J
WS (JSON Web Signature) [46] and
JWE (JSON Web Encryption) [47] are used to integrity protect and encrypt JSON objects. The JWE profile and JWS profile describe the restrictions and extensions to the RFCs for 3GPP entities or functions that support JWS and/or JWE.
The cipher suites used in
clause 6.2 are described in
RFC 7518.
All entities and functions that support JWE according to
RFC 7516 shall follow the following restrictions and extensions:
-
"enc" parameter A128GCM (AES GCM with a 128-bit key) shall be supported. "enc" parameter A256GCM (AES GCM using 256-bit key) should be supported.
-
"alg" parameter "dir" (Direct use of a shared symmetric key as the CEK) shall be supported.
If ECDH is used as a key agreement protocol, the receiving party shall perform public key validation and check that the received public key is on the agreed upon curve.
All entities and functions that support JWS according to
RFC 7515 shall follow the following restrictions and extensions:
-
"alg" parameter ES256 (ECDSA using P-256 and SHA-256) shall be supported.
-
The "none" "alg" parameter shall not be supported.
-
The "kid" field shall be supported. End points may establish the expected signing algorithm and associated keys out-of-band (e.g. N32-c) and use this field to pass a key identifier. If the "kid" field is used the end point shall check the indicated "alg" matches that specified by the parameters.
-
If an end point has established a public key and algorithm out of band (e.g. N32-c) and the "kid" field is not used, then the end point shall check the indicated "alg" parameter against the established algorithm
-
The "jwk" field shall not be supported.