<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
<xep xmlns="">
<header>
  <title>Cryptographic Design of Encrypted Sessions</title>
  <abstract>This document describes the cryptographic design that underpins the XMPP protocol extensions Encrypted Session Negotiation, Offline Encrypted Sessions and Stanza Encryption.</abstract>
  
<legal>
<copyright>This XMPP Extension Protocol is copyright © 1999 – 2024 by the <link url="https://xmpp.org/">XMPP Standards Foundation</link> (XSF).</copyright>
<permissions>Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the "Specification"), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specification, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or substantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or publisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation.</permissions>
<warranty>## NOTE WELL: This Specification is provided on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. ##</warranty>
<liability>In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall the XMPP Standards Foundation or any author of this Specification be liable for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising from, out of, or in connection with the Specification or the implementation, deployment, or other use of the Specification (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if the XMPP Standards Foundation or such author has been advised of the possibility of such damages.</liability>
<conformance>This XMPP Extension Protocol has been contributed in full conformance with the XSF's Intellectual Property Rights Policy (a copy of which can be found at &lt;<link url="https://xmpp.org/about/xsf/ipr-policy">https://xmpp.org/about/xsf/ipr-policy</link>&gt; or obtained by writing to XMPP Standards Foundation, P.O. Box 787, Parker, CO 80134 USA).</conformance>
</legal>
  <number>0188</number>
  <status>Deferred</status>
  <type>Informational</type>
  <sig>Standards</sig>
  <approver>Council</approver>
  <dependencies>
    <spec>XMPP Core</spec>
    <spec>XMPP IM</spec>
    <spec>RFC 2104</spec>
  </dependencies>
  <supersedes/>
  <supersededby/>
  <shortname>N/A</shortname>
  
  <author>
    <firstname>Ian</firstname>
    <surname>Paterson</surname>
    <email>ian.paterson@clientside.co.uk</email>
    <jid>ian@zoofy.com</jid>
  </author>

  <revision>
    <version>0.6</version>
    <date>2007-05-30</date>
    <initials>ip</initials>
    <remark><p>SIGMA-R negotiates both isPKA and isPKB fields</p></remark>
  </revision>
  <revision>
    <version>0.5</version>
    <date>2007-04-20</date>
    <initials>ip</initials>
    <remark><p>Moved requirements, approach and scope to new XEP-0210</p></remark>
  </revision>
  <revision>
    <version>0.4</version>
    <date>2007-03-15</date>
    <initials>ip</initials>
    <remark><p>Incorporated whole forms into SAS calculation</p></remark>
  </revision>
  <revision>
    <version>0.3</version>
    <date>2006-11-27</date>
    <initials>ip</initials>
    <remark><p>Added PKI Independence and Robustness requirements; added optional public key independence, hash commitment, SAS authentication, retained secrets and other secrets to SIGMA-R key exchange</p></remark>
  </revision>
  <revision>
    <version>0.2</version>
    <date>2006-07-19</date>
    <initials>ip</initials>
    <remark><p>Removed public key IDs from Offline options</p></remark>
  </revision>
  <revision>
    <version>0.1</version>
    <date>2006-07-18</date>
    <initials>ip</initials>
    <remark><p>Initial version (extracted from XEP-0116 version 0.9).</p></remark>
  </revision>
</header>

<section1 topic="Introduction" anchor="intro">
  <p><em>Note: The protocols developed according to the cryptographic design described in this document are described in <span class="ref"><link url="https://xmpp.org/extensions/xep-0116.html">Encrypted Session Negotiation (XEP-0116)</link></span> <note>XEP-0116: Encrypted Session Negotiation &lt;<link url="https://xmpp.org/extensions/xep-0116.html">https://xmpp.org/extensions/xep-0116.html</link>&gt;.</note>, <span class="ref"><link url="https://xmpp.org/extensions/xep-0217.html">Simplified Encrypted Session Negotiation (XEP-0217)</link></span> <note>XEP-0217: Simplified Encrypted Session Negotiation &lt;<link url="https://xmpp.org/extensions/xep-0217.html">https://xmpp.org/extensions/xep-0217.html</link>&gt;.</note>, <span class="ref"><link url="https://xmpp.org/extensions/xep-0187.html">Offline Encrypted Sessions (XEP-0187)</link></span> <note>XEP-0187: Offline Encrypted Sessions &lt;<link url="https://xmpp.org/extensions/xep-0187.html">https://xmpp.org/extensions/xep-0187.html</link>&gt;.</note> and <span class="ref"><link url="https://xmpp.org/extensions/xep-0200.html">Stanza Encryption (XEP-0200)</link></span> <note>XEP-0200: Stanza Encryption &lt;<link url="https://xmpp.org/extensions/xep-0200.html">https://xmpp.org/extensions/xep-0200.html</link>&gt;.</note>. The information in those documents should be sufficient for implementors. This purely informative document is primarily for people interested in the design and analysis of those protocols.</em></p>
	<p>As specified in <span class="ref"><link url="http://tools.ietf.org/html/rfc3920">RFC 3920</link></span> <note>RFC 3920: Extensible Messaging and Presence Protocol (XMPP): Core &lt;<link url="http://tools.ietf.org/html/rfc3920">http://tools.ietf.org/html/rfc3920</link>&gt;.</note>, XMPP is an XML streaming protocol that enables the near-real-time exchange of XML fragments between any two (or more) network endpoints. To date, the main application built on top of the core XML streaming layer is instant messaging (IM) and presence, the base extensions for which are specified in <span class="ref"><link url="http://tools.ietf.org/html/rfc3921">RFC 3921</link></span> <note>RFC 3921: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence &lt;<link url="http://tools.ietf.org/html/rfc3921">http://tools.ietf.org/html/rfc3921</link>&gt;.</note>. There are three first-level elements of XML streams (&lt;message/&gt;, &lt;presence/&gt;, and &lt;iq/&gt;); each of these "XML stanza" types has different semantics, which can complicate the task of defining a generalized approach to end-to-end encryption for XMPP. In addition, XML stanzas can be extended (via properly-namespaced child elements) for a wide variety of functionality.</p>
  <p>XMPP is a session-oriented communication technology: normally, a client authenticates with a server and maintains a long-lived connection that defines the client's XMPP session. Such stream-level sessions may be secured via channel encryption using Transport Level Security (<span class="ref"><link url="http://tools.ietf.org/html/rfc2246">RFC 2246</link></span> <note>RFC 2246: The TLS Protocol Version 1.0 &lt;<link url="http://tools.ietf.org/html/rfc2246">http://tools.ietf.org/html/rfc2246</link>&gt;.</note>), as specified in Section 5 of <span class="ref"><link url="http://tools.ietf.org/html/rfc3920">RFC 3920</link></span> <note>RFC 3920: Extensible Messaging and Presence Protocol (XMPP): Core &lt;<link url="http://tools.ietf.org/html/rfc3920">http://tools.ietf.org/html/rfc3920</link>&gt;.</note>. However, there is no guarantee that all hops will implement or enforce channel encryption (or that intermediate servers are trustworthy), which makes end-to-end encryption desirable.</p>
  <p>This document specifies a method for encrypted sessions ("ESessions") that takes advantage of the inherent possibilities and strengths of session encryption as opposed to object encryption. The detailed requirements for encrypted sessions are defined in <span class="ref"><link url="https://xmpp.org/extensions/xep-0210.html">Requirements for Encrypted Sessions (XEP-0210)</link></span> <note>XEP-0210: Requirements for Encrypted Sessions &lt;<link url="https://xmpp.org/extensions/xep-0210.html">https://xmpp.org/extensions/xep-0210.html</link>&gt;.</note>.</p>
	<p>The conceptual model for the approach specified in this document was inspired by "off-the-record" (OTR) communication, as implemented in the Gaim encryption plugin and described in <span class="ref"><link url="http://www.cypherpunks.ca/otr/otr-codecon.pdf">Off-the-Record Communication</link></span> <note>Off-the-Record Communication, or, Why Not to Use PGP &lt;<link url="http://www.cypherpunks.ca/otr/otr-codecon.pdf">http://www.cypherpunks.ca/otr/otr-codecon.pdf</link>&gt; &lt;<link url="http://www.cypherpunks.ca/otr/otr-wpes.pdf">http://www.cypherpunks.ca/otr/otr-wpes.pdf</link>&gt;.</note>. The basic concept is that of an encrypted session which acts as a secure tunnel between two endpoints. Once the tunnel is established, the content of all one-to-one XML stanzas exchanged between the endpoints will be encrypted and then transmitted within a "wrapper" protocol element.</p>
  <p>Note: In order to gain a thorough understanding of this document, it is recommended that the <cite>Off-the-Record Communication</cite> paper and <span class="ref"><link url="http://tools.ietf.org/html/rfc6189">RFC 6189</link></span> <note>RFC 6189: ZRTP: Media Path Key Agreement for Unicast Secure RTP &lt;<link url="http://tools.ietf.org/html/rfc6189">http://tools.ietf.org/html/rfc6189</link>&gt;.</note> are read first.</p>
</section1>

<section1 topic="Dramatis Personae" anchor="personae">
  <p>This document introduces two characters to help the reader follow the necessary exchanges:</p>
  <ol start="1">
    <li>"Alice" is the name of the initiator of the ESession.</li>
    <li>"Bob" is the name of the other participant in the ESession started by Alice.</li>
  </ol>
  <p>While Alice and Bob are introduced as "end users", they are simply meant to be examples of XMPP entities. Any directly addressable XMPP entity may participate in an ESession.</p>
</section1>

<section1 topic="Cryptographic Origins" anchor="foundations">
  <section2 topic="Introduction" anchor="foundations-intro">
    <p>Authenticated key-exchange is the most challenging part of the design of any secure communication protocol. The ESessions key exchange essentially translates the <span class="ref"><link url="http://web.archive.org/web/20040409013835/http://www.ee.technion.ac.il/~hugo/sigma.ps">SIGMA</link></span> <note>SIGMA: the 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols (Hugo Krawczyk, June 12 2003) &lt;<link url="http://web.archive.org/web/20040409013835/http://www.ee.technion.ac.il/~hugo/sigma.ps">http://www.ee.technion.ac.il/~hugo/sigma.ps</link>&gt;.</note><note>Like <span class="ref"><link url="http://tools.ietf.org/html/rfc2409">RFC 2409</link></span> <note>RFC 2409: The Internet Key Exchange (IKE) &lt;<link url="http://tools.ietf.org/html/rfc2409">http://tools.ietf.org/html/rfc2409</link>&gt;.</note>, this protocol uses <em>variant (ii)</em>, as described in Secion 5.4 of the <cite>SIGMA</cite> paper.</note> key-exchange protocol into the syntax of XMPP. The SIGMA approach to Diffie-Hellman Key Agreement (see <span class="ref"><link url="http://tools.ietf.org/html/rfc2631">RFC 2631</link></span> <note>RFC 2631: Diffie-Hellman Key Agreement Method &lt;<link url="http://tools.ietf.org/html/rfc2631">http://tools.ietf.org/html/rfc2631</link>&gt;.</note>) underpins several standard key-exchange protocols including the Internet Key Exchange (IKE) protocol versions 1 and 2 (see <span class="ref"><link url="http://tools.ietf.org/html/rfc2409">RFC 2409</link></span> <note>RFC 2409: The Internet Key Exchange (IKE) &lt;<link url="http://tools.ietf.org/html/rfc2409">http://tools.ietf.org/html/rfc2409</link>&gt;.</note> and <span class="ref"><link url="http://tools.ietf.org/html/rfc4306">RFC 4306</link></span> <note>RFC 4306: Internet Key Exchange (IKEv2) Protocol &lt;<link url="http://tools.ietf.org/html/rfc4306">http://tools.ietf.org/html/rfc4306</link>&gt;.</note>).</p>
    <p>Note: Although this section provides an overview of SIGMA, it is strongly recommended that the <cite>SIGMA</cite> paper is read first in order to gain a thorough understanding of this document.</p>
    <p>The 3-message SIGMA-I-based key exchange protects the identity of the <em>initiator</em> against active attacks. This SHOULD NOT be used to establish client to client sessions since the <em>responder's</em> identity is not protected against active attacks. However, it SHOULD be used to establish client to service (server) sessions, especially where the identity of the service is well known to third parties.</p>
    <p>The two 4-message SIGMA-R-based key exchanges with hash commitment defend the <em>responder's</em> identity against active attacks and facilitate detection of a Man in the Middle attack. They SHOULD be used to establish client to client sessions.</p>
    <p>Note: The block cipher function, <em>cipher</em>, uses CTR mode.</p>
  </section2>
  <section2 topic="SIGMA Parameter Descriptions" anchor="foundations-parameters">
    <table caption="SIGMA and SAS Overview Parameters">
      <tr>
        <th>Parameter</th>
        <th>Description</th>
      </tr>
      <tr>
        <td>g</td>
        <td>Diffie-Hellman generator</td>
      </tr>
      <tr>
        <td>x, y</td>
        <td>Alice and Bob's private Diffie-Hellman keys</td>
      </tr>
      <tr>
        <td>g<span class="super">x</span>, g<span class="super">y</span></td>
        <td>Alice and Bob's public Diffie-Hellman keys</td>
      </tr>
      <tr>
        <td>Hg<span class="super">x</span></td>
        <td>Hash of Alice's public Diffie-Hellman key</td>
      </tr>
      <tr>
        <td>KS<span class="sub">A</span>, KS<span class="sub">B</span></td>
        <td>The MAC keys (derived from K) that Alice and Bob use to calculate mac<span class="sub">A</span> and mac<span class="sub">B</span></td>
      </tr>
      <tr>
        <td>pubKey<span class="sub">A</span>, pubKey<span class="sub">B</span></td>
        <td>The public keys that represent the identity of Alice and Bob, and are used to verify their signatures</td>
      </tr>
      <tr>
        <td>mac<span class="sub">A</span>, mac<span class="sub">B</span></td>
        <td>The MAC values that associate the shared secret with the identity of Alice or Bob</td>
      </tr>
      <tr>
        <td>signKey<span class="sub">A</span>, signKey<span class="sub">B</span></td>
        <td>The private keys that Alice and Bob use to sign</td>
      </tr>
      <tr>
        <td>sign<span class="sub">A</span>, sign<span class="sub">B</span></td>
        <td>Alice's and Bob's signatures of the shared secret</td>
      </tr>
      <tr>
        <td>KC<span class="sub">A</span>, KC<span class="sub">B</span></td>
        <td>The cipher keys (derived from K) that Alice and Bob use to encrypt</td>
      </tr>
      <tr>
        <td>ID<span class="sub">A</span>, ID<span class="sub">B</span></td>
        <td>The encrypted parameters that identify Alice and Bob to each other</td>
      </tr>
      <tr>
        <td>SAS</td>
        <td>Short Authentication String</td>
      </tr>
    </table>
    <table caption="Key Exchange Parameters">
      <tr>
        <th>Parameter</th>
        <th>Description</th>
      </tr>
      <tr>
        <td>p</td>
        <td>Diffie-Hellman prime</td>
      </tr>
      <tr>
        <td>e, d</td>
        <td>Alice and Bob's public Diffie-Hellman keys (the same as g<span class="super">x</span>, g<span class="super">y</span>)</td>
      </tr>
      <tr>
        <td>He</td>
        <td>Hash of Alice's public Diffie-Hellman key</td>
      </tr>
      <tr>
        <td>K</td>
        <td>Shared secret (derived by Alice from g<span class="super">y</span> and x, or by Bob from g<span class="super">x</span> and y)</td>
      </tr>
      <tr>
        <td>HASH</td>
        <td>Selected hash algorithm</td>
      </tr>
      <tr>
        <td>N<span class="sub">A</span>, N<span class="sub">B</span></td>
        <td>Alice and Bob's session freshness nonces (ESession IDs)</td>
      </tr>
      <tr>
        <td>C<span class="sub">A</span>, C<span class="sub">B</span></td>
        <td>Block cipher initial counter value for blocks sent by Alice and Bob</td>
      </tr>
      <tr>
        <td>n</td>
        <td>Block size of selected cipher algorithm in bits</td>
      </tr>
      <tr>
        <td>KM<span class="sub">A</span>, KM<span class="sub">B</span></td>
        <td>The MAC keys (derived from K) that Alice and Bob use to protect the integrity of encrypted data</td>
      </tr>
      <tr>
        <td>M<span class="sub">A</span>, M<span class="sub">B</span></td>
        <td>The MAC values that Alice and Bob use to confirm the integrity of encrypted data</td>
      </tr>
      <tr>
        <td>SRS</td>
        <td>Shared retained secret (derived from K in previous session between the clients)</td>
      </tr>
      <tr>
        <td>RS<span class="sub">1A</span>...RS<span class="sub">ZA</span></td>
        <td>Retained secrets Alice shares with Bob (one for each client he uses)</td>
      </tr>
      <tr>
        <td>RS<span class="sub">1B</span>...RS<span class="sub">ZB</span></td>
        <td>Retained secrets Bob shares with Alice (one for each client she uses)</td>
      </tr>
      <tr>
        <td>RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span></td>
        <td>HMACs of retained secrets Alice shares with Bob</td>
      </tr>
      <tr>
        <td>SRSH</td>
        <td>Bob's HMAC of SRS</td>
      </tr>
      <tr>
        <td>OSS</td>
        <td>Other shared secret of Alice and Bob (e.g. a shared password) defaults to "secret"</td>
      </tr>
      <tr>
        <td>isPK<span class="sub">A</span>, isPK<span class="sub">B</span></td>
        <td>Whether or not Alice and Bob prefer to <em>receive</em> a public key (booleans)</td>
      </tr>
    </table>
  </section2>

  <section2 topic="SIGMA-I Overview" anchor="foundations-skeleton-i">
    <p>The diagram below demonstrates the barest cryptographic skeleton of the SIGMA-I key exchange protocol. Here Bob allows Alice to protect her identity from active attacks, by allowing her to authenticate him before she communicates her identity. Note: The cipher keys (KC<span class="sub">A</span> and KC<span class="sub">B</span>) are different in each direction, making this exchange slightly more conservative than <cite>SIGMA</cite>.</p>
    <code>
<strong>ALICE</strong>                                                <strong>BOB</strong> 
                                            g<span class="super">x</span>
                                      ------------&gt;

                                                     mac<span class="sub">B</span> = <em>HMAC</em>(KS<span class="sub">B</span>, {g<span class="super">x</span>, g<span class="super">y</span>, pubKey<span class="sub">B</span>})
                                                     sign<span class="sub">B</span> = <em>sign</em>(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                                     ID<span class="sub">B</span> = <em>cipher</em>(KC<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                         g<span class="super">y</span>, ID<span class="sub">B</span> 
                                      &lt;------------

<em>authenticate</em>(ID<span class="sub">B</span>) 
mac<span class="sub">A</span> = <em>HMAC</em>(KS<span class="sub">A</span>, {g<span class="super">y</span>, g<span class="super">x</span>, pubKey<span class="sub">A</span>})
sign<span class="sub">A</span> = <em>sign</em>(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
ID<span class="sub">A</span> = <em>cipher</em>(KC<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
                                            ID<span class="sub">A</span>
                                      ------------&gt;

                                                     <em>authenticate</em>(ID<span class="sub">A</span>)
    </code>
  </section2>

  <section2 topic="SAS-Only Overview" anchor="foundations-skeleton-sas">
    <p>The diagram below demonstrates the skeleton of the Diffie-Hellman key exchange that employs out-of-band Short Authentication String (SAS) verification. If Alice and Bob's public keys are not yet trusted, or if their private keys have been compromised, then the hash commitment sent in the first step enables Alice and Bob to verify their copies of each other's Diffie-Hellman (and public) keys and detect a Man in the Middle more easily.</p>
    <p>If a Man in the Middle changes the public Diffie-Hellman keys that Alice and Bob receive, then he could potentially use his knowledge of the SAS that Bob will eventually calculate when choosing the key he will send to Alice in the second step. However, the fact that the value he received in the first step is only a hash means the Man in the Middle must choose the key he sends to Alice before he can predict the SAS that she will calculate with it. Therefore, even if the SAS is very short, he is unable to use his resources to choose a key that will (have a better than random chance to) result in a SAS that matches Bob's. So only a truncated version of the HASH of Alice and Bob's keys needs to be verified out-of-band in the final step.</p>
    <code>
<strong>ALICE</strong>                                                <strong>BOB</strong> 
                                            Hg<span class="super">x</span>
                                      ------------&gt;

                                            g<span class="super">y</span>
                                      &lt;------------
SAS = <em>truncate</em>(HASH(g<span class="super">x</span> | g<span class="super">y</span>))
                                            g<span class="super">x</span>
                                      ------------&gt;

                                                     <em>assert</em> Hg<span class="super">x</span> = HASH(g<span class="super">x</span>)
                                                     SAS = <em>truncate</em>(HASH(g<span class="super">x</span> | g<span class="super">y</span>))
                                           SAS
                                      &lt;===========&gt;
    </code>
  </section2>

  <section2 topic="SIGMA-R with SAS Overview" anchor="foundations-skeleton-r">
    <p>The logic of the four-step SIGMA-R protocol is similar to the three-step SIGMA-I protocol. The difference being that Bob protects his identity from active attacks by by delaying communicating his identity to Alice until he has authenticated her. The diagram below demonstrates the skeleton of the key exchange. Note that it also takes advantage of the extra step required for SIGMA-R to incorporate a hash commitment, thus enabling <em>optional</em> out-of-band SAS authentication.</p>
    <code>
<strong>ALICE</strong>                                                <strong>BOB</strong> 
                                            Hg<span class="super">x</span>
                                      ------------&gt;

                                            g<span class="super">y</span>
                                      &lt;------------

mac<span class="sub">A</span> = <em>HMAC</em>(KS<span class="sub">A</span>, {g<span class="super">y</span>, g<span class="super">x</span>, pubKey<span class="sub">A</span>})
sign<span class="sub">A</span> = <em>sign</em>(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
ID<span class="sub">A</span> = <em>cipher</em>(KC<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
SAS = <em>truncate</em>(HASH(g<span class="super">x</span> | g<span class="super">y</span>))
                                         g<span class="super">x</span>, ID<span class="sub">A</span>
                                      ------------&gt;

                                                     <em>assert</em> Hg<span class="super">x</span> = HASH(g<span class="super">x</span>)
                                                     SAS = <em>truncate</em>(HASH(g<span class="super">x</span> | g<span class="super">y</span>))
                                           SAS
                                      &lt;===========&gt;

                                                     <em>authenticate</em>(ID<span class="sub">A</span>)
                                                     mac<span class="sub">B</span> = <em>HMAC</em>(KS<span class="sub">B</span>, {g<span class="super">x</span>, g<span class="super">y</span>, pubKey<span class="sub">B</span>})
                                                     sign<span class="sub">B</span> = <em>sign</em>(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                                     ID<span class="sub">B</span> = <em>cipher</em>(KC<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                           ID<span class="sub">B</span>
                                      &lt;------------
<em>authenticate</em>(ID<span class="sub">B</span>)
    </code>
  </section2>

  <section2 topic="SIGMA-I Key Exchange" anchor="foundations-core-i">
    <p>The diagram below describes exactly the same SIGMA-I key exchange protocol as the <link url="#foundations-skeleton-i">SIGMA-I Overview</link> above. It provides much more detail, without specifying any ESession-specific details. The differences between it and the <link url="#foundations-core-r">SIGMA-R with SAS Key Exchange</link> are highlighted.</p>
    <code>
<strong>ALICE</strong>                                        <strong>BOB</strong> 

N<span class="sub">A</span> = <em>random</em>()
x = <em>random</em>()
e = g<span class="super">x</span> mod p
                                 e, N<span class="sub">A</span>
                             ------------&gt;
                                             N<span class="sub">B</span> = <em>random</em>()
                                             C<span class="sub">A</span> = <em>random</em>()
                                             C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
                                             y = <em>random</em>()
                                             d = g<span class="super">y</span> mod p
                                             <em>assert</em> 1 &lt; e &lt; p-1
                                             K = HASH(e<span class="super">y</span> mod p)
                                             KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                             KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
                                             KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                             KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
                                             KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
                                             KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
                                             mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, C<span class="sub">A</span>})
                                             sign<span class="sub">B</span> = <em>sign</em>(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                             ID<span class="sub">B</span> = <em>cipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                             M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>) 
                               d, C<span class="sub">A</span>, N<span class="sub">B</span>
                             &lt;------------
                                ID<span class="sub">B</span>, M<span class="sub">B</span> 
C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
<em>assert</em> 1 &lt; d &lt; p-1
K = HASH(d<span class="super">x</span> mod p)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key") 
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key") 
KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
<em>assert</em> M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
{pubKey<span class="sub">B</span>, sign<span class="sub">B</span>} = <em>decipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, C<span class="sub">A</span>})
<em>verify</em>(sign<span class="sub">B</span>, pubKey<span class="sub">B</span>, mac<span class="sub">B</span>) 
mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>})
sign<span class="sub">A</span> = <em>sign</em>(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
ID<span class="sub">A</span> = <em>cipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                  ID<span class="sub">A</span>
                             ------------&gt;
                                   M<span class="sub">A</span> 
                                             <em>assert</em> M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                             {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>} = <em>decipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                             mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>})
                                             <em>verify</em>(sign<span class="sub">A</span>, pubKey<span class="sub">A</span>, mac<span class="sub">A</span>)
    </code>
  </section2>

  <section2 topic="SIGMA-R with SAS Key Exchange" anchor="foundations-core-r">
    <p>The Short Authentication String technique enables protection against a Man in the Middle without the need to generate, distribute or authenticate any public keys. As long as a hash commitment is used at the start of the key exchange then only a short human-friendly string needs to be verified out-of-band (e.g. by recognizable voice communication).</p>
    <p>Furthermore, if retained secrets associated with a client/user combination are employed <em>consistently</em> during key exchanges, then the Man in the Middle would need to be present for every session, including the first, and the out-of-band verification would only need to be performed once to verify the absence of a Man in the Middle for all sessions between the parties (past, present and future). <note>This combination of techniques underpins the <cite>ZRTP</cite> key agreement protocol.</note></p>
    <p>Public keys are optional in the diagram below. It describes the same SIGMA-R with SAS key exchange protocol as the <link url="#foundations-skeleton-r">SIGMA-R Overview</link>. It provides much more detail including the use of retained secrets and other secrets. The use of public keys is negotiated in the first two messages. Note: These <em>optional</em> security enhancements are especially important when the protocol is being used without public keys.</p>
    <p>The diagram does not specify any ESession-specific details. The differences between it and the <link url="#foundations-core-i">SIGMA-I Key Exchange</link> are highlighted.</p>
    <code>
<strong>ALICE</strong>                                        <strong>BOB</strong> 

N<span class="sub">A</span> = <em>random</em>()
x = <em>random</em>()
e = g<span class="super">x</span> mod p
He = SHA256(e)
                               He, isPK<span class="sub">A</span>
                             ------------&gt;
                               isPK<span class="sub">B</span>, N<span class="sub">A</span> 
                                             N<span class="sub">B</span> = <em>random</em>()
                                             C<span class="sub">A</span> = <em>random</em>()
                                             C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
                                             y = <em>random</em>()
                                             d = g<span class="super">y</span> mod p
                               d, C<span class="sub">A</span>, N<span class="sub">B</span>
                             &lt;------------
                              isPK<span class="sub">A</span>, isPK<span class="sub">B</span> 
C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
<em>assert</em> 1 &lt; d &lt; p-1
K = HASH(d<span class="super">x</span> mod p)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span> = <em>HMAC</em>(HASH, N<span class="sub">A</span>, RS<span class="sub">1A</span>...RS<span class="sub">ZA</span>)
<em>if</em> isPK<span class="sub">B</span> <em>equals false then:</em> 
    mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>})
    ID<span class="sub">A</span> = <em>cipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, mac<span class="sub">A</span>)
<em>else:</em> 
    mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>})
    sign<span class="sub">A</span> = <em>sign</em>(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
    ID<span class="sub">A</span> = <em>cipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
SAS = <em>truncate</em>(HASH(M<span class="sub">A</span> | d | "Short Authentication String")) 

                                ID<span class="sub">A</span>, M<span class="sub">A</span>
                             ------------&gt;
                             e, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span> 

                                             <em>assert</em> He = SHA256(e)
                                             SAS = <em>truncate</em>(HASH(M<span class="sub">A</span> | d | "Short Authentication String"))
                                  SAS
                             &lt;===========&gt;

                                             <em>assert</em> 1 &lt; e &lt; p-1
                                             K = HASH(e<span class="super">y</span> mod p)
                                             KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                             KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                             KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key") 
                                             <em>assert</em> M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                             <em>if</em> isPK<span class="sub">B</span> <em>equals false then:</em> 
                                                 mac<span class="sub">A</span> = <em>decipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                                 <em>assert</em> mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>})
                                             <em>else:</em> 
                                                 {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>} = <em>decipher</em>(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                                 mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>})
                                                 <em>verify</em>(sign<span class="sub">A</span>, pubKey<span class="sub">A</span>, mac<span class="sub">A</span>)
                                             SRS = <em>choose</em>(RS<span class="sub">1B</span>...RS<span class="sub">ZB</span>, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>, N<span class="sub">A</span>)
                                             K = HASH(K | SRS | OSS)
                                             KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                             KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
                                             KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                             KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
                                             KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
                                             SRSH = <em>HMAC</em>(HASH, SRS, "Shared Retained Secret")
                                             <em>retain</em>(<em>HMAC</em>(HASH, K, "New Retained Secret"))
                                             <em>if</em> isPK<span class="sub">A</span> <em>equals false then:</em> 
                                                 mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, C<span class="sub">A</span>})
                                                 ID<span class="sub">B</span> = <em>cipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, mac<span class="sub">B</span>) 
                                             <em>else:</em> 
                                                 mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, C<span class="sub">A</span>})
                                                 sign<span class="sub">B</span> = <em>sign</em>(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                                 ID<span class="sub">B</span> = <em>cipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                             M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
                                   ID<span class="sub">B</span>
                             &lt;------------
                                M<span class="sub">B</span>, SRSH 

SRS = <em>choose</em>(RS<span class="sub">1A</span>...RS<span class="sub">ZA</span>, SRSH)
K = HASH(K | SRS | OSS)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
<em>retain</em>(<em>HMAC</em>(HASH, K, "New Retained Secret"))
<em>assert</em> M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
<em>if</em> isPK<span class="sub">A</span> <em>equals false then:</em> 
    mac<span class="sub">B</span> = <em>decipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
    <em>assert</em> mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, C<span class="sub">A</span>})
<em>else:</em> 
    {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>} = <em>decipher</em>(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
    mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, C<span class="sub">A</span>})
    <em>verify</em>(sign<span class="sub">B</span>, pubKey<span class="sub">B</span>, mac<span class="sub">B</span>)
    </code>
  </section2>

</section1>

<section1 topic="Cryptographic Design" anchor="design">
  <p>This section provides an overview of the full ESession key-exchange protocol from a cryptographic point of view. This protocol is based on the <em>full fledge</em> protocol, as described in Appendix B of the <cite>SIGMA</cite> paper. It also uses <em>variant (ii)</em>, as described in Secion 5.4 of the same paper.</p>
  <section2 topic="ESession Parameter Descriptions" anchor="design-parameters">
    <p>The table below describes the parameters that are not found in the <link url="#foundations-parameters">Parameter Descriptions</link> tables above.</p>
    <table caption="ESession Negotiation Parameters">
      <tr>
        <th>Parameter</th>
        <th>Description</th>
      </tr>
      <tr>
        <td>options</td>
        <td>Includes a set of possible values for each and every ESession parameter (see the ESession Request sub-section in <cite>Encrypted Session Negotiation</cite>), including sets of possible values for p, g, HASH, CIPHER, SIGN</td>
      </tr>
      <tr>
        <td>chosen</td>
        <td>Includes a chosen value for each ESession parameter</td>
      </tr>
      <tr>
        <td>CIPHER</td>
        <td>Selected CTR-mode block cipher algorithm</td>
      </tr>
      <tr>
        <td>DECIPHER</td>
        <td>Selected CTR-mode block decipher algorithm (corresponds to CIPHER)</td>
      </tr>
      <tr>
        <td>SIGN</td>
        <td>Selected signature algorithm</td>
      </tr>
      <tr>
        <td>VERIFY</td>
        <td>The selected signature verification algorithm (corresponds to SIGN)</td>
      </tr>
      <tr>
        <td>SASGEN</td>
        <td>The selected SAS generation algorithm</td>
      </tr>
      <tr>
        <td>x<span class="sub">1</span>...x<span class="sub">Z</span></td>
        <td>Alice's private Diffie-Hellman keys - each value corresponds to one of Z different DH groups</td>
      </tr>
      <tr>
        <td>e<span class="sub">1</span>...e<span class="sub">Z</span></td>
        <td>The choice of public Diffie-Hellman keys that Alice offers Bob - each value corresponds to one of Z different DH groups (and a different value of x)</td>
      </tr>
      <tr>
        <td>He<span class="sub">1</span>...He<span class="sub">Z</span></td>
        <td>The list of hash commitments that Alice sends to Bob (hashes of e<span class="sub">1</span>...e<span class="sub">Z</span>)</td>
      </tr>
      <tr>
        <td>*signKeys<span class="sub">A</span></td>
        <td>All the private keys that Alice is able to use to create signatures</td>
      </tr>
      <tr>
        <td>*signs<span class="sub">B</span></td>
        <td>The set of signatures of form<span class="sub">B</span> (one for each of Bob's private keys)</td>
      </tr>
      <tr>
        <td>*pubKeys<span class="sub">A</span></td>
        <td>All of Alice's public keys that Bob has access to</td>
      </tr>
    </table>
    <p>* Offline negotiation only</p>
  </section2>
  <section2 topic="Online ESession-I Negotiation" anchor="design-online-i">
    <p>Alice uses this protocol when Bob is Online. In addition to the key exchange described in the <link url="#foundations-core-i">SIGMA-I Key Exchange</link> protocol above, she offers Bob a choice of Diffie-Hellman groups with her corresponding values of e, various algorithms and other parameters. The differences between this protocol and <link url="#design-online-r">Online ESession-R Negotiation</link> are highlighted.</p>
    <!--The first two forms below negotiate policy, swap Diffie-Hellman public values and the ancillary data necessary for the exchange and authentication. The second message also authenticates the responder. The third message authenticates the initiator and exchanges the final Diffie-Hellman public value.-->
    <code>
<strong>ALICE</strong>                                    <strong>BOB</strong> 

N<span class="sub">A</span> = <em>random</em>()
<em>for</em> g,p ∈ options
    x = <em>random</em>()
    e = g<span class="super">x</span> mod p
form<span class="sub">A</span> = {e<span class="sub">1</span>...e<span class="sub">Z</span>, options, N<span class="sub">A</span>}
                                form<span class="sub">A</span>
                             ---------&gt;

                                         chosen = {p,g,HASH,CIPHER,SIGN...} = <em>choose</em>(options)
                                         e = <em>choose</em>(e<span class="sub">1</span>...e<span class="sub">Z</span>, p)
                                         N<span class="sub">B</span> = <em>random</em>()
                                         C<span class="sub">A</span> = <em>random</em>()
                                         C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
                                         y = <em>random</em>()
                                         d = g<span class="super">y</span> mod p
                                         form<span class="sub">B</span> = {C<span class="sub">A</span>, chosen, d, N<span class="sub">A</span>, N<span class="sub">B</span>}
                                         <em>assert</em> 1 &lt; e &lt; p-1
                                         K = HASH(e<span class="super">y</span> mod p)
                                         KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                         KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
                                         KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                         KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
                                         KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
                                         KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
                                         mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>})
                                         sign<span class="sub">B</span> = SIGN(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                         ID<span class="sub">B</span> = CIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                         M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>) 
                                form<span class="sub">B</span>
                             &lt;---------
                               ID<span class="sub">B</span>, M<span class="sub">B</span> 
<em>assert</em> chosen ∈ options
x = <em>choose</em>(x<span class="sub">1</span>...x<span class="sub">Z</span>, p)
e = g<span class="super">x</span> mod p
C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
<em>assert</em> 1 &lt; d &lt; p-1
K = HASH(d<span class="super">x</span> mod p)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key") 
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key") 
KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
<em>assert</em> M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
{pubKey<span class="sub">B</span>, sign<span class="sub">B</span>} = DECIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>})
VERIFY(sign<span class="sub">B</span>, pubKey<span class="sub">B</span>, mac<span class="sub">B</span>) 
mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, form<span class="sub">A</span>})
sign<span class="sub">A</span> = SIGN(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
ID<span class="sub">A</span> = CIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                ID<span class="sub">A</span>
                             ---------&gt;
                               M<span class="sub">A</span>, N<span class="sub">B</span> 
                                         <em>assert</em> M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                         {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>} = DECIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                         mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, form<span class="sub">A</span>})
                                         VERIFY(sign<span class="sub">A</span>, pubKey<span class="sub">A</span>, mac<span class="sub">A</span>)
    </code>
  </section2>

  <section2 topic="Online ESession-R Negotiation" anchor="design-online-r">
    <p>This protocol is similar to the <link url="#design-online-i">Online ESession-I Negotiation</link> above, except that Bob's identity is protected from active attacks (by by delaying communicating his identity to Alice until he has authenticated her). The optional use of SAS, retained secrets and other secrets means the protocol may be used without any public keys. The differences between this protocol and <link url="#design-online-i">Online ESession-I Negotiation</link> are highlighted.</p>
    <code>
<strong>ALICE</strong>                                      <strong>BOB</strong> 

N<span class="sub">A</span> = <em>random</em>()
<em>for</em> g,p ∈ options
    x = <em>random</em>()
    e = g<span class="super">x</span> mod p
    He = SHA256(e) 
form<span class="sub">A</span> = {He<span class="sub">1</span>...He<span class="sub">Z</span>, options, N<span class="sub">A</span>}

                                 form<span class="sub">A</span>
                             ------------&gt;

                                           chosen = {p,g,HASH,CIPHER,SIGN,SASGEN,isPK<span class="sub">A</span>,isPK<span class="sub">B</span>...} = <em>choose</em>(options)
                                           He = <em>choose</em>(He<span class="sub">1</span>...He<span class="sub">Z</span>, p)
                                           N<span class="sub">B</span> = <em>random</em>()
                                           C<span class="sub">A</span> = <em>random</em>()
                                           C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
                                           y = <em>random</em>()
                                           d = g<span class="super">y</span> mod p
                                           form<span class="sub">B</span> = {C<span class="sub">A</span>, chosen, d, N<span class="sub">A</span>, N<span class="sub">B</span>}
                                 form<span class="sub">B</span>
                             &lt;------------
<em>assert</em> chosen ∈ options
x = <em>choose</em>(x<span class="sub">1</span>...x<span class="sub">Z</span>, p)
e = <em>choose</em>(e<span class="sub">1</span>...e<span class="sub">Z</span>, p)
C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
<em>assert</em> 1 &lt; d &lt; p-1
K = HASH(d<span class="super">x</span> mod p)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span> = <em>HMAC</em>(HASH, N<span class="sub">A</span>, RS<span class="sub">1A</span>...RS<span class="sub">ZA</span>)
form<span class="sub">A2</span> = {RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>, e, N<span class="sub">B</span>}
<em>if</em> isPK<span class="sub">B</span> <em>equals false then:</em> 
    mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, form<span class="sub">A</span>, form<span class="sub">A2</span>})
    ID<span class="sub">A</span> = CIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, mac<span class="sub">A</span>)
<em>else:</em>  
    mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, form<span class="sub">A</span>, form<span class="sub">A2</span>})
    sign<span class="sub">A</span> = SIGN(signKey<span class="sub">A</span>, mac<span class="sub">A</span>)
    ID<span class="sub">A</span> = CIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>})
M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
SAS = SASGEN(M<span class="sub">A</span>, form<span class="sub">B</span>) 
                                ID<span class="sub">A</span>, M<span class="sub">A</span>
                             ------------&gt;
                                 form<span class="sub">A2</span> 

                                           <em>assert</em> He = SHA256(e)
                                           SAS = SASGEN(M<span class="sub">A</span>, form<span class="sub">B</span>)
                                  SAS
                             &lt;===========&gt;

                                           <em>assert</em> 1 &lt; e &lt; p-1
                                           K = HASH(e<span class="super">y</span> mod p)
                                           KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                           KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                           KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
                                           <em>assert</em> M<span class="sub">A</span> = <em>HMAC</em>(HASH, KM<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                           <em>if</em> isPK<span class="sub">B</span> <em>equals false then:</em> 
                                               mac<span class="sub">A</span> = DECIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                               <em>assert</em> mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, form<span class="sub">A</span>, form<span class="sub">A2</span>})
                                           <em>else:</em> 
                                               {pubKey<span class="sub">A</span>, sign<span class="sub">A</span>} = DECIPHER(KC<span class="sub">A</span>, C<span class="sub">A</span>, ID<span class="sub">A</span>)
                                               mac<span class="sub">A</span> = <em>HMAC</em>(HASH, KS<span class="sub">A</span>, {N<span class="sub">B</span>, N<span class="sub">A</span>, e, pubKey<span class="sub">A</span>, form<span class="sub">A</span>, form<span class="sub">A2</span>})
                                               VERIFY(sign<span class="sub">A</span>, pubKey<span class="sub">A</span>, mac<span class="sub">A</span>)
                                           SRS = <em>choose</em>(RS<span class="sub">1B</span>...RS<span class="sub">ZB</span>, RSH<span class="sub">1A</span>...RSH<span class="sub">ZA</span>, N<span class="sub">A</span>)
                                           K = HASH(K | SRS | OSS)
                                           KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                           KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
                                           KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                           KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
                                           KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
                                           <em>if</em> SRS <em>equals false then:</em> 
                                               SRS = <em>random</em>()
                                           SRSH = <em>HMAC</em>(HASH, SRS, "Shared Retained Secret")
                                           <em>retain</em>(<em>HMAC</em>(HASH, K, "New Retained Secret"))
                                           form<span class="sub">B2</span> = {N<span class="sub">A</span>, SRSH}
                                           <em>if</em> isPK<span class="sub">A</span> <em>equals false then:</em> 
                                               mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, form<span class="sub">B</span>, form<span class="sub">B2</span>})
                                               ID<span class="sub">B</span> = CIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, mac<span class="sub">B</span>) 
                                           <em>else:</em> 
                                               mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>, form<span class="sub">B2</span>})
                                               sign<span class="sub">B</span> = SIGN(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                               ID<span class="sub">B</span> = CIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                           M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)

                                ID<span class="sub">B</span>, M<span class="sub">B</span> 
                             &lt;------------
                                 form<span class="sub">B2</span> 

SRS = <em>choose</em>(RS<span class="sub">1A</span>...RS<span class="sub">ZA</span>, SRSH)
K = HASH(K | SRS | OSS)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
<em>retain</em>(<em>HMAC</em>(HASH, K, "New Retained Secret"))
<em>assert</em> M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
<em>if</em> isPK<span class="sub">A</span> <em>equals false then:</em> 
    mac<span class="sub">B</span> = DECIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
    <em>assert</em> mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, form<span class="sub">B</span>, form<span class="sub">B2</span>})
<em>else:</em> 
    {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>} = DECIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
    mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>, form<span class="sub">B2</span>})
    VERIFY(sign<span class="sub">B</span>, pubKey<span class="sub">B</span>, mac<span class="sub">B</span>)
    </code>
  </section2>

  <section2 topic="Offline ESession Negotiation" anchor="design-offline">
    <p>Bob uses this protocol to send stanzas to Alice when she is Offline. Note: Since the full <cite>SIGMA</cite> protocol cannot be used if Alice is offline, her identity is not protected at all.</p>
    <p>The diagram is split into three phases. First Alice publishes her ESession options before going offline. Later Bob completes the key exchange (and sends her encrypted stanzas that are not shown below) these are all stored by Alice's server. Finally when Alice comes online again she verifies and calculates the decryption key.</p>
    <p>The differences between this offline protocol and the <link url="#design-online-i">Online ESession-I Negotiation</link> protocol above are highlighted in the diagram below.</p>
    <code>
<strong>ALICE</strong>                    <strong>ALICE'S SERVER</strong>              <strong>BOB</strong> 

N<span class="sub">A</span> = <em>random</em>()
<em>for</em> g,p ∈ options
    x = <em>random</em>()
    e = g<span class="super">x</span> mod p
form<span class="sub">A</span> = {e<span class="sub">1</span>...e<span class="sub">Z</span>, options, N<span class="sub">A</span>}
signs<span class="sub">A</span> = <em>multi_sign</em>(signKeys<span class="sub">A</span>, form<span class="sub">A</span>)
<em>retain</em>(N<span class="sub">A</span>, x<span class="sub">1</span>...x<span class="sub">Z</span>, expireTime) 

                   form<span class="sub">A</span>
                 --------&gt;
                   signs<span class="sub">A</span> 

                         <em>retain</em>(form<span class="sub">A</span>, signs<span class="sub">A</span>)
---------------------------------------------------------------------------------------------------------
                         <em>retrieve</em>(form<span class="sub">A</span>, signs<span class="sub">A</span>) 

                                             form<span class="sub">A</span>
                                           --------&gt;
                                             signs<span class="sub">A</span> 

                                                     <em>verify_one</em>(signs<span class="sub">A</span>, pubKeys<span class="sub">A</span>, form<span class="sub">A</span>)
                                                     chosen = {p,g,HASH,CIPHER,SIGN...} = <em>choose</em>(options)
                                                     e = <em>choose</em>(e<span class="sub">1</span>...e<span class="sub">Z</span>, p)
                                                     C<span class="sub">A</span> = <em>random</em>()
                                                     y = <em>random</em>()
                                                     d = g<span class="super">y</span> mod p
                                                     C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
                                                     N<span class="sub">B</span> = <em>random</em>()
                                                     form<span class="sub">B</span> = {C<span class="sub">A</span>, chosen, d, N<span class="sub">A</span>, N<span class="sub">B</span>}
                                                     <em>assert</em> 1 &lt; e &lt; p-1
                                                     K = HASH(e<span class="super">y</span> mod p)
                                                     KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
                                                     KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
                                                     KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
                                                     KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
                                                     KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
                                                     KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
                                                     mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>})
                                                     sign<span class="sub">B</span> = SIGN(signKey<span class="sub">B</span>, mac<span class="sub">B</span>)
                                                     ID<span class="sub">B</span> = CIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, {pubKey<span class="sub">B</span>, sign<span class="sub">B</span>})
                                                     M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)

                                             form<span class="sub">B</span>
                                           &lt;--------
                                            ID<span class="sub">B</span>, M<span class="sub">B</span> 

                         <em>retain</em>(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)
---------------------------------------------------------------------------------------------------------
                         <em>retrieve</em>(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)
---------------------------------------------------------------------------------------------------------
                         <em>retrieve</em>(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)
---------------------------------------------------------------------------------------------------------
                         <em>retrieve</em>(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>)
---------------------------------------------------------------------------------------------------------
                         <em>retrieve</em>(form<span class="sub">B</span>,ID<span class="sub">B</span>,M<span class="sub">B</span>) 
                   form<span class="sub">B</span>
                 &lt;--------
                  ID<span class="sub">B</span>, M<span class="sub">B</span> 

<em>retrieve</em>(N<span class="sub">A</span>, x<span class="sub">1</span>...x<span class="sub">Z</span>, expireTime)
<em>assert</em> now &lt; expireTime 
<em>assert</em> chosen ∈ options
x = <em>choose</em>(x<span class="sub">1</span>...x<span class="sub">Z</span>, p)
e = g<span class="super">x</span> mod p
C<span class="sub">B</span> = C<span class="sub">A</span> XOR 2<span class="super">n-1</span> 
<em>assert</em> 1 &lt; d &lt; p-1
K = HASH(d<span class="super">x</span> mod p)
KC<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator Cipher Key")
KC<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder Cipher Key")
KM<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator MAC Key")
KM<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder MAC Key")
KS<span class="sub">A</span> = <em>HMAC</em>(HASH, K, "Initiator SIGMA Key")
KS<span class="sub">B</span> = <em>HMAC</em>(HASH, K, "Responder SIGMA Key")
<em>assert</em> M<span class="sub">B</span> = <em>HMAC</em>(HASH, KM<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
{pubKey<span class="sub">B</span>, sign<span class="sub">B</span>} = DECIPHER(KC<span class="sub">B</span>, C<span class="sub">B</span>, ID<span class="sub">B</span>)
mac<span class="sub">B</span> = <em>HMAC</em>(HASH, KS<span class="sub">B</span>, {N<span class="sub">A</span>, N<span class="sub">B</span>, d, pubKey<span class="sub">B</span>, form<span class="sub">B</span>})
VERIFY(sign<span class="sub">B</span>, pubKey<span class="sub">B</span>, mac<span class="sub">B</span>)
    </code>
    <p>Note: KM<span class="sub">B</span> is necessary only to allow Bob to terminate the ESession if he comes online before Alice terminates it. The calculation of KC<span class="sub">B</span> and KS<span class="sub">B</span> is not strictly necessary.</p>
  </section2>
</section1>

<section1 topic="Security Considerations" anchor="sec">
  <p>The security considerations are described in <cite>Encrypted Session Negotiation</cite> and <cite>Offline Encrypted Sessions</cite>.</p>
</section1>

<section1 topic="IANA Considerations" anchor="iana">
  <p>This document requires no interaction with the <span class="ref"><link url="http://www.iana.org/">Internet Assigned Numbers Authority (IANA)</link></span> <note>The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols, such as port numbers and URI schemes. For further information, see &lt;<link url="http://www.iana.org/">http://www.iana.org/</link>&gt;.</note>. </p>
</section1>

<section1 topic="XMPP Registrar Considerations" anchor="registrar">
  <p>This document requires no interaction with the <span class="ref"><link url="https://xmpp.org/registrar/">XMPP Registrar</link></span> <note>The XMPP Registrar maintains a list of reserved protocol namespaces as well as registries of parameters used in the context of XMPP extension protocols approved by the XMPP Standards Foundation. For further information, see &lt;<link url="https://xmpp.org/registrar/">https://xmpp.org/registrar/</link>&gt;.</note>.</p>
</section1>

<section1 topic="Acknowledgments" anchor="acknowledgments">
  <p>The author would like to thank: Ian Goldberg for the time he spent reviewing an early version of this protocol and for his invaluable suggestions and comments; and Hugo Krawczyk for his general advice and encouragment. The author of this document is entirely responsable for any errors it contains.</p>
</section1>

</xep>
