<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-connolly-cfrg-sha3-hpke-00" category="info" consensus="true" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="sha3-hpke">SHA-3 for HPKE</title>
    <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-sha3-hpke-00"/>
    <author fullname="Deirdre Connolly">
      <organization>SandboxAQ</organization>
      <address>
        <email>durumcrustulum@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area/>
    <workgroup>Crypto Forum</workgroup>
    <keyword>hpke</keyword>
    <keyword>hybrid encryption</keyword>
    <keyword>KDF</keyword>
    <keyword>SHA3</keyword>
    <abstract>
      <?line 39?>

<t>This document defines Secure Hashing Algorithm-3 (SHA-3) options for Hybrid
Public-Key Encryption (HPKE) as registered KDFs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dconnolly.github.io/draft-connolly-cfrg-sha3-hpke/draft-connolly-cfrg-sha3-hpke.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-connolly-cfrg-sha3-hpke/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Crypto Forum  mailing list (<eref target="mailto:cfrg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cfrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cfrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dconnolly/draft-connolly-cfrg-sha3-hpke"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TODO Introduction</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests/registers three new entries to the "HPKE KDF
Identifiers" registry.</t>
      <dl>
        <dt>Value:</dt>
        <dd>
          <t>0x0004 (please)
KDF:</t>
        </dd>
        <dt/>
        <dd>
          <t>SHA3-256
Nh: The output size of the Extract function in bytes</t>
        </dd>
        <dt/>
        <dd>
          <t>32
Reference:</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="FIPS202"/></t>
        </dd>
        <dt>Value:</dt>
        <dd>
          <t>0x0005 (please)
KDF:</t>
        </dd>
        <dt/>
        <dd>
          <t>SHA3-384
Nh: The output size of the Extract function in bytes</t>
        </dd>
        <dt/>
        <dd>
          <t>48
Reference:</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="FIPS202"/></t>
        </dd>
        <dt>Value:</dt>
        <dd>
          <t>0x0006 (please)
KDF:</t>
        </dd>
        <dt/>
        <dd>
          <t>SHA3-512
Nh: The output size of the Extract function in bytes</t>
        </dd>
        <dt/>
        <dd>
          <t>64
Reference:</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="FIPS202"/></t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC9180">
        <front>
          <title>Hybrid Public Key Encryption</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
          <author fullname="B. Lipp" initials="B." surname="Lipp"/>
          <author fullname="C. Wood" initials="C." surname="Wood"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
            <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9180"/>
        <seriesInfo name="DOI" value="10.17487/RFC9180"/>
      </reference>
      <reference anchor="FIPS202">
        <front>
          <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
          <author>
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
        <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 114?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
