts that have the
same shared secret.  This is particularly relevant for exported secrets.</t>
          <t>If an attacker can cause a recipient to re-use an <tt>enc</tt> value, any exported
secrets will be the same as in the initial transaction.  While the exported
values are still known only to the sender and recipient (not the replay
attacker), such replay can allow the attacker to cause the recipient to re-use
the exported values.</t>
          <t>Consider the following scenario, in which B is using the recipient-to-sender
encryption described as an example in <xref section="9.8" sectionFormat="of" target="RFC9180"/>:</t>
          <figure anchor="replay-attack">
            <name>Attacker-triggered nonce reuse via replay</name>
            <artwork><![CDATA[
B->A: pk

A:    enc1, ctx = SetupBaseS(pk)
      ct1 = ctx.seal(aad, pt)
A->B: enc1, ct1

B:    ctx = SetupBaseR(sk, enc1)
      key, nonce = ctx.export(...)
      ct2 = AEAD.seal(key, nonce, aad2, pt2)
B->A: ct2

X->B: enc1, ct1 [replay of previously sent values]

B:    ctx = SetupBaseR(sk, enc)
      key, nonce = ctx.export(...)
      ct3 = AEAD.seal(key, nonce, aad3, pt3)
B->X: ct3
]]></artwork>
          </figure>
          <t>In this scenario, if <tt>aad2</tt> is different from <tt>aad3</tt> or <tt>pt2</tt> is different from
<tt>pt3</tt> (for example, due to the use of a timestamp in either field), then the
ciphertexts <tt>ct2</tt> and <tt>ct3</tt> will represent encryptions of different values with
the same (key, nonce) pair -- a nonce reuse condition that can completely break
the authenticated encryption guarantees for several AEAD algorithms, including
those defined in <xref target="aead-ids"/>.</t>
          <t>In order to avoid such risks, applications SHOULD incorporate a fresh
recipient-provided nonce when deriving values from an export context, as
discussed in <xref section="4.4" sectionFormat="of" target="RFC9458"/> and <xref target="bidirectional"/>.</t>
        </section>
        <section anchor="forward-secrecy">
          <name>Forward Secrecy</name>
          <t>HPKE ciphertexts are not forward secret with respect to recipient compromise
in any mode. This means that compromise of long-term recipient secrets allows
an attacker to decrypt past ciphertexts encrypted under said secrets. This is because
only long-term secrets are used on the side of the recipient.</t>
          <t>HPKE ciphertexts are forward secret with respect to sender compromise in all
modes. This is because ephemeral randomness is used on the sender's side, which
is supposed to be erased directly after computation of the KEM shared secret and
ciphertext.</t>
        </section>
        <section anchor="bad-ephemeral-randomness">
          <name>Bad Ephemeral Randomness</name>
          <t>If the randomness used for KEM encapsulation is bad -- i.e., of low entropy or
compromised because of a broken or subverted random number generator -- the
confidentiality guarantees of HPKE degrade significantly. In Base mode,
confidentiality guarantees can be lost completely; in the other modes, at least forward secrecy with
respect to sender compromise can be lost completely.</t>
          <t>Such a situation could also lead to the reuse of the same KEM shared secret
and thus to the reuse of same key-nonce pairs for the AEAD.
The AEADs specified in this document are not secure
in case of nonce reuse. This attack vector is particularly relevant in
the authenticated mode because knowledge of the ephemeral randomness is not
enough to derive <tt>shared_secret</tt> in these modes.</t>
          <t>One way for applications to mitigate the impacts of bad ephemeral randomness is
to combine ephemeral randomness with a local long-term secret that has been
generated securely, as described in <xref target="RFC8937"/>.</t>
        </section>
        <section anchor="hiding-plaintext-length">
          <name>Hiding Plaintext Length</name>
          <t>AEAD ciphertexts produced by HPKE do not hide the plaintext length. Applications
requiring this level of privacy should use a suitable padding mechanism. See
<xref target="I-D.ietf-tls-esni"/> and <xref target="RFC8467"/> for examples of protocol-specific
padding policies.</t>
        </section>
      </section>
      <section anchor="bidirectional">
        <name>Bidirectional Encryption</name>
        <t>As discussed in <xref target="hpke-dem"/>, HPKE encryption is unidirectional from sender
to recipient. Applications that require bidirectional encryption can derive
necessary keying material with the secret export interface <xref target="hpke-export"/>.
The type and length of such keying material depends on the application use
case.</t>
        <t>As an example, if an application needs AEAD encryption from the recipient to
the sender, it can derive a key and nonce from the corresponding HPKE context
as follows:</t>
        <artwork><![CDATA[
def EncryptResponse(context, enc, response_aad, response_pt):
  secret = context.Export("[application] response", Nh)
  response_nonce = random(Nh)
  salt = concat(enc, response_nonce)
  prk = Extract(salt, secret)
  aead_key = Expand(prk, "key", Nk)
  aead_nonce = Expand(prk, "nonce", Nn)
  ct = Seal(aead_key, aead_nonce, response_aad, response_pt)
  return (response_nonce, ct)
]]></artwork>
        <t>This example mechanism differs from the example mechanism in <xref target="RFC9180"/> by
incorporating a per-transaction random value <tt>response_nonce</tt>.  Because HPKE
does not provide replay protection, the mechanism in <xref target="RFC9180"/> enabled an
attacker to trigger reuse of a (key, nonce) pair by replaying an HPKE message
under certain application circumstances.  Incorporating per-transaction
entropy ensures that the key and nonce used in AEAD encryption will be distinct
for every invocation of the mechanism.</t>
        <t>In this context, HPKE's limitations with regard to sender authentication become
limits on recipient authentication. In particular, in the Base mode, there is no
authentication of the remote party at all.</t>
      </section>
      <section anchor="metadata-protection">
        <name>Metadata Protection</name>
        <t>The PSK mode of HPKE requires that the recipient
know what key material to use for the sender.  This can be signaled in
applications by sending the PSK ID (<tt>psk_id</tt> above) and/or the sender's public
key (<tt>pkS</tt>).  However, these values themselves might be considered sensitive,
since, in a given application context, they might identify the sender.</t>
        <t>An application that wishes to protect these metadata values without requiring
further provisioning of keys can use an additional instance of HPKE, using the
unauthenticated Base mode.  Where the application might have sent <tt>(psk_id,
enc, ciphertext)</tt> before, it would now send <tt>(enc2, ciphertext2, enc, ciphertext)</tt>,
where <tt>(enc2, ciphertext2)</tt> represent the encryption of the <tt>psk_id</tt> value.</t>
        <t>The cost of this approach is an additional KEM operation each for the sender and
the recipient.  A potential lower-cost approach (involving only symmetric
operations) would be available if the nonce-protection schemes in <xref target="BNT19"/>
could be extended to cover other metadata.  However, this construction would
require further analysis.</t>
      </section>
    </section>
    <section anchor="message-encoding">
      <name>Message Encoding</name>
      <t>This document does not specify a wire format encoding for HPKE messages. Applications
that adopt HPKE must therefore specify an unambiguous encoding mechanism that includes,
minimally: the encapsulated secret <tt>enc</tt>, ciphertext value(s) (and order if there are
multiple), and any info values that are not implicit. One example of a non-implicit
value is the recipient public key used for encapsulation, which may be needed if a
recipient has more than one public key.</t>
      <t>The AEAD interface used in this document is based on <xref target="RFC5116"/>, which produces and
consumes a single ciphertext value. As discussed in <xref target="RFC5116"/>, this ciphertext value
contains the encrypted plaintext as well as any authentication data, encoded in a manner
described by the individual AEAD scheme. Some implementations are not structured in this
way, instead providing a separate ciphertext and authentication tag. When such
AEAD implementations are used in HPKE implementations, the HPKE implementation must combine
these inputs into a single ciphertext value within <tt>Seal()</tt> and parse them out within
<tt>Open()</tt>, where the parsing details are defined by the AEAD scheme. For example, with
the AES-GCM schemes specified in this document, the GCM authentication tag is placed in
the last Nt bytes of the ciphertext output.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA created three new registries as requested in <xref section="11" sectionFormat="of" target="RFC9180"/>:</t>
      <ul spacing="normal">
        <li>
          <t>HPKE KEM Identifiers</t>
        </li>
        <li>
          <t>HPKE KDF Identifiers</t>
        </li>
        <li>
          <t>HPKE AEAD Identifiers</t>
        </li>
      </ul>
      <t>All these registries are under "Hybrid Public Key
Encryption", and administered under a Specification Required policy
<xref target="RFC8126"/>.</t>
      <t>This document requests that entries in these registries referring to RFC 9180 be
updated to refer to this document.</t>
      <section anchor="kem-template">
        <name>KEM Identifiers</name>
        <t>The "HPKE KEM Identifiers" registry lists identifiers for key encapsulation
algorithms defined for use with HPKE.  These identifiers are two-byte values,
so the maximum possible value is 0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>KEM: The name of the algorithm</t>
          </li>
          <li>
            <t>Nsecret: The length in bytes of a KEM shared secret produced by the algorithm</t>
          </li>
          <li>
            <t>Nenc: The length in bytes of an encoded encapsulated secret produced by the algorithm</t>
          </li>
          <li>
            <t>Npk: The length in bytes of an encoded public key for the algorithm</t>
          </li>
          <li>
            <t>Nsk: The length in bytes of an encoded private key for the algorithm</t>
          </li>
          <li>
            <t>Auth: A boolean indicating if this algorithm provides the <tt>AuthEncap()</tt>/<tt>AuthDecap()</tt> interface</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="kemid-values"/></t>
      </section>
      <section anchor="kdf-identifiers">
        <name>KDF Identifiers</name>
        <t>The "HPKE KDF Identifiers" registry lists identifiers for key derivation
functions defined for use with HPKE.  These identifiers are two-byte values,
so the maximum possible value is 0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>KDF: The name of the algorithm</t>
          </li>
          <li>
            <t>Nh: For two-stage KDFs, the output size of the Extract function in
bytes.  For one-stage KDFs, the security strength in bytes, as
defined for the KDF identifier.</t>
          </li>
          <li>
            <t>Two-Stage: Whether the KDF provides Extract and Expand functions (Y)
or only a single-stage Derive function (N).  N/A for reserved
entries.</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="kdfid-values"/></t>
      </section>
      <section anchor="aead-identifiers">
        <name>AEAD Identifiers</name>
        <t>The "HPKE AEAD Identifiers" registry lists identifiers for authenticated
encryption with associated data (AEAD) algorithms defined for use with HPKE.
These identifiers are two-byte values, so the maximum possible value is
0xFFFF = 65535.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Value: The two-byte identifier for the algorithm</t>
          </li>
          <li>
            <t>AEAD: The name of the algorithm</t>
          </li>
          <li>
            <t>Nk: The length in bytes of a key for this algorithm</t>
          </li>
          <li>
            <t>Nn: The length in bytes of a nonce for this algorithm</t>
          </li>
          <li>
            <t>Nt: The length in bytes of an authentication tag for this algorithm</t>
          </li>
          <li>
            <t>Reference: Where this algorithm is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="aeadid-values"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CS01" target="https://eprint.iacr.org/2001/108">
          <front>
            <title>Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack</title>
            <author initials="R." surname="Cramer" fullname="Ronald Cramer">
              <organization/>
            </author>
            <author initials="V." surname="Shoup" fullname="Victor Shoup">
              <organization/>
            </author>
            <date year="2001"/>
          </front>
        </reference>
        <reference anchor="HHK06" target="https://eprint.iacr.org/2006/265">
          <front>
            <title>Some (in)sufficient conditions for secure hybrid encryption</title>
            <author initials="J." surname="Herranz" fullname="Javier Herranz">
              <organization/>
            </author>
            <author initials="D." surname="Hofheinz" fullname="Dennis Hofheinz">
              <organization/>
            </author>
            <author initials="E." surname="Kiltz" fullname="Eike Kiltz">
              <organization/>
            </author>
            <date year="2006"/>
          </front>
        </reference>
        <reference anchor="GAP" target="https://link.springer.com/content/pdf/10.1007/3-540-44586-2_8.pdf">
          <front>
            <title>The Gap-Problems - a New Class of Problems for the Security of Cryptographic Schemes</title>
            <author initials="T." surname="Okamoto" fullname="Tatsuaki Okamoto">
              <organization/>
            </author>
            <author initials="D." surname="Pointcheval" fullname="David Pointcheval">
              <organization/>
            </author>
            <date year="2001"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-540-44586-9"/>
        </reference>
        <reference anchor="ANSI">
          <front>
            <title>ANSI X9.63 Public Key Cryptography for the Financial Services Industry -- Key Agreement and Key Transport Using Elliptic Curve Cryptography</title>
            <author>
              <organization>American National Standards Institute</organization>
            </author>
            <date year="2001"/>
          </front>
        </reference>
        <reference anchor="IEEE1363">
          <front>
            <title>IEEE 1363a, Standard Specifications for Public Key Cryptography - Amendment 1 -- Additional Techniques"</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2004"/>
          </front>
        </reference>
        <reference anchor="ISO">
          <front>
            <title>ISO/IEC 18033-2, Information Technology - Security Techniques - Encryption Algorithms - Part 2 -- Asymmetric Ciphers</title>
            <author>
              <organization>International Organization for Standardization / International Electrotechnical Commission</organization>
            </author>
            <date year="2006"/>
          </front>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="BHK09" target="https://eprint.iacr.org/2009/418">
          <front>
            <title>Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?</title>
            <author initials="" surname="Mihir Bellare">
              <organization>University of California San Diego</organization>
            </author>
            <author initials="" surname="Dennis Hofheinz">
              <organization>CWI Amsterdam</organization>
            </author>
            <author initials="" surname="Eike Kiltz">
              <organization>CWI Amsterdam</organization>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="SigncryptionDZ10">
          <front>
            <title>Practical Signcryption</title>
            <author>
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="Information Security and" value="Cryptography"/>
          <seriesInfo name="DOI" value="10.1007/978-3-540-89411-7"/>
          <seriesInfo name="ISBN" value="[&quot;9783540894094&quot;, &quot;9783540894117&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="HPKEAnalysis" target="https://eprint.iacr.org/2020/243">
          <front>
            <title>An Analysis of Hybrid Public Key Encryption</title>
            <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
              <organization>Inria Paris</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="ABHKLR20" target="https://eprint.iacr.org/2020/1499">
          <front>
            <title>Analysing the HPKE Standard</title>
            <author initials="J." surname="Alwen" fullname="Joël Alwen">
              <organization>Wickr</organization>
            </author>
            <author initials="B." surname="Blanchet" fullname="Bruno Blanchet">
              <organization>Inria Paris</organization>
            </author>
            <author initials="E." surname="Hauck" fullname="Eduard Hauck">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <author initials="E." surname="Kiltz" fullname="Eike Kiltz">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <author initials="B." surname="Lipp" fullname="Benjamin Lipp">
              <organization>Inria Paris</organization>
            </author>
            <author initials="D." surname="Riepel" fullname="Doreen Riepel">
              <organization>Ruhr-Universität Bochum</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="MAEA10" target="https://ieeexplore.ieee.org/abstract/document/5604194/">
          <front>
            <title>A Comparison of the Standardized Versions of ECIES</title>
            <author initials="V." surname="Gayoso Martinez" fullname="V. Gayoso Martinez">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="F." surname="Hernandez Alvarez" fullname="F. Hernandez Alvarez">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="L." surname="Hernandez Encinas" fullname="L. Hernandez Encinas">
              <organization>Applied Physics Institute, CSIC, Madrid, Spain</organization>
            </author>
            <author initials="C." surname="Sanchez Avila" fullname="C. Sanchez Avila">
              <organization>Polytechnic University, Madrid, Spain</organization>
            </author>
            <date year="2010"/>
          </front>
        </reference>
        <reference anchor="BNT19" target="http://dx.doi.org/10.1007/978-3-030-26948-7_9">
          <front>
            <title>Nonces Are Noticed: AEAD Revisited</title>
            <author initials="M." surname="Bellare" fullname="Mihir Bellare">
              <organization>University of California, San Diego</organization>
            </author>
            <author initials="R." surname="Ng" fullname="Ruth Ng">
              <organization>University of California, San Diego</organization>
            </author>
            <author initials="B." surname="Tackmann" fullname="Björn Tackmann">
              <organization>IBM Research</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="IMB">
          <front>
            <title>Authentication and authenticated key exchanges</title>
            <author fullname="Whitfield Diffie" initials="W." surname="Diffie">
              <organization/>
            </author>
            <author fullname="Paul C. Van Oorschot" initials="P." surname="Van Oorschot">
              <organization/>
            </author>
            <author fullname="Michael J. Wiener" initials="M." surname="Wiener">
              <organization/>
            </author>
            <date month="June" year="1992"/>
          </front>
          <seriesInfo name="Designs, Codes and Cryptography" value="vol. 2, no. 2, pp. 107-125"/>
          <seriesInfo name="DOI" value="10.1007/bf00124891"/>
          <refcontent>Springer Science and Business Media LLC</refcontent>
        </reference>
        <reference anchor="LGR20" target="https://eprint.iacr.org/2020/1491">
          <front>
            <title>Partitioning Oracle Attacks</title>
            <author initials="J." surname="Len" fullname="Julia Len">
              <organization>Cornell Tech</organization>
            </author>
            <author initials="P." surname="Grubbs" fullname="Paul Grubbs">
              <organization>Cornell Tech</organization>
            </author>
            <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
              <organization>Cornell Tech</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TestVectors" target="https://github.com/cfrg/draft-irtf-cfrg-hpke/blob/5f503c564da00b0687b3de75f1dfbdfc4079ad31/test-vectors.json">
          <front>
            <title>HPKE Test Vectors</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="keyagreement">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="NISTCurves">
          <front>
            <title>Digital signature standard (DSS)</title>
            <author>
              <organization/>
            </author>
            <date year="2013"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.186-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="FIPS202">
          <front>
            <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC1421">
          <front>
            <title>Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures</title>
            <author fullname="J. Linn" initials="J." surname="Linn"/>
            <date month="February" year="1993"/>
            <abstract>
              <t>This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1421"/>
          <seriesInfo name="DOI" value="10.17487/RFC1421"/>
        </reference>
        <reference anchor="RFC9420">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="14" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC8439">
          <front>
            <title>ChaCha20 and Poly1305 for IETF Protocols</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This document defines the ChaCha20 stream cipher as well as the use of the Poly1305 authenticator, both as stand-alone algorithms and as a "combined mode", or Authenticated Encryption with Associated Data (AEAD) algorithm.</t>
              <t>RFC 7539, the predecessor of this document, was meant to serve as a stable reference and an implementation guide. It was a product of the Crypto Forum Research Group (CFRG). This document merges the errata filed against RFC 7539 and adds a little text to the Security Considerations section.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8439"/>
          <seriesInfo name="DOI" value="10.17487/RFC8439"/>
        </reference>
        <reference anchor="RFC8937">
          <front>
            <title>Randomness Improvements for Security Protocols</title>
            <author fullname="C. Cremers" initials="C." surname="Cremers"/>
            <author fullname="L. Garratt" initials="L." surname="Garratt"/>
            <author fullname="S. Smyshlyaev" initials="S." surname="Smyshlyaev"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable "cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8937"/>
          <seriesInfo name="DOI" value="10.17487/RFC8937"/>
        </reference>
        <reference anchor="RFC8467">
          <front>
            <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8467"/>
          <seriesInfo name="DOI" value="10.17487/RFC8467"/>
        </reference>
      </references>
    </references>
    <?line 1851?>

<section anchor="differences-from-rfc-9180">
      <name>Differences from RFC 9180</name>
      <t>This specification is intended to be backwards-compatible with RFC 9180, in the
sense that any behavior specified in both this document and RFC 9180 should
specify identical behavior for any functionality that they both specify.</t>
      <t>Within that constraint, the following list summarizes the major changes from RFC
9180:</t>
      <ul spacing="normal">
        <li>
          <t>Incorporated fixes for all valid errata on RFC 9180.</t>
        </li>
        <li>
          <t>Updated the IANA considerations refer to existing registries.</t>
        </li>
        <li>
          <t>Added a framework for single-stage KDFs.</t>
        </li>
        <li>
          <t>Removed the Auth and AuthPSK modes.</t>
        </li>
        <li>
          <t>Extended the discussion of replay to cover considerations related to exported
secrets.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joël Alwen, Jean-Philippe Aumasson, David
Benjamin, Benjamin Beurdouche, Bruno Blanchet, Frank Denis, Stephen Farrell,
Scott Fluhrer, Eduard Hauck, Scott Hollenbeck, Kevin Jacobs, Burt Kaliski, Eike
Kiltz, Julia Len, John Mattsson, Christopher Patton, Doreen Riepel, Raphael
Robert, Michael Rosenberg, Michael Scott, Martin Thomson, Steven Valdez, Riad
Wahby, and other contributors in the CFRG for helpful feedback that greatly
improved this document.</t>
    </section>
    <section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>Each section below contains test vectors for a single HPKE ciphersuite and
contains the following values:</t>
      <ol spacing="normal" type="1"><li>
          <t>Configuration information and private key material: This includes the <tt>mode</tt>, <tt>info</tt> string, HPKE
ciphersuite identifiers (<tt>kem_id</tt>, <tt>kdf_id</tt>, <tt>aead_id</tt>), and all
sender, recipient, and ephemeral key material. For each role X,
where X is one of S, R, or E, as sender, recipient, and ephemeral,
respectively, key pairs are generated as <tt>(skX, pkX) = DeriveKeyPair(ikmX)</tt>.
Each key pair <tt>(skX, pkX)</tt> is written in its serialized form, where
<tt>skXm = SerializePrivateKey(skX)</tt> and <tt>pkXm = SerializePublicKey(pkX)</tt>.
For applicable modes, the shared PSK and PSK identifier are also included.</t>
        </li>
        <li>
          <t>Context creation intermediate values and outputs: This includes the
KEM outputs <tt>enc</tt> and <tt>shared_secret</tt> used to create the context, along
with intermediate values <tt>key_schedule_context</tt> and <tt>secret</tt> computed
in the KeySchedule function in <xref target="encryption-context"/>. The outputs
include the context values <tt>key</tt>, <tt>base_nonce</tt>, and <tt>exporter_secret</tt>.</t>
        </li>
        <li>
          <t>Encryption test vectors: A fixed plaintext message is encrypted using
different sequence numbers and AAD values using the context computed in (2).
Each test vector lists the sequence number and corresponding nonce computed
with <tt>base_nonce</tt>, the plaintext message <tt>pt</tt>, AAD <tt>aad</tt>, and output
ciphertext <tt>ct</tt>.</t>
        </li>
        <li>
          <t>Export test vectors: Several exported values of the same length with differing
context parameters are computed using the context computed in (2). Each test
vector lists the <tt>exporter_context</tt>, output length <tt>L</tt>, and resulting export
value.</t>
        </li>
      </ol>
      <t>These test vectors are also available in JSON format at <xref target="TestVectors"/>.</t>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-aes-128-gcm">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, AES-128-GCM</name>
        <section anchor="base-setup-information">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
7268600d403fce431561aef583ee1613527cff655c1343f29812e66706df3234
pkEm:
37fda3567bdbd628e88668c3c8d7e97d1d1253b6d4ea6d44c150f741f1bf4431
skEm:
52c4a758a802cd8b936eceea314432798d5baf2d7e9235dc084ab1b9cfa2f736
ikmR:
6db9df30aa07dd42ee5e8181afdb977e538f5e1fec8a06223f33f7013e525037
pkRm:
3948cfe0ad1ddb695d780e59077195da6c56506b027329794ab02bca80815c4d
skRm:
4612c550263fc8ad58375df3f557aac531d26850903e55a9f23f21d8534e8ac8
enc:
37fda3567bdbd628e88668c3c8d7e97d1d1253b6d4ea6d44c150f741f1bf4431
shared_secret:
fe0e18c9f024ce43799ae393c7e8fe8fce9d218875e8227b0187c04e7d2ea1fc
key_schedule_context: 00725611c9d98c07c03f60095cd32d400d8347d45ed670
97bbad50fc56da742d07cb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
12fff91991e93b48de37e7daddb52981084bd8aa64289c3788471d9a9712f397
key: 4531685d41d65f03dc48f6b8302c05b0
base_nonce: 56d890e5accaaf011cff4b7d
exporter_secret:
45ff1c2e220db587171952c0592d5f5ebe103f1561a2614e38f2ffd47e99e3f8
]]></artwork>
          <section anchor="encryptions">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 56d890e5accaaf011cff4b7d
ct: f938558b5d72f1a23810b4be2ab4f84331acc02fc97babc53a52ae8218a355a9
6d8770ac83d07bea87e13c512a

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 56d890e5accaaf011cff4b7c
ct: af2d7e9ac9ae7e270f46ba1f975be53c09f8d875bdc8535458c2494e8a6eab25
1c03d0c22a56b8ca42c2063b84

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 56d890e5accaaf011cff4b7f
ct: 498dfcabd92e8acedc281e85af1cb4e3e31c7dc394a1ca20e173cb7251649158
8d96a19ad4a683518973dcc180

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 56d890e5accaaf011cff4b79
ct: 583bd32bc67a5994bb8ceaca813d369bca7b2a42408cddef5e22f880b631215a
09fc0012bc69fccaa251c0246d

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 56d890e5accaaf011cff4b82
ct: 7175db9717964058640a3a11fb9007941a5d1757fda1a6935c805c21af32505b
f106deefec4a49ac38d71c9e0a

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 56d890e5accaaf011cff4a7d
ct: 957f9800542b0b8891badb026d79cc54597cb2d225b54c00c5238c25d05c30e3
fbeda97d2e0e1aba483a2df9f2
]]></artwork>
          </section>
          <section anchor="exported-values">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
3853fe2b4035195a573ffc53856e77058e15d9ea064de3e59f4961d0095250ee

exporter_context: 00
L: 32
exported_value:
2e8f0b54673c7029649d4eb9d5e33bf1872cf76d623ff164ac185da9e88c21a5

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
e9e43065102c3836401bed8c3c3c75ae46be1639869391d62c61f1ec7af54931
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
78628c354e46f3e169bd231be7b2ff1c77aa302460a26dbfa15515684c00130b
pkEm:
0ad0950d9fb9588e59690b74f1237ecdf1d775cd60be2eca57af5a4b0471c91b
skEm:
463426a9ffb42bb17dbe6044b9abd1d4e4d95f9041cef0e99d7824eef2b6f588
ikmR:
d4a09d09f575fef425905d2ab396c1449141463f698f8efdb7accfaff8995098
pkRm:
9fed7e8c17387560e92cc6462a68049657246a09bfa8ade7aefe589672016366
skRm:
c5eb01eb457fe6c6f57577c5413b931550a162c71a03ac8d196babbd4e5ce0fd
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
0ad0950d9fb9588e59690b74f1237ecdf1d775cd60be2eca57af5a4b0471c91b
shared_secret:
727699f009ffe3c076315019c69648366b69171439bd7dd0807743bde76986cd
key_schedule_context: 01e78d5cf6190d275863411ff5edd0dece5d39fa48e04e
ec1ed9b71be34729d18ccb6cffde367bb0565ba28bb02c90744a20f5ef37f3052352
6106f637abb05449
secret:
3728ab0b024b383b0381e432b47cced1496d2516957a76e2a9f5c8cb947afca4
key: 15026dba546e3ae05836fc7de5a7bb26
base_nonce: 9518635eba129d5ce0914555
exporter_secret:
3d76025dbbedc49448ec3f9080a1abab6b06e91c0b11ad23c912f043a0ee7655
]]></artwork>
          <section anchor="encryptions-1">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 9518635eba129d5ce0914555
ct: e52c6fed7f758d0cf7145689f21bc1be6ec9ea097fef4e959440012f4feb73fb
611b946199e681f4cfc34db8ea

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 9518635eba129d5ce0914554
ct: 49f3b19b28a9ea9f43e8c71204c00d4a490ee7f61387b6719db765e948123b45
b61633ef059ba22cd62437c8ba

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 9518635eba129d5ce0914557
ct: 257ca6a08473dc851fde45afd598cc83e326ddd0abe1ef23baa3baa4dd8cde99
fce2c1e8ce687b0b47ead1adc9

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 9518635eba129d5ce0914551
ct: a71d73a2cd8128fcccbd328b9684d70096e073b59b40b55e6419c9c68ae21069
c847e2a70f5d8fb821ce3dfb1c

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 9518635eba129d5ce09145aa
ct: 55f84b030b7f7197f7d7d552365b6b932df5ec1abacd30241cb4bc4ccea27bd2
b518766adfa0fb1b71170e9392

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 9518635eba129d5ce0914455
ct: c5bf246d4a790a12dcc9eed5eae525081e6fb541d5849e9ce8abd92a3bc15517
76bea16b4a518f23e237c14b59
]]></artwork>
          </section>
          <section anchor="exported-values-1">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
dff17af354c8b41673567db6259fd6029967b4e1aad13023c2ae5df8f4f43bf6

exporter_context: 00
L: 32
exported_value:
6a847261d8207fe596befb52928463881ab493da345b10e1dcc645e3b94e2d95

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
8aff52b45a1be3a734bc7a41e20b4e055ad4c4d22104b0c20285a7c4302401cd
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-chacha20poly1305">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, ChaCha20Poly1305</name>
        <section anchor="base-setup-information-1">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
909a9b35d3dc4713a5e72a4da274b55d3d3821a37e5d099e74a647db583a904b
pkEm:
1afa08d3dec047a643885163f1180476fa7ddb54c6a8029ea33f95796bf2ac4a
skEm:
f4ec9b33b792c372c1d2c2063507b684ef925b8c75a42dbcbf57d63ccd381600
ikmR:
1ac01f181fdf9f352797655161c58b75c656a6cc2716dcb66372da835542e1df
pkRm:
4310ee97d88cc1f088a5576c77ab0cf5c3ac797f3d95139c6c84b5429c59662a
skRm:
8057991eef8f1f1af18f4a9491d16a1ce333f695d4db8e38da75975c4478e0fb
enc:
1afa08d3dec047a643885163f1180476fa7ddb54c6a8029ea33f95796bf2ac4a
shared_secret:
0bbe78490412b4bbea4812666f7916932b828bba79942424abb65244930d69a7
key_schedule_context: 00431df6cd95e11ff49d7013563baf7f11588c75a6611e
e2a4404a49306ae4cfc5b69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
5b9cd775e64b437a2335cf499361b2e0d5e444d5cb41a8a53336d8fe402282c6
key:
ad2744de8e17f4ebba575b3f5f5a8fa1f69c2a07f6e7500bc60ca6e3e3ec1c91
base_nonce: 5c4d98150661b848853b547f
exporter_secret:
a3b010d4994890e2c6968a36f64470d3c824c8f5029942feb11e7a74b2921922
]]></artwork>
          <section anchor="encryptions-2">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 5c4d98150661b848853b547f
ct: 1c5250d8034ec2b784ba2cfd69dbdb8af406cfe3ff938e131f0def8c8b60b4db
21993c62ce81883d2dd1b51a28

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 5c4d98150661b848853b547e
ct: 6b53c051e4199c518de79594e1c4ab18b96f081549d45ce015be002090bb119e
85285337cc95ba5f59992dc98c

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 5c4d98150661b848853b547d
ct: 71146bd6795ccc9c49ce25dda112a48f202ad220559502cef1f34271e0cb4b02
b4f10ecac6f48c32f878fae86b

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 5c4d98150661b848853b547b
ct: 63357a2aa291f5a4e5f27db6baa2af8cf77427c7c1a909e0b37214dd47db122b
b153495ff0b02e9e54a50dbe16

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 5c4d98150661b848853b5480
ct: 18ab939d63ddec9f6ac2b60d61d36a7375d2070c9b683861110757062c52b888
0a5f6b3936da9cd6c23ef2a95c

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 5c4d98150661b848853b557f
ct: 7a4a13e9ef23978e2c520fd4d2e757514ae160cd0cd05e556ef692370ca53076
214c0c40d4c728d6ed9e727a5b
]]></artwork>
          </section>
          <section anchor="exported-values-2">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
4bbd6243b8bb54cec311fac9df81841b6fd61f56538a775e7c80a9f40160606e

exporter_context: 00
L: 32
exported_value:
8c1df14732580e5501b00f82b10a1647b40713191b7c1240ac80e2b68808ba69

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
5acb09211139c43b3090489a9da433e8a30ee7188ba8b0a9a1ccf0c229283e53
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-1">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
35706a0b09fb26fb45c39c2f5079c709c7cf98e43afa973f14d88ece7e29c2e3
pkEm:
2261299c3f40a9afc133b969a97f05e95be2c514e54f3de26cbe5644ac735b04
skEm:
0c35fdf49df7aa01cd330049332c40411ebba36e0c718ebc3edf5845795f6321
ikmR:
26b923eade72941c8a85b09986cdfa3f1296852261adedc52d58d2930269812b
pkRm:
13640af826b722fc04feaa4de2f28fbd5ecc03623b317834e7ff4120dbe73062
skRm:
77d114e0212be51cb1d76fa99dd41cfd4d0166b08caa09074430a6c59ef17879
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
2261299c3f40a9afc133b969a97f05e95be2c514e54f3de26cbe5644ac735b04
shared_secret:
4be079c5e77779d0215b3f689595d59e3e9b0455d55662d1f3666ec606e50ea7
key_schedule_context: 016870c4c76ca38ae43efbec0f2377d109499d7ce73f4a
9e1ec37f21d3d063b97cb69c5718a60cc5876c358d3f7fc31ddb598503f67be58ea1
e798c0bb19eb9796
secret:
16974354c497c9bd24c000ceed693779b604f1944975b18c442d373663f4a8cc
key:
600d2fdb0313a7e5c86a9ce9221cd95bed069862421744cfb4ab9d7203a9c019
base_nonce: 112e0465562045b7368653e7
exporter_secret:
73b506dc8b6b4269027f80b0362def5cbb57ee50eed0c2873dac9181f453c5ac
]]></artwork>
          <section anchor="encryptions-3">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 112e0465562045b7368653e7
ct: 4a177f9c0d6f15cfdf533fb65bf84aecdc6ab16b8b85b4cf65a370e07fc1d78d
28fb073214525276f4a89608ff

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 112e0465562045b7368653e6
ct: 5c3cabae2f0b3e124d8d864c116fd8f20f3f56fda988c3573b40b09997fd6c76
9e77c8eda6cda4f947f5b704a8

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 112e0465562045b7368653e5
ct: 14958900b44bdae9cbe5a528bf933c5c990dbb8e282e6e495adf8205d19da9eb
270e3a6f1e0613ab7e757962a4

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 112e0465562045b7368653e3
ct: c2a7bc09ddb853cf2effb6e8d058e346f7fe0fb3476528c80db6b698415c5f8c
50b68a9a355609e96d2117f8d3

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 112e0465562045b736865318
ct: 2414d0788e4bc39a59a26d7bd5d78e111c317d44c37bd5a4c2a1235f2ddc2085
c487d406490e75210c958724a7

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 112e0465562045b7368652e7
ct: c567ae1c3f0f75abe1dd9e4532b422600ed4a6e5b9484dafb1e43ab9f5fd662b
28c00e2e81d3cde955dae7e218
]]></artwork>
          </section>
          <section anchor="exported-values-3">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
813c1bfc516c99076ae0f466671f0ba5ff244a41699f7b2417e4c59d46d39f40

exporter_context: 00
L: 32
exported_value:
2745cf3d5bb65c333658732954ee7af49eb895ce77f8022873a62a13c94cb4e1

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
ad40e3ae14f21c99bfdebc20ae14ab86f4ca2dc9a4799d200f43a25f99fa78ae
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha256-aes-128-gcm">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA256, AES-128-GCM</name>
        <section anchor="base-setup-information-2">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
4270e54ffd08d79d5928020af4686d8f6b7d35dbe470265f1f5aa22816ce860e
pkEm: 04a92719c6195d5085104f469a8b9814d5838ff72b60501e2c4466e5e67b32
5ac98536d7b61a1af4b78e5b7f951c0900be863c403ce65c9bfcb9382657222d18c4
skEm:
4995788ef4b9d6132b249ce59a77281493eb39af373d236a1fe415cb0c2d7beb
ikmR:
668b37171f1072f3cf12ea8a236a45df23fc13b82af3609ad1e354f6ef817550
pkRm: 04fe8c19ce0905191ebc298a9245792531f26f0cece2460639e8bc39cb7f70
6a826a779b4cf969b8a0e539c7f62fb3d30ad6aa8f80e30f1d128aafd68a2ce72ea0
skRm:
f3ce7fdae57e1a310d87f1ebbde6f328be0a99cdbcadf4d6589cf29de4b8ffd2
enc: 04a92719c6195d5085104f469a8b9814d5838ff72b60501e2c4466e5e67b325
ac98536d7b61a1af4b78e5b7f951c0900be863c403ce65c9bfcb9382657222d18c4
shared_secret:
c0d26aeab536609a572b07695d933b589dcf363ff9d93c93adea537aeabb8cb8
key_schedule_context: 00b88d4e6d91759e65e87c470e8b9141113e9ad5f0c8ce
efc1e088c82e6980500798e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
2eb7b6bf138f6b5aff857414a058a3f1750054a9ba1f72c2cf0684a6f20b10e1
key: 868c066ef58aae6dc589b6cfdd18f97e
base_nonce: 4e0bc5018beba4bf004cca59
exporter_secret:
14ad94af484a7ad3ef40e9f3be99ecc6fa9036df9d4920548424df127ee0d99f
]]></artwork>
          <section anchor="encryptions-4">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 4e0bc5018beba4bf004cca59
ct: 5ad590bb8baa577f8619db35a36311226a896e7342a6d836d8b7bcd2f20b6c7f
9076ac232e3ab2523f39513434

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 4e0bc5018beba4bf004cca58
ct: fa6f037b47fc21826b610172ca9637e82d6e5801eb31cbd3748271affd4ecb06
646e0329cbdf3c3cd655b28e82

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 4e0bc5018beba4bf004cca5b
ct: 895cabfac50ce6c6eb02ffe6c048bf53b7f7be9a91fc559402cbc5b8dcaeb52b
2ccc93e466c28fb55fed7a7fec

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 4e0bc5018beba4bf004cca5d
ct: 8787491ee8df99bc99a246c4b3216d3d57ab5076e18fa27133f520703bc70ec9
99dd36ce042e44f0c3169a6a8f

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 4e0bc5018beba4bf004ccaa6
ct: 2ad71c85bf3f45c6eca301426289854b31448bcf8a8ccb1deef3ebd87f60848a
a53c538c30a4dac71d619ee2cd

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 4e0bc5018beba4bf004ccb59
ct: 10f179686aa2caec1758c8e554513f16472bd0a11e2a907dde0b212cbe87d74f
367f8ffe5e41cd3e9962a6afb2
]]></artwork>
          </section>
          <section anchor="exported-values-4">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
5e9bc3d236e1911d95e65b576a8a86d478fb827e8bdfe77b741b289890490d4d

exporter_context: 00
L: 32
exported_value:
6cff87658931bda83dc857e6353efe4987a201b849658d9b047aab4cf216e796

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
d8f1ea7942adbba7412c6d431c62d01371ea476b823eb697e1f6e6cae1dab85a
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-2">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 1
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
2afa611d8b1a7b321c761b483b6a053579afa4f767450d3ad0f84a39fda587a6
pkEm: 04305d35563527bce037773d79a13deabed0e8e7cde61eecee403496959e89
e4d0ca701726696d1485137ccb5341b3c1c7aaee90a4a02449725e744b1193b53b5f
skEm:
57427244f6cc016cddf1c19c8973b4060aa13579b4c067fd5d93a5d74e32a90f
ikmR:
d42ef874c1913d9568c9405407c805baddaffd0898a00f1e84e154fa787b2429
pkRm: 040d97419ae99f13007a93996648b2674e5260a8ebd2b822e84899cd52d874
46ea394ca76223b76639eccdf00e1967db10ade37db4e7db476261fcc8df97c5ffd1
skRm:
438d8bcef33b89e0e9ae5eb0957c353c25a94584b0dd59c991372a75b43cb661
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04305d35563527bce037773d79a13deabed0e8e7cde61eecee403496959e89e
4d0ca701726696d1485137ccb5341b3c1c7aaee90a4a02449725e744b1193b53b5f
shared_secret:
2e783ad86a1beae03b5749e0f3f5e9bb19cb7eb382f2fb2dd64c99f15ae0661b
key_schedule_context: 01b873cdf2dff4c1434988053b7a775e980dd2039ea24f
950b26b056ccedcb933198e486f9c9c09c9b5c753ac72d6005de254c607d1b534ed1
1d493ae1c1d9ac85
secret:
f2f534e55931c62eeb2188c1f53450354a725183937e68c85e68d6b267504d26
key: 55d9eb9d26911d4c514a990fa8d57048
base_nonce: b595dc6b2d7e2ed23af529b1
exporter_secret:
895a723a1eab809804973a53c0ee18ece29b25a7555a4808277ad2651d66d705
]]></artwork>
          <section anchor="encryptions-5">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: b595dc6b2d7e2ed23af529b1
ct: 90c4deb5b75318530194e4bb62f890b019b1397bbf9d0d6eb918890e1fb2be1a
c2603193b60a49c2126b75d0eb

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: b595dc6b2d7e2ed23af529b0
ct: 9e223384a3620f4a75b5a52f546b7262d8826dea18db5a365feb8b997180b22d
72dc1287f7089a1073a7102c27

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: b595dc6b2d7e2ed23af529b3
ct: adf9f6000773035023be7d415e13f84c1cb32a24339a32eb81df02be9ddc6abc
880dd81cceb7c1d0c7781465b2

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: b595dc6b2d7e2ed23af529b5
ct: 1f4cc9b7013d65511b1f69c050b7bd8bbd5a5c16ece82b238fec4f30ba2400e7
ca8ee482ac5253cffb5c3dc577

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: b595dc6b2d7e2ed23af5294e
ct: cdc541253111ed7a424eea5134dc14fc5e8293ab3b537668b8656789628e4589
4e5bb873c968e3b7cdcbb654a4

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: b595dc6b2d7e2ed23af528b1
ct: faf985208858b1253b97b60aecd28bc18737b58d1242370e7703ec33b73a4c31
a1afee300e349adef9015bbbfd
]]></artwork>
          </section>
          <section anchor="exported-values-5">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
a115a59bf4dd8dc49332d6a0093af8efca1bcbfd3627d850173f5c4a55d0c185

exporter_context: 00
L: 32
exported_value:
4517eaede0669b16aac7c92d5762dd459c301fa10e02237cd5aeb9be969430c4

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
164e02144d44b607a7722e58b0f4156e67c0c2874d74cf71da6ca48a4cbdc5e0
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha512-aes-128-gcm">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA512, AES-128-GCM</name>
        <section anchor="base-setup-information-3">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
4ab11a9dd78c39668f7038f921ffc0993b368171d3ddde8031501ee1e08c4c9a
pkEm: 0493ed86735bdfb978cc055c98b45695ad7ce61ce748f4dd63c525a3b8d53a
15565c6897888070070c1579db1f86aaa56deb8297e64db7e8924e72866f9a472580
skEm:
2292bf14bb6e15b8c81a0f45b7a6e93e32d830e48cca702e0affcfb4d07e1b5c
ikmR:
ea9ff7cc5b2705b188841c7ace169290ff312a9cb31467784ca92d7a2e6e1be8
pkRm: 04085aa5b665dc3826f9650ccbcc471be268c8ada866422f739e2d531d4a88
18a9466bc6b449357096232919ec4fe9070ccbac4aac30f4a1a53efcf7af90610edd
skRm:
3ac8530ad1b01885960fab38cf3cdc4f7aef121eaa239f222623614b4079fb38
enc: 0493ed86735bdfb978cc055c98b45695ad7ce61ce748f4dd63c525a3b8d53a1
5565c6897888070070c1579db1f86aaa56deb8297e64db7e8924e72866f9a472580
shared_secret:
02f584736390fc93f5b4ad039826a3fa08e9911bd1215a3db8e8791ba533cafd
key_schedule_context: 005b8a3617af7789ee716e7911c7e77f84cdc4cc46e60f
b7e19e4059f9aeadc00585e26874d1ddde76e551a7679cd47168c466f6e1f705cc93
74c192778a34fcd5ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: 0c7acdab61693f936c4c1256c78e7be30eebfe466812f9cc49f0b58dc970
328dfc03ea359be0250a471b1635a193d2dfa8cb23c90aa2e25025b892a725353eeb
key: 090ca96e5f8aa02b69fac360da50ddf9
base_nonce: 9c995e621bf9a20c5ca45546
exporter_secret: 4a7abb2ac43e6553f129b2c5750a7e82d149a76ed56dc342d7b
ca61e26d494f4855dff0d0165f27ce57756f7f16baca006539bb8e4518987ba61048
0ac03efa8
]]></artwork>
          <section anchor="encryptions-6">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 9c995e621bf9a20c5ca45546
ct: d3cf4984931484a080f74c1bb2a6782700dc1fef9abe8442e44a6f09044c8890
7200b332003543754eb51917ba

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 9c995e621bf9a20c5ca45547
ct: d14414555a47269dfead9fbf26abb303365e40709a4ed16eaefe1f2070f1ddeb
1bdd94d9e41186f124e0acc62d

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 9c995e621bf9a20c5ca45544
ct: 9bba136cade5c4069707ba91a61932e2cbedda2d9c7bdc33515aa01dd0e0f7e9
d3579bf4016dec37da4aafa800

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 9c995e621bf9a20c5ca45542
ct: a531c0655342be013bf32112951f8df1da643602f1866749519f5dcb09cc6843
2579de305a77e6864e862a7600

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 9c995e621bf9a20c5ca455b9
ct: be5da649469efbad0fb950366a82a73fefeda5f652ec7d3731fac6c4ffa21a70
04d2ab8a04e13621bd3629547d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 9c995e621bf9a20c5ca45446
ct: 62092672f5328a0dde095e57435edf7457ace60b26ee44c9291110ec135cb0e1
4b85594e4fea11247d937deb62
]]></artwork>
          </section>
          <section anchor="exported-values-6">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
a32186b8946f61aeead1c093fe614945f85833b165b28c46bf271abf16b57208

exporter_context: 00
L: 32
exported_value:
84998b304a0ea2f11809398755f0abd5f9d2c141d1822def79dd15c194803c2a

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
93fb9411430b2cfa2cf0bed448c46922a5be9beff20e2e621df7e4655852edbc
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-3">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 3
aead_id: 1
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
c11d883d6587f911d2ddbc2a0859d5b42fb13bf2c8e89ef408a25564893856f5
pkEm: 04a307934180ad5287f95525fe5bc6244285d7273c15e061f0f2efb211c350
57f3079f6e0abae200992610b25f48b63aacfcb669106ddee8aa023feed301901371
skEm:
a5901ff7d6931959c2755382ea40a4869b1dec3694ed3b009dda2d77dd488f18
ikmR:
75bfc2a3a3541170a54c0b06444e358d0ee2b4fb78a401fd399a47a33723b700
pkRm: 043f5266fba0742db649e1043102b8a5afd114465156719cea90373229aabd
d84d7f45dabfc1f55664b888a7e86d594853a6cccdc9b189b57839cbbe3b90b55873
skRm:
bc6f0b5e22429e5ff47d5969003f3cae0f4fec50e23602e880038364f33b8522
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04a307934180ad5287f95525fe5bc6244285d7273c15e061f0f2efb211c3505
7f3079f6e0abae200992610b25f48b63aacfcb669106ddee8aa023feed301901371
shared_secret:
2912aacc6eaebd71ff715ea50f6ef3a6637856b2a4c58ea61e0c3fc159e3bc16
key_schedule_context: 01713f73042575cebfd132f0cc4338523f8eae95c80a74
9f7cf3eb9436ff1c612ca62c37df27ca46d2cc162445a92c5f5fdc57bcde129ca7b1
f284b0c12297c037ca221d77e229a9d11b654de7942d685069c633b2362ce3b3d8ea
4891c9a2a87a4eb7cdb289ba5e2ecbf8cd2c8498bb4a383dc021454d70d46fcbbad1
252ef4f9
secret: ff2051d2128d5f3078de867143e076262ce1d0aecafc3fff3d607f1eaff0
5345c7d5ffcb3202cdecb3d1a2f7da20592a237747b6e855390cbe2109d3e6ac70c2
key: 0b910ba8d9cfa17e5f50c211cb32839a
base_nonce: 0c29e714eb52de5b7415a1b7
exporter_secret: 50c0a182b6f94b4c0bd955c4aa20df01f282cc12c43065a0812
fe4d4352790171ed2b2c4756ad7f5a730ba336c8f1edd0089d8331192058c385bae3
9c7cc8b57
]]></artwork>
          <section anchor="encryptions-7">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 0c29e714eb52de5b7415a1b7
ct: 57624b6e320d4aba0afd11f548780772932f502e2ba2a8068676b2a0d3b5129a
45b9faa88de39e8306da41d4cc

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 0c29e714eb52de5b7415a1b6
ct: 159d6b4c24bacaf2f5049b7863536d8f3ffede76302dace42080820fa51925d4
e1c72a64f87b14291a3057e00a

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 0c29e714eb52de5b7415a1b5
ct: bd24140859c99bf0055075e9c460032581dd1726d52cf980d308e9b20083ca62
e700b17892bcf7fa82bac751d0

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 0c29e714eb52de5b7415a1b3
ct: 93ddd55f82e9aaaa3cfc06840575f09d80160b20538125c2549932977d1238dd
e8126a4a91118faf8632f62cb8

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 0c29e714eb52de5b7415a148
ct: 377a98a3c34bf716581b05a6b3fdc257f245856384d5f2241c8840571c52f5c8
5c21138a4a81655edab8fe227d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 0c29e714eb52de5b7415a0b7
ct: cc161f5a179831d456d119d2f2c19a6817289c75d1c61cd37ac8a450acd9efba
02e0ac00d128c17855931ff69a
]]></artwork>
          </section>
          <section anchor="exported-values-7">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
8158bea21a6700d37022bb7802866edca30ebf2078273757b656ef7fc2e428cf

exporter_context: 00
L: 32
exported_value:
6a348ba6e0e72bb3ef22479214a139ef8dac57be34509a61087a12565473da8d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
2f6d4f7a18ec48de1ef4469f596aada4afdf6d79b037ed3c07e0118f8723bffc
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-256-hkdf-sha256-hkdf-sha256-chacha20poly1305">
        <name>DHKEM(P-256, HKDF-SHA256), HKDF-SHA256, ChaCha20Poly1305</name>
        <section anchor="base-setup-information-4">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
f1f1a3bc95416871539ecb51c3a8f0cf608afb40fbbe305c0a72819d35c33f1f
pkEm: 04c07836a0206e04e31d8ae99bfd549380b072a1b1b82e563c935c09582782
4fc1559eac6fb9e3c70cd3193968994e7fe9781aa103f5b50e934b5b2f387e381291
skEm:
7550253e1147aae48839c1f8af80d2770fb7a4c763afe7d0afa7e0f42a5b3689
ikmR:
61092f3f56994dd424405899154a9918353e3e008171517ad576b900ddb275e7
pkRm: 04a697bffde9405c992883c5c439d6cc358170b51af72812333b015621dc0f
40bad9bb726f68a5c013806a790ec716ab8669f84f6b694596c2987cf35baba2a006
skRm:
a4d1c55836aa30f9b3fbb6ac98d338c877c2867dd3a77396d13f68d3ab150d3b
enc: 04c07836a0206e04e31d8ae99bfd549380b072a1b1b82e563c935c095827824
fc1559eac6fb9e3c70cd3193968994e7fe9781aa103f5b50e934b5b2f387e381291
shared_secret:
806520f82ef0b03c823b7fc524b6b55a088f566b9751b89551c170f4113bd850
key_schedule_context: 00b738cd703db7b4106e93b4621e9a19c89c838e559642
40e5d3f331aaf8b0d58b2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
fe891101629aa355aad68eff3cc5170d057eca0c7573f6575e91f9783e1d4506
key:
a8f45490a92a3b04d1dbf6cf2c3939ad8bfc9bfcb97c04bffe116730c9dfe3fc
base_nonce: 726b4390ed2209809f58c693
exporter_secret:
4f9bd9b3a8db7d7c3a5b9d44fdc1f6e37d5d77689ade5ec44a7242016e6aa205
]]></artwork>
          <section anchor="encryptions-8">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 726b4390ed2209809f58c693
ct: 6469c41c5c81d3aa85432531ecf6460ec945bde1eb428cb2fedf7a29f5a685b4
ccb0d057f03ea2952a27bb458b

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 726b4390ed2209809f58c692
ct: f1564199f7e0e110ec9c1bcdde332177fc35c1adf6e57f8d1df24022227ffa87
16862dbda2b1dc546c9d114374

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 726b4390ed2209809f58c691
ct: 39de89728bcb774269f882af8dc5369e4f3d6322d986e872b3a8d074c7c18e85
49ff3f85b6d6592ff87c3f310c

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 726b4390ed2209809f58c697
ct: bc104a14fbede0cc79eeb826ea0476ce87b9c928c36e5e34dc9b6905d91473ec
369a08b1a25d305dd45c6c5f80

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 726b4390ed2209809f58c66c
ct: 8f2814a2c548b3be50259713c6724009e092d37789f6856553d61df23ebc0792
35f710e6af3c3ca6eaba7c7c6c

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 726b4390ed2209809f58c793
ct: b45b69d419a9be7219d8c94365b89ad6951caf4576ea4774ea40e9b7047a09d6
537d1aa2f7c12d6ae4b729b4d0
]]></artwork>
          </section>
          <section anchor="exported-values-8">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
9b13c510416ac977b553bf1741018809c246a695f45eff6d3b0356dbefe1e660

exporter_context: 00
L: 32
exported_value:
6c8b7be3a20a5684edecb4253619d9051ce8583baf850e0cb53c402bdcaf8ebb

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
477a50d804c7c51941f69b8e32fe8288386ee1a84905fe4938d58972f24ac938
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-4">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 16
kdf_id: 1
aead_id: 3
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
e1a4e1d50c4bfcf890f2b4c7d6b2d2aca61368eddc3c84162df2856843e1057a
pkEm: 04f336578b72ad7932fe867cc4d2d44a718a318037a0ec271163699cee653f
a805c1fec955e562663e0c2061bb96a87d78892bff0cc0bad7906c2d998ebe1a7246
skEm:
7d6e4e006cee68af9b3fdd583a0ee8962df9d59fab029997ee3f456cbc857904
ikmR:
ee51dec304abf993ef8fd52aacdd3b539108bbf6e491943266c1de89ec596a17
pkRm: 041eb8f4f20ab72661af369ff3231a733672fa26f385ffb959fd1bae46bfda
43ad55e2d573b880831381d9367417f554ce5b2134fbba5235b44db465feffc6189e
skRm:
12ecde2c8bc2d5d7ed2219c71f27e3943d92b344174436af833337c557c300b3
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 04f336578b72ad7932fe867cc4d2d44a718a318037a0ec271163699cee653fa
805c1fec955e562663e0c2061bb96a87d78892bff0cc0bad7906c2d998ebe1a7246
shared_secret:
ac4f260dce4db6bf45435d9c92c0e11cfdd93743bd3075949975974cc2b3d79e
key_schedule_context: 01622b72afcc3795841596c67ea74400ca3b029374d7d5
640bda367c5d67b3fbeb2e986ea1c671b61cf45eec134dac0bae58ec6f63e790b140
0b47c33038b0269c
secret:
858c8087a1c056db5811e85802f375bb0c19b9983204a1575de4803575d23239
key:
6d61cb330b7771168c8619498e753f16198aad9566d1f1c6c70e2bc1a1a8b142
base_nonce: 0de7655fb65e1cd51a38864e
exporter_secret:
754ca00235b245e72d1f722a7718e7145bd113050a2aa3d89586d4cb7514bfdb
]]></artwork>
          <section anchor="encryptions-9">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 0de7655fb65e1cd51a38864e
ct: 21433eaff24d7706f3ed5b9b2e709b07230e2b11df1f2b1fe07b3c70d5948a53
d6fa5c8bed194020bd9df0877b

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 0de7655fb65e1cd51a38864f
ct: c74a764b4892072ea8c2c56b9bcd46c7f1e9ca8cb0a263f8b40c2ba59ac9c857
033f176019562218769d3e0452

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 0de7655fb65e1cd51a38864c
ct: dc8cd68863474d6e9cbb6a659335a86a54e036249d41acf909e738c847ff2bd3
6fe3fcacda4ededa7032c0a220

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 0de7655fb65e1cd51a38864a
ct: cd54a8576353b1b9df366cb0cc042e46eef6f4cf01e205fe7d47e306b2fdd90f
7185f289a26c613ca094e3be10

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 0de7655fb65e1cd51a3886b1
ct: 6324570c9d542c70c7e70570c1d8f4c52a89484746bf0625441890ededcc80c2
4ef2301c38bfd34d689d19f67d

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 0de7655fb65e1cd51a38874e
ct: 1ea6326c8098ed0437a553c466550114fb2ca1412cca7de98709b9ccdf19206e
52c3d39180e2cf62b3e9f4baf4
]]></artwork>
          </section>
          <section anchor="exported-values-9">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
530bbc2f68f078dccc89cc371b4f4ade372c9472bafe4601a8432cbb934f528d

exporter_context: 00
L: 32
exported_value:
6e25075ddcc528c90ef9218f800ca3dfe1b8ff4042de5033133adb8bd54c401d

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
6f6fbd0d1c7733f796461b3235a856cc34f676fe61ed509dfc18fa16efe6be78
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemp-521-hkdf-sha512-hkdf-sha512-aes-256-gcm">
        <name>DHKEM(P-521, HKDF-SHA512), HKDF-SHA512, AES-256-GCM</name>
        <section anchor="base-setup-information-5">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: 7f06ab8215105fc46aceeb2e3dc5028b44364f960426eb0d8e4026c2f8b5d7
e7a986688f1591abf5ab753c357a5d6f0440414b4ed4ede71317772ac98d9239f709
04
pkEm: 040138b385ca16bb0d5fa0c0665fbbd7e69e3ee29f63991d3e9b5fa740aab8
900aaeed46ed73a49055758425a0ce36507c54b29cc5b85a5cee6bae0cf1c21f2731
ece2013dc3fb7c8d21654bb161b463962ca19e8c654ff24c94dd2898de12051f1ed0
692237fb02b2f8d1dc1c73e9b366b529eb436e98a996ee522aef863dd5739d2f29b0
skEm: 014784c692da35df6ecde98ee43ac425dbdd0969c0c72b42f2e708ab9d5354
15a8569bdacfcc0a114c85b8e3f26acf4d68115f8c91a66178cdbd03b7bcc5291e37
4b
ikmR: 2ad954bbe39b7122529f7dde780bff626cd97f850d0784a432784e69d86ecc
aade43b6c10a8ffdb94bf943c6da479db137914ec835a7e715e36e45e29b587bab3b
f1
pkRm: 0401b45498c1714e2dce167d3caf162e45e0642afc7ed435df7902ccae0e84
ba0f7d373f646b7738bbbdca11ed91bdeae3cdcba3301f2457be452f271fa6837580
e661012af49583a62e48d44bed350c7118c0d8dc861c238c72a2bda17f64704f464b
57338e7f40b60959480c0e58e6559b190d81663ed816e523b6b6a418f66d2451ec64
skRm: 01462680369ae375e4b3791070a7458ed527842f6a98a79ff5e0d4cbde83c2
7196a3916956655523a6a2556a7af62c5cadabe2ef9da3760bb21e005202f7b24628
47
enc: 040138b385ca16bb0d5fa0c0665fbbd7e69e3ee29f63991d3e9b5fa740aab89
00aaeed46ed73a49055758425a0ce36507c54b29cc5b85a5cee6bae0cf1c21f2731e
ce2013dc3fb7c8d21654bb161b463962ca19e8c654ff24c94dd2898de12051f1ed06
92237fb02b2f8d1dc1c73e9b366b529eb436e98a996ee522aef863dd5739d2f29b0
shared_secret: 776ab421302f6eff7d7cb5cb1adaea0cd50872c71c2d63c30c4f1
d5e43653336fef33b103c67e7a98add2d3b66e2fda95b5b2a667aa9dac7e59cc1d46
d30e818
key_schedule_context: 0083a27c5b2358ab4dae1b2f5d8f57f10ccccc822a4733
26f543f239a70aee46347324e84e02d7651a10d08fb3dda739d22d50c53fbfa8122b
aacd0f9ae5913072ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 49fd9f53b0f93732555b2054edfdc0e3101000d75df714b98ce5aa295a37
f1b18dfa86a1c37286d805d3ea09a20b72f93c21e83955a1f01eb7c5eead563d21e7
key:
751e346ce8f0ddb2305c8a2a85c70d5cf559c53093656be636b9406d4d7d1b70
base_nonce: 55ff7a7d739c69f44b25447b
exporter_secret: e4ff9dfbc732a2b9c75823763c5ccc954a2c0648fc6de80a585
81252d0ee3215388a4455e69086b50b87eb28c169a52f42e71de4ca61c920e7bd24c
95cc3f992
]]></artwork>
          <section anchor="encryptions-10">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 55ff7a7d739c69f44b25447b
ct: 170f8beddfe949b75ef9c387e201baf4132fa7374593dfafa90768788b7b2b20
0aafcc6d80ea4c795a7c5b841a

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 55ff7a7d739c69f44b25447a
ct: d9ee248e220ca24ac00bbbe7e221a832e4f7fa64c4fbab3945b6f3af0c5ecd5e
16815b328be4954a05fd352256

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 55ff7a7d739c69f44b254479
ct: 142cf1e02d1f58d9285f2af7dcfa44f7c3f2d15c73d460c48c6e0e506a3144ba
e35284e7e221105b61d24e1c7a

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 55ff7a7d739c69f44b25447f
ct: 3bb3a5a07100e5a12805327bf3b152df728b1c1be75a9fd2cb2bf5eac0cca1fb
80addb37eb2a32938c7268e3e5

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 55ff7a7d739c69f44b254484
ct: 4f268d0930f8d50b8fd9d0f26657ba25b5cb08b308c92e33382f369c768b558e
113ac95a4c70dd60909ad1adc7

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 55ff7a7d739c69f44b25457b
ct: dbbfc44ae037864e75f136e8b4b4123351d480e6619ae0e0ae437f036f2f8f1e
f677686323977a1ccbb4b4f16a
]]></artwork>
          </section>
          <section anchor="exported-values-10">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
05e2e5bd9f0c30832b80a279ff211cc65eceb0d97001524085d609ead60d0412

exporter_context: 00
L: 32
exported_value:
fca69744bb537f5b7a1596dbf34eaa8d84bf2e3ee7f1a155d41bd3624aa92b63

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
f389beaac6fcf6c0d9376e20f97e364f0609a88f1bc76d7328e9104df8477013
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-5">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 18
kdf_id: 3
aead_id: 2
info: 4f6465206f6e2061204772656369616e2055726e
ikmE: f3ebfa9a69a924e672114fcd9e06fa9559e937f7eccce4181a2b506df53dbe
514be12f094bb28e01de19dd345b4f7ede5ad7eaa6b9c3019592ec68eaae9a14732c
e0
pkEm: 040085eff0835cc84351f32471d32aa453cdc1f6418eaaecf1c2824210eb1d
48d0768b368110fab21407c324b8bb4bec63f042cfa4d0868d19b760eb4beba1bff7
93b30036d2c614d55730bd2a40c718f9466faf4d5f8170d22b6df98dfe0c067d02b3
49ae4a142e0c03418f0a1479ff78a3db07ae2c2e89e5840f712c174ba2118e90fdcb
skEm: 012e5cfe0daf5fe2a1cd617f4c4bae7c86f1f527b3207f115e262a98cc6526
8ec88cb8645aec73b7aa0a472d0292502d1078e762646e0c093cf873243d12c39915
f6
ikmR: a2a2458705e278e574f835effecd18232f8a4c459e7550a09d44348ae5d3b1
ea9d95c51995e657ad6f7cae659f5e186126a471c017f8f5e41da9eba74d4e0473e1
79
pkRm: 04006917e049a2be7e1482759fb067ddb94e9c4f7f5976f655088dec452466
14ff924ed3b385fc2986c0ecc39d14f907bf837d7306aada59dd5889086125ecd038
ead400603394b5d81f89ebfd556a898cc1d6a027e143d199d3db845cb91c5289fb26
c5ff80832935b0e8dd08d37c6185a6f77683347e472d1edb6daa6bd7652fea628fae
skRm: 011bafd9c7a52e3e71afbdab0d2f31b03d998a0dc875dd7555c63560e142bd
e264428de03379863b4ec6138f813fa009927dc5d15f62314c56d4e7ff2b485753eb
72
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc: 040085eff0835cc84351f32471d32aa453cdc1f6418eaaecf1c2824210eb1d4
8d0768b368110fab21407c324b8bb4bec63f042cfa4d0868d19b760eb4beba1bff79
3b30036d2c614d55730bd2a40c718f9466faf4d5f8170d22b6df98dfe0c067d02b34
9ae4a142e0c03418f0a1479ff78a3db07ae2c2e89e5840f712c174ba2118e90fdcb
shared_secret: 0d52de997fdaa4797720e8b1bebd3df3d03c4cf38cc8c1398168d
36c3fc7626428c9c254dd3f9274450909c64a5b3acbe45e2d850a2fd69ac0605fe5c
8a057a5
key_schedule_context: 0124497637cf18d6fbcc16e9f652f00244c981726f293b
b7819861e85e50c94f0be30e022ab081e18e6f299fd3d3d976a4bc590f85bc7711bf
ce32ee1a7fb1c154ef45baa1f3a4b169e141feb957e48d03f28c837d8904c3d67753
08c3d3faa75dd64adfa44e1a1141edf9349959b8f8e5291cbdc56f62b0ed6527d692
e85b09a4
secret: 2cf425e26f65526afc0634a3dba4e28d980c1015130ce07c2ac7530d7a39
1a75e5a0db428b09f27ad4d975b4ad1e7f85800e03ffeea35e8cf3fe67b18d4a1345
key:
f764a5a4b17e5d1ffba6e699d65560497ebaea6eb0b0d9010a6d979e298a39ff
base_nonce: 479afdf3546ddba3a9841f38
exporter_secret: 5c3d4b65a13570502b93095ef196c42c8211a4a188c4590d358
63665c705bb140ecba6ce9256be3fad35b4378d41643867454612adfd0542a684b61
799bf293f
]]></artwork>
          <section anchor="encryptions-11">
            <name>Encryptions</name>
            <artwork><![CDATA[
sequence number: 0
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d30
nonce: 479afdf3546ddba3a9841f38
ct: de69e9d943a5d0b70be3359a19f317bd9aca4a2ebb4332a39bcdfc97d5fe62f3
a77702f4822c3be531aa7843a1

sequence number: 1
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d31
nonce: 479afdf3546ddba3a9841f39
ct: 77a16162831f90de350fea9152cfc685ecfa10acb4f7994f41aed43fa5431f23
82d078ec88baec53943984553e

sequence number: 2
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d32
nonce: 479afdf3546ddba3a9841f3a
ct: f1d48d09f126b9003b4c7d3fe6779c7c92173188a2bb7465ba43d899a6398a33
3914d2bb19fd769d53f3ec7336

sequence number: 4
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d34
nonce: 479afdf3546ddba3a9841f3c
ct: 829b11c082b0178082cd595be6d73742a4721b9ac05f8d2ef8a7704a53022d82
bd0d8571f578c5c13b99eccff8

sequence number: 255
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323535
nonce: 479afdf3546ddba3a9841fc7
ct: a3ee291e20f37021e82df14d41f3fbe98b27c43b318a36cacd8471a3b1051ab1
2ee055b62ded95b72a63199a3f

sequence number: 256
pt: 4265617574792069732074727574682c20747275746820626561757479
aad: 436f756e742d323536
nonce: 479afdf3546ddba3a9841e38
ct: eecc2173ce1ac14b27ee67041e90ed50b7809926e55861a579949c07f6d26137
bf9cf0d097f60b5fd2fbf348ec
]]></artwork>
          </section>
          <section anchor="exported-values-11">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
62691f0f971e34de38370bff24deb5a7d40ab628093d304be60946afcdb3a936

exporter_context: 00
L: 32
exported_value:
76083c6d1b6809da088584674327b39488eaf665f0731151128452e04ce81bff

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
0c7cfc0976e25ae7680cf909ae2de1859cd9b679610a14bec40d69b91785b2f6
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="dhkemx25519-hkdf-sha256-hkdf-sha256-export-only-aead">
        <name>DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, Export-Only AEAD</name>
        <section anchor="base-setup-information-6">
          <name>Base Setup Information</name>
          <artwork><![CDATA[
mode: 0
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
55bc245ee4efda25d38f2d54d5bb6665291b99f8108a8c4b686c2b14893ea5d9
pkEm:
e5e8f9bfff6c2f29791fc351d2c25ce1299aa5eaca78a757c0b4fb4bcd830918
skEm:
095182b502f1f91f63ba584c7c3ec473d617b8b4c2cec3fad5af7fa6748165ed
ikmR:
683ae0da1d22181e74ed2e503ebf82840deb1d5e872cade20f4b458d99783e31
pkRm:
194141ca6c3c3beb4792cd97ba0ea1faff09d98435012345766ee33aae2d7664
skRm:
33d196c830a12f9ac65d6e565a590d80f04ee9b19c83c87f2c170d972a812848
enc:
e5e8f9bfff6c2f29791fc351d2c25ce1299aa5eaca78a757c0b4fb4bcd830918
shared_secret:
e81716ce8f73141d4f25ee9098efc968c91e5b8ce52ffff59d64039e82918b66
key_schedule_context: 009bd09219212a8cf27c6bb5d54998c5240793a70ca0a8
92234bd5e082bc619b6a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
04d64e0620aa047e9ab833b0ebcd4ff026cefbe44338fd7d1a93548102ee01af
key:
base_nonce:
exporter_secret:
79dc8e0509cf4a3364ca027e5a0138235281611ca910e435e8ed58167c72f79b
]]></artwork>
          <section anchor="exported-values-12">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
7a36221bd56d50fb51ee65edfd98d06a23c4dc87085aa5866cb7087244bd2a36

exporter_context: 00
L: 32
exported_value:
d5535b87099c6c3ce80dc112a2671c6ec8e811a2f284f948cec6dd1708ee33f0

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
ffaabc85a776136ca0c378e5d084c9140ab552b78f039d2e8775f26efff4c70e
]]></artwork>
          </section>
        </section>
        <section anchor="psk-setup-information-6">
          <name>PSK Setup Information</name>
          <artwork><![CDATA[
mode: 1
kem_id: 32
kdf_id: 1
aead_id: 65535
info: 4f6465206f6e2061204772656369616e2055726e
ikmE:
c51211a8799f6b8a0021fcba673d9c4067a98ebc6794232e5b06cb9febcbbdf5
pkEm:
d3805a97cbcd5f08babd21221d3e6b362a700572d14f9bbeb94ec078d051ae3d
skEm:
1d72396121a6a826549776ef1a9d2f3a2907fc6a38902fa4e401afdb0392e627
ikmR:
5e0516b1b29c0e13386529da16525210c796f7d647c37eac118023a6aa9eb89a
pkRm:
d53af36ea5f58f8868bb4a1333ed4cc47e7a63b0040eb54c77b9c8ec456da824
skRm:
98f304d4ecb312689690b113973c61ffe0aa7c13f2fbe365e48f3ed09e5a6a0c
psk:
0247fd33b913760fa1fa51e1892d9f307fbe65eb171e8132c2af18555a738b82
psk_id: 456e6e796e20447572696e206172616e204d6f726961
enc:
d3805a97cbcd5f08babd21221d3e6b362a700572d14f9bbeb94ec078d051ae3d
shared_secret:
024573db58c887decb4c57b6ed39f2c9a09c85600a8a0ecb11cac24c6aaec195
key_schedule_context: 01446fb1fe2632a0a338f0a85ed1f3a0ac475bdea2cd72
f8c713b3a46ee737379a3f4c22aa6d9a0424c2b4292fdf43b8257df93c2f6adbf6dd
c9c64fee26bdd292
secret:
638b94532e0d0bf812cf294f36b97a5bdcb0299df36e22b7bb6858e3c113080b
key:
base_nonce:
exporter_secret:
04261818aeae99d6aba5101bd35ddf3271d909a756adcef0d41389d9ed9ab153
]]></artwork>
          <section anchor="exported-values-13">
            <name>Exported Values</name>
            <artwork><![CDATA[
exporter_context:
L: 32
exported_value:
be6c76955334376aa23e936be013ba8bbae90ae74ed995c1c6157e6f08dd5316

exporter_context: 00
L: 32
exported_value:
1721ed2aa852f84d44ad020c2e2be4e2e6375098bf48775a533505fd56a3f416

exporter_context: 54657374436f6e74657874
L: 32
exported_value:
7c9d79876a288507b81a5a52365a7d39cc0fa3f07e34172984f96fec07c44cba
]]></artwork>
          </section>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
