diff --git a/draft-ietf-suit-firmware-encryption.md b/draft-ietf-suit-firmware-encryption.md index 39391c3..c998f75 100644 --- a/draft-ietf-suit-firmware-encryption.md +++ b/draft-ietf-suit-firmware-encryption.md @@ -1486,35 +1486,11 @@ two methods are utilized, namely AES Key Wrap (AES-KW) and Ephemeral-Static Diffie-Hellman (ES-DH). In this table we summarize the main properties with respect to their deployment: -~~~ -+---------------++------------+---------------+----------------+ -| || | | | -| Number of || Same key | One key | One Key | -| Long-Term || for all | per device | per device | -| Keys || devices | | | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Number of || Single | Single | One CEK | -| Content || CEK per | CEK per | per payload | -| Encryption || payload | payload | encryption | -| Keys (CEKs) || shared | shared | transaction | -| || with all | with all | per device | -| || devies | devies | | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Use Case || Legacy | Efficient | Point-to- | -| || Usage | Payload | Point Payload | -| || | Distribution | Distribution | -| || | | | -+---------------++------------+---------------+----------------+ -| || | | | -| Recommended? || No, bad | Yes | Yes | -| || practice | | | -| || | | | -+---------------++------------+---------------+----------------+ -~~~ +| Number of
Long-Term
Keys | Number of
Content
Encryption
Keys (CEKs) | Use Case | Recommended? | +|----------------------------------|-----------------------------------------------------------------------|----------------------------------------------|----------------------| +| Same key
for all
devices | Single
CEK per
payload
shared
with all
devies | Legacy
Usage | No, bad
practice | +| One key
per device | Single
CEK per
payload
shared
with all
devies | Efficient
Payload
Distribution | Yes | +| One Key
per device | One CEK
per payload
encryption
transaction
per device | Point-to-
Point Payload
Distribution | Yes | The use of firmware encryption with IoT devices introduces an battery exhaustion attack. This attack utilizes the fact that flash memory