<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ochkas-cose-ascon-03" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Ascon-AEAD128 for COSE and JOSE</title>

    <author initials="D." surname="Ochkas" fullname="Dmytro Ochkas">
      <organization>IMT Atlantique</organization>
      <address>
        <email>dmytro.ochkas@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="H." surname="Le Bouder" fullname="Hélène Le Bouder">
      <organization>IMT Atlantique</organization>
      <address>
        <email>helene.le-bouder@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization>IMT Atlantique</organization>
      <address>
        <email>alexander.pelov@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2026" month="March" day="16"/>

    <area>General</area>
    <workgroup>COSE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 88?>

<t>This document describes CBOR Object Signing and Encryption (COSE) and 
JSON Object Signing and Encryption (JOSE) serializations with Ascon which
is a NIST standard for lightweight cryptography.</t>

<t>In 2019, as a part of CAESAR competition, Ascon-128 and Ascon-128a were
selected as the first choice for the lightweight authenticated encryption <xref target="asconv1.2-caesar"/>.
After, in 2023, National Institute of Standards and Technology (NIST) selected
Ascon family of cryptographic algorithms to be the standard for lightweight
cryptography <xref target="asconv1.2-nist"/>. In August 2025, NIST Special Publication 800-232 was released,
defining Ascon-based lightweight cryptography standards for constrained
devices <xref target="NIST.SP.800-232"/>. This recognition makes it particularly interesting
to enable Ascon to be used with COSE and JOSE structures.</t>

<t>This document does not define any new cryptography, only
serializations of existing cryptographic systems described in
<xref target="NIST.SP.800-232"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 107?>

<section anchor="intro"><name>Introduction</name>

<t>Constrained networks such as Internet of Things (IoT) networks most of the
time are characterized by the limited computational power and autonomy.
In this context, the choice of suitable cryptographic algorithms that provide 
robust security without consuming large amount of resources is essential.
As a winner of the lightweight cryptography standardization process conducted by
NIST, Ascon family of cryptographic algorithms is a perfect candidate for
the described situation.</t>

<t>Ascon-Based Lightweight Cryptography Standards for Constrained Devices
<xref target="NIST.SP.800-232"/> introduces a suite of algorithms consisting of Authenticated
Encryption with Associated Data (AEAD), a hash function, and two eXtendable
Output Functions (XOFs).</t>

<t>This document focuses on the AEAD part of Ascon standard. It enables the
usage of Ascon-AEAD128 with COSE and JOSE for content encryption.</t>

</section>
<section anchor="need"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="algos"><name>Ascon algorithms</name>

<t>In the scope of this document, only the authenticated encryption scheme of the Ascon
family is allowed for, namely Ascon-AEAD128. Ascon-AEAD128.enc and Ascon-AEAD128.dec
algorithms are parametrized by the key size k, the nonce size n, the tag size t, the rate r, and the internal round numbers a and b.
<xref target="NIST.SP.800-232"/> specifies the Ascon-AEAD128 algorithm with the following parameters:</t>

<texttable title="Ascon-AEAD128 parameters" anchor="asconaeadparams">
      <ttcol align='left'>Key size, k</ttcol>
      <ttcol align='left'>Nonce size, n</ttcol>
      <ttcol align='left'>Tag size, t</ttcol>
      <ttcol align='left'>Rate, r</ttcol>
      <ttcol align='left'>Outer permutation rounds, a</ttcol>
      <ttcol align='left'>Inner permutation rounds, b</ttcol>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>128 bits</c>
      <c>12</c>
      <c>8</c>
</texttable>

<t>In addition, <xref target="NIST.SP.800-232"/> allows the tag truncation. The standard permits tag sizes λ, where 32 &lt;= λ &lt;= 128 bits.
Tags of less than 64 bits SHALL only be selected after a careful risk analysis.</t>

<t>Since COSE can be used in different scenarios, this document requests to register three variations of Ascon-AEAD128 in <xref target="IANA.cose"/> with
common tag sizes of 32, 64, and 128 bits (see <xref target="cosealgos"/>). Using the 32-bit variation is discouraged for typical scenarios and SHOULD be introduced only in extremely constrained use cases with justified security.</t>

<texttable title="COSE Algorithms for Ascon" anchor="cosealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>alg</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>TBD (requested assignment 35)</c>
      <c>Ascon-AEAD128 with 128-bit tag as the CBOR Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/64</c>
      <c>TBD (requested assignment 36)</c>
      <c>Ascon-AEAD128 with 64-bit tag as the CBOR Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/32</c>
      <c>TBD (requested assignment 37)</c>
      <c>Ascon-AEAD128 with 32-bit tag as the CBOR Object Encryption Algorithm</c>
</texttable>

<t>In COSE, keys may be obtained from either a key structure or a recipient structure <xref target="RFC9052"/>.</t>

<t>When using a COSE key for this algorithm, the following checks are made:</t>

<t><list style="symbols">
  <t>The "kty" field MUST be present, and it MUST be "Symmetric".</t>
  <t>If the "alg" field is present, it MUST match the variation of Ascon-AEAD128 algorithm being used.</t>
  <t>If the "key_ops" field is present, it MUST include "encrypt" when encrypting.</t>
  <t>If the "key_ops" field is present, it MUST include "decrypt" when decrypting.</t>
</list></t>

<t>COSE encryption and decryption with Ascon-AEAD128 is done in accordance with Section 5.3 of <xref target="RFC9052"/>.</t>

<t>Also, this document requests the registration of the Ascon-AEAD128 algorithms in <xref target="IANA.jose"/> with 64-, and 128-bit tags (see <xref target="josealgos"/>). Unlike COSE, there is no 32-bit tag variation since JSON Web Encryption (JWE) structure is not intended to be used in extremely constrained scenarios.</t>

<texttable title="JOSE Algorithms for Ascon" anchor="josealgos">
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>enc</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128</c>
      <c>Ascon-AEAD128 with 128-bit tag as the JSON Object Encryption Algorithm</c>
      <c>Ascon-AEAD128/64</c>
      <c>Ascon-AEAD128/64</c>
      <c>Ascon-AEAD128 with 64-bit tag as the JSON Object Encryption Algorithm</c>
</texttable>

<t>JOSE encryption and decryption processes with Ascon-AEAD128 should follow Section 5 of <xref target="RFC7516"/>.</t>

<t>Implementations that are encrypting or decrypting MUST validate that the key type, key length,
and algorithm are correct and appropriate for the entities involved.</t>

</section>
<section anchor="iv"><name>IV Header Parameter</name>

<t>Unlike some common AEAD algorithms, Ascon distinguishes between the notion
of initialization vector (IV) and nonce (N). While N is the input argument
for the Ascon-AEAD128 encryption/decryption functions, IV is the constant defined
for each Ascon algorithm used as a part of state initialization.</t>

<t>However, <xref target="IANA.cose"/> does not define a separate header parameter to specify Nonce.
Thus, in COSE, whenever Full Initialization Vector Header Parameter (Name: IV,
Label: 5) or Partial Initialization Vector Header Parameter (Name: Partial IV, Label: 6) is
specified it SHALL refer to the N argument of the corresponding Ascon function.</t>

<t>On the other hand, JSON Web Signature and Encryption Header Parameters registry
at <xref target="IANA.jose"/> defines both Nonce Header Parameter ("nonce") and Initialization
Vector Header Parameter ("iv"). However, the "nonce" parameter is intended to be used
only with signatures. Therefore, in JOSE, "iv" parameters SHALL refer to the N argument
of the corresponding Ascon function. There SHOULD NOT be "nonce" parameters specified
while using Ascon for content encryption. In case "nonce" parameter is specified it MUST be ignored.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The security considerations for <xref target="NIST.SP.800-232"/>, <xref target="RFC7516"/>, <xref target="RFC7517"/> and <xref target="RFC9052"/> apply to
this specification as well.</t>

<t>According to the most recent security analysis publications, Ascon did not show any
security vulnerabilities so far and the best attacks target the initialization of Ascon
reduced to 7 (out of 12) rounds, concluding that Ascon has a security margin of 5 rounds
(42 % of the 12 rounds). More details are available at List of Published Analysis section of <xref target="asconv1.2-nist"/>.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="additions-to-existing-registries"><name>Additions to Existing Registries</name>

<section anchor="new-cose-algorithms"><name>New COSE Algorithms</name>

<t>IANA is requested to add the following entries to the COSE Algorithms
Registry. The following completed registration templates are
provided as described in <xref target="RFC9053"/>. The "Recommended" field
for Ascon-AEAD128/32 is set to "Filter Only" to discourage unreflected usage.</t>

<section anchor="ascon-aead128-for-cose"><name>Ascon-AEAD128 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128</t>
  <t>Value: TBD (requested assignment 35)</t>
  <t>Description: Ascon-AEAD128 with 128-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ascon-aead12864-for-cose"><name>Ascon-AEAD128/64 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128/64</t>
  <t>Value: TBD (requested assignment 36)</t>
  <t>Description: Ascon-AEAD128 with 64-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Yes</t>
</list></t>

</section>
<section anchor="ascon-aead12832-for-cose"><name>Ascon-AEAD128/32 for COSE</name>

<t><list style="symbols">
  <t>Name: Ascon-AEAD128/32</t>
  <t>Value: TBD (requested assignment 37)</t>
  <t>Description: Ascon-AEAD128 with 32-bit tag</t>
  <t>Capabilities: [kty]</t>
  <t>Reference: NIST SP 800-232</t>
  <t>Recommended: Filter Only</t>
</list></t>

</section>
</section>
<section anchor="new-jose-algorithms"><name>New JOSE Algorithms</name>

<t>IANA is requested to add the following entries to the JSON Web
Signature and Encryption Algorithms Registry. The following
completed registration templates are provided as described in
<xref target="RFC7518"/>.</t>

<section anchor="ascon-aead128-for-jose"><name>Ascon-AEAD128 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128</t>
  <t>Algorithm Description: Ascon-AEAD128 with 128-bit tag</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): NIST SP 800-232</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
<section anchor="ascon-aead12864-for-jose"><name>Ascon-AEAD128/64 for JOSE</name>

<t><list style="symbols">
  <t>Algorithm Name: Ascon-AEAD128/64</t>
  <t>Algorithm Description: Ascon-AEAD128 with 64-bit tag</t>
  <t>Algorithm Usage Location(s): enc</t>
  <t>JOSE Implementation Requirements: Optional</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): NIST SP 800-232</t>
  <t>Algorithm Analysis Documents(s): n/a</t>
</list></t>

</section>
</section>
</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC7517">
  <front>
    <title>JSON Web Key (JWK)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7517"/>
  <seriesInfo name="DOI" value="10.17487/RFC7517"/>
</reference>

<reference anchor="RFC7518">
  <front>
    <title>JSON Web Algorithms (JWA)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7518"/>
  <seriesInfo name="DOI" value="10.17487/RFC7518"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>

<reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
  <front>
    <title>JSON Object Signing and Encryption (JOSE)</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="asconv1.2-caesar" target="https://competitions.cr.yp.to/round3/asconv12.pdf">
  <front>
    <title>Ascon v1.2, Submission to Round 3 of the CAESAR competition</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="asconv1.2-nist" target="https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf">
  <front>
    <title>Ascon v1.2, Submission to Final Round of the NIST Lightweight Cryptography project</title>
    <author initials="C." surname="Dobraunig" fullname="Christoph Dobraunig">
      <organization></organization>
    </author>
    <author initials="M." surname="Eichlseder" fullname="Maria Eichlseder">
      <organization></organization>
    </author>
    <author initials="F." surname="Mendel" fullname="Florian Mendel">
      <organization></organization>
    </author>
    <author initials="M." surname="Schläffer" fullname="Martin Schläffer">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NIST.SP.800-232" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-232.pdf">
  <front>
    <title>Ascon-Based Lightweight Cryptography Standards for Constrained Devices</title>
    <author initials="M. S." surname="Turan" fullname="Meltem Sönmez Turan">
      <organization></organization>
    </author>
    <author initials="K. A." surname="McKay" fullname="Kerry A. McKay">
      <organization></organization>
    </author>
    <author initials="J." surname="Kang" fullname="Jinkeon Kang">
      <organization></organization>
    </author>
    <author initials="J." surname="Kelsey" fullname="John Kelsey">
      <organization></organization>
    </author>
    <date year="2025" month="August"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/NIST.SP.800-232"/>
</reference>


    </references>

</references>


<?line 315?>

<section anchor="xmp"><name>Examples</name>

<t>This appendix provides some examples of various Ascon-AEAD128 Encryptions with COSE and JOSE</t>

<section anchor="cose"><name>COSE</name>

<section anchor="simple-ascon-aead128-encryption"><name>Simple Ascon-AEAD128 encryption</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "Encrypt0_hex": "8344A1011823A1055000000000000000000000000000000000582461484F95FC36BD13D7EFCA1C370EE3B6A1125770C8878467D3AE466C7C6CC4F4918BAA96",
  "Encrypt0_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'61484F95FC36BD13D7EFCA1C370EE3B6A1125770C8878467D3AE466C7C6CC4F4918BAA96']"  
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-recipient"><name>Direct Ascon-AEAD128 encryption with recipient</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "abcdef",
    "kty": "Symmetric"
  },
  "Encrypt": "8444A1011823A10550000000000000000000000000000000005824D3468D9110A2C3005E82D48628CD462BBD8721FBABE883A7743F191AC81CA8D6BBED5E44818340A20125044661626364656640",
  "Encrypt_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'D3468D9110A2C3005E82D48628CD462BBD8721FBABE883A7743F191AC81CA8D6BBED5E44', [[h'', {1: -6, 4: h'616263646566'}, h'']]]"
}
]]></artwork></figure>

</section>
<section anchor="direct-ascon-aead128-encryption-with-hkdf-sha-256"><name>Direct Ascon-AEAD128 encryption with HKDF-SHA-256</name>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "nonce_hex": "00000000000000000000000000000000",
  "AAD_hex": "8367456E637279707443A1010140",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E",
  "key": {
    "kid": "abcdef",
    "kty": "Symmetric"
  },
  "salt": "abcdefghijlmnopq",
  "Encrypt": "8444A1011823A10550000000000000000000000000000000005824B80EA16F0EBCC9F25502EE1D992D23C4E7984E2919AD6C3E37581FB099DB5855F1490ECF818340A3012933506162636465666768696A6C6D6E6F7071044661626364656640",
  "Encrypt_diag": "[h'A1011823', {5: h'00000000000000000000000000000000'}, h'B80EA16F0EBCC9F25502EE1D992D23C4E7984E2919AD6C3E37581FB099DB5855F1490ECF', [[h'', {1: -10, -20: h'6162636465666768696A6C6D6E6F7071', 4: h'616263646566'}, h'']]]"
}
]]></artwork></figure>

</section>
</section>
<section anchor="jose"><name>JOSE</name>

<t>The examples use the following plaintext and cek:</t>

<figure><artwork><![CDATA[
{
  "plaintext": "This is the content.",
  "CEK_hex": "849B57219DAE48DE646D07DBB533566E"
}
]]></artwork></figure>

<section anchor="jwe-structure-with-direct-ascon-aead128-encryption"><name>JWE structure with direct Ascon-AEAD128 encryption</name>

<figure><artwork><![CDATA[
{
  "protected": "eyJhbGciOiJkaXIiLCJlbmMiOiJBc2Nvbi1BRUFEMTI4In0", \* {"alg": "dir", "enc": "Ascon-AEAD128"} *\
  "aad": "g2dFbmNyeXB0Q6EBAUE",
  "encrypted_key": "",
  "iv": "AAAAAAAAAAAAAAAAAAAAAA",
  "tag": "EihrljYH6xrt08Ae9Slqzw",
  "ciphertext": "dMbnoonoAEUph2N4KWIj_i_L-oo"
}
]]></artwork></figure>

</section>
<section anchor="jwe-structure-with-ascon-aead128-encryption-and-aes-128-key-wrap"><name>JWE structure with Ascon-AEAD128 encryption and AES-128 Key Wrap</name>

<figure><artwork><![CDATA[
{
  "protected": "eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBc2Nvbi1BRUFEMTI4Iiwia2lkIjoiYWJjZGVmIn0", \* {"alg":"A128KW","enc":"Ascon-AEAD128","kid":"abcdef"} *\
  "aad": "g2dFbmNyeXB0Q6EBAUE",
  "header": {
    "alg": "A128KW",
    "kid": "abcdef"
  },
  "encrypted_key": "V4d7CMPzWA3ntHiL4gcN5EYoQJX2t-Gw",
  "iv": "AAAAAAAAAAAAAAAAAAAAAA",
  "tag": "9vY9jDG2LZOVmHsD6kHgkA",
  "ciphertext": "wZJfEzhC59fiqtnKtYpXqCi0-Xo"
}
]]></artwork></figure>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+1a2XLbyJJ9r6+ooGPCcgdJkSAJLjEdMeAii7IWtyhbdvd1
dIBAkSwJBGgUSJm2fL9mHmZ+YF7msd/nmyYzCxspUpa7fR/mxqgj2lhqyco8
eXIBS6USi2TkiQ63lBP4JWtg9atGi0+CkPcuRgNu+y4/gQv2jNvjcShWHc7c
wPHtOcxxQ3sSlQJndmurkhMoUbJplUqNuXYEA4yKYcJdqWoyBx5Mg3Dd4dKf
BIzJRdjhUbhUkVGptCsGs0Nhd/hL4YvQ9thdEN5Ow2C56Gg5ruFe+lP+Ep+x
W7GGAW6HD/1IhL6ISn0UhTEVgcC/217gw+5rodhCdvhvUeAUuQrCKBQTBVfr
OV58YMxeRrMg7DBeYhz+pK86vF/mF3QieqQP2p+vozDIPw/Cqe3Lz3YkAx/E
OLviVuTZfiQ/LgUNEHNbeqAimlnWOvo3OY9KdjquPAk3dj4u81PBu8HSFWFu
8+M//tP74z98sfXyqRLMhAc6LXuiNKbJ3xDCKvPXwgtWOQEsT3wCtYow9+ap
u9vJ3PIC5+7YnPlBOId1VgLswC+Peka12o4vm42qmV02s8tWfNmqNuvxZbvS
MLLLGl4OrXOrjLhMb27ohiEEc5sSalfVslFybKFsBAT85R2D49siHy3Hc6kU
nJlHAb8MluAdNR5MeDQTvGcNRtYld4L5QsBcGKSXscOpiMAOUbRQncPD3HtV
dsLyelGOgsMQ16odxpIY5YU7odkpQumvFP+bWKY3C6WKgsWM94NxaC99Od0z
8swOpc0H0pl5SiQQejjsyAtgnM/PBNjM279WJH0+grX++PfJJF4s8Xjw9bxG
fRDwifo8kr7txVqNdXo+HF3xUzmdRXcC/8974XoRBdPQXszWfBEGN8KJdqtZ
hU4ZNy9Pg9Vhb3TZO5wLV9qHr/Ukdehly5ac3LKHwG/LufBhyAQlgjVKZJ7D
5QIP6ZbUQjglGKXNpW9p6P9hsxlVuEV1l0evy61KpWTUjId2K3VtkGO/RUbI
v3boKh1BAOJRaEsfpvTFSjpC7bSVv/IWy7HKzIUX+ORwBKqVtvd6OfakQ2Sj
DreEfKLOz4QXiTkf/fFf/lx85lfL0Pb3DH0lwnCNRHjmvLLXewadSP9WAG5f
2f4+450EM3gvwHLrnKqt5RSCHmq8QU+VCKVQyEiJ6P2LYYdXK2WzYrS2T8sY
K5VKEItRsQB9djWTiieI5a5QTijHQvFe9+KSX4wR6nwkpz4GTwzmA5+wji53
gJH1BT1lJ6OL828NP6HhKC84haZ+xe9kNIt9+m4GOGUgjq39VsVgICzkvI3n
va3M2NBH2mgXgTVg6gJgiu7/kE6LMQYxQUHZ0jub34lQMAWRzgH/xHWQPCYy
BEU7swCARzLgw7wciBjQGiILZonsqF++bIeEr1/LzJpAslGEMInGqxX5OakA
KGsIMJfRMhIod+YCKOOVcGZ+4AXTNT9ApaD+tJRMK21iz6W3xok5rUgHAidk
S6DbuUJqHAsSfp9GWV6jG9KjJ4HsIGIeeEVtoNi7eM69eIwzfgdKDEFU9Pci
cwXwG2JC63xMLLDPpKmYmgWcjAVgHWIBEHEL1ygjQTkUTgDwI1nm9i2MlRFh
QjpLzw5BVRJzPgEaB8cD1QjfHnsihqBW1RKlI2Bu5LAgV7h0oiVMLj9wnAB2
8gP0IDipgDlr7ou7jXMVeeB7a7blAGA58UmSOFsmVGsFlKNSp3RBdLbr5Nqn
59J1PYHuABmjC4KiCuK/L88kPv3Kfs79MZYnWMiCMWlWXC2dGbpAkhujhHBY
f6r4wTAABKYj54GK4kgLZcAcTh0K8BcbmQUO+RlWHa9jr5lL9BH0xmWU4H4R
gN+ResGTAj+YgzcD0CLULFgjEp+iIk2PfRC2UksZkb32o31mRxjZV9IVnIXB
GEGrhLOE92uyarCMCFTLOercw2DC7TlEaDoMWDdYhggykEIohQ4OkRncDcjl
TvpQXyTZxTcBHBsZxYEF6VBoGNILQzvGlPQULyZeXIhwghTrwPoS4wF6CENZ
MpAooBLaFnDxg4LuDtBxGcNMoFxoFrJPTmBUcYxreGHluZLlwkIcAFQAVIKa
6duRzQ+wkHwBjM5ntprxydJ3NIMjWAB9XLyLIFdBJLCLJcT6iB/FYwCl7y6O
1IsHLjqBCwXSopuDwnCHNFhoKyRmA7qLYl6gSMCWyp6KdFxa5e6giJiwItww
CwggC7sSIeBNUzn4oy+Eu+GOKK7gUJlyLE0VL5y9GV0Vivpffn5B15eDX94M
Lwd9vB4dW6en6YUeweDm4s1p/B6vspm9i7OzwXlfT4anfOvRmfW+QApmhYvX
V8OLc+u0gMEq2tAiurhmSeLRRSjiiLnBUt3ea16tA03H9Rjgha6x3oLrO4CC
tiUyYnwLil5ze7EQdojb2p4HRf8C3N1TFNrVLLjzoRwNBapTWywHN9Ap3qlN
jtOaHWqTw5SF0M6bO5KmZRqwN6ArZybmIvF72pvFPot+6XnAZBRVi5S7weMN
pJS3bmHlXAaSPHWFw3IHQk0DPmG5aINLESIKHvBbTY5+4AM30hOtRciPp/o+
ps8QiSKMnWcWWw4JmMoS7i/nYxGiG+OAcXmnu2ORIidSO8SWH6RCa4+g3ClA
naDvx0eADaBwvn8VC1/kt/fnqeCgtfurWGgQ+f4SBC7y8B5cG9gWSG8eBw0t
MeLhfkhMvOvd+J7do1hjGanHL+5b9+xLhz+jfMcWtkvCKl2y/FzYPGV2kMJX
gpTtunFeuUthBAqV2gNSB1+nSJio5FIxPAFIkxpN8f/57yK6BJgf8qh//Rnu
8f+J2GUGmqK0wcOQAuHO52adXnHNBARncNAsn8XEE8zrAKQmSzC7VLdga9tb
A0GXOWMjiZYgJoPIkqZA4IWuxEoPHV85wIihDFRxixFC8XEJ6RTlmaGYAuUL
TJVDIfgKy880zdlUp8Q0Oe2wICkAdhgkCHMk6FQZMK8Glb5Z1/BNtMAPFKz/
5QvO1W7/9UWZv1GIOFR5zSjBsEwAdFNXggBQt021q/JovQBP97KT0Q4xbWqC
0xEupimQGDKSUJB/57JSVBboDWML4f8GMg50FTdNO4Cw7s8BPPcg6n2fiJJ4
BYC6oZT7q26fH8QKJVpVUEuRlmuNF/c7og9c0EFRYXHZkq/ccnHWSpx0e9ND
s/7YvubOfc36X962Zjy2bXPntrFZv2tbdPAUJolrE9atjGwRD7Rf7Nv4vohU
C1muTd4UjCNt7UkYzLmAaeRTxMZJXcADfAQliFxI8pn0BUU/bDFSun4NUQZQ
Q0WydjtcRpeYFE9iuYpbXApRyLnVkWFuu9iJ5PwnopPCbbQuQMUqPJdTwgAS
Q2xWFN8Q1qC15HlhtJ5TUHEKZb3CUMe1AmycLAJipPOTuXM7cjS9Z371wK+z
YDAWKDMyydY2cNjfg4V6bCsgJG8JCXwhDsIFShLSkOxP/8KSEGdzS8Z3ekmy
RS7uo+aSAVmuukFjyIS+oIzFcSBzs5FKaeBI6BqsUaYe7yYELE8F+5kUgzZR
aZhq+ZGwq3JkepORKTppypqJ36TMebPJnL4nb0UM+4iCj8SCNu9xmdEVxQvq
+VyL8WaT5xp7PCnupa6KMePwXXCeXIG9l05TPk5pEyzyKG0+creXJvMdq6fS
5OMP9jHjt3dCirrZpqiTxyjq5HGgxgWnULsgC4n00nNjWslQmmIUv5oQRofz
hScQmXEMp9IaySdzQ2S8zIO0o61sT9emND5JWSHaCmJUyFv8aTQrMir8U7ag
3kEQhqglerOAQywQcVnzDXPzCHNQ6a8Cb0XEMnzLjyFzw69LSYKmGx6rh5UA
FQMx1FUwxw0p3aBaMHOnpCp3dfm6lGoGe44FVM/Cj3Nu+j4DGpPYa0rbOXwF
4oOwB8O3ujGqk/ODc3Cx65n0BD9Hl9BJOFatdjgl32fJETdNlVn4MGfdpBwG
QeH08XrkQbafdKBcWlHYTtJdzTRN3rfRK4WJkdg6Cqj2GKqaFbYsNxO1B70u
yHMwOYYlZtoSaaqM/q4rhzWndB+y19lSURNUcw1yMG4C9buHndANbb7V2nxg
34NzapAP3xbZqT0WXoc3XiASX2Ofz/7eZdJZb4s8Xs58AWplSc1D0VPn1pBA
61PR16XUfAlBE4DVIvDdtNmZWgsUeqHRE1DuAIm7W8xIFLvmNnHmVt98W2yV
hIY1A/fapH1tEcAqbKEVvuPUBQJlQQN0U1Vsr6oKclUAEKeQoKirF8qZW6pd
VM90lY9MpJJTKiqDQJ1BKAgOJwQH3CZXaT2udfYUretteNYNoRRoW3KVFrgu
uyNH1elZvNjurg52xTHv362IDfQkuRccHw6MvMVGSU8SO24S1B2zLHBXUjfs
ZLCsWZR2NZ3NFVDcHSVpMU/v2U0Ti1VAQi4/QfLFlkjAKEGJTxJ3+IE57oTn
Yd1oUcZDNZe2DXWEgcIp+U2kSypNvsh9hss41iUuwe4Ods1ZOm219PC3HGPp
ac5XAZ/YYdrEGEOmxO0osjEj1l8EY17d8P0kP2WgdSrlQNImP8AeMLyqGi/S
tgEMwgRRV5DgWVq+GRFlKtQcNpK0aiOeyA7qBv+XhACqRvwYfOUMLA0eCWWD
p3N2ewWX1L2G5U+lbp7TxxMIMC63Ej2pOCRTQH7wLQZCHnj8DtRIUPSemGfF
rQoq0gfJ54ZLzSOgXPyA8OgfY8+ePePn4o5vV07wPJaIvr4ktRzsY7vuVv0C
sAiphaTRsrUUi+VZ6w5JruwJMBHBVTeS4kjAY4g6pFwWt/wf9CJTXNf0NyLw
1kuBcZ9YKi4YWJpc5cpTcmJEVcALR9JDt74AIivgg6yXwJc+0FPcaaFGcZmU
9WzfT6KekcZ+4lxHn41R9Pyt7S3hxaO9ABqYS4m3f4C1nfXS+J69SN2pw3+D
kvEDPb8U1ONxYFP9Xe81Tz8X0+tUXR3+HsCy43iQDD/thDDwiYc0n3bILN/+
h58RIPG0M8aLfvuMzaedMSvCftgZc4DOfHu75PgLvp3kNWxvXpPbZ4/js6c4
Pt/n+CwJcC0izT0uebJhzFSmvc6Zjfhe78tmvqHPSaeBDoUH6kUHswoaROJs
1l2gnY9LGdIDMPfFQn891UiAJBKWglgQhaA1EUJSPBi9pHejjajdj5sMtNsu
dGTipXEomaNokn9oP+b536HIhAOersstJ/+nUCV+sx9D9sLY4JONYlIQ/zRf
ZDE8/oSJH8Ugt/2UQF3p4lUk0yBPwN5MsFRbusu8Te34WKnbXSwL7yOJ6+0t
QTUd/D39Y18Y5wXwREmf6gsdXiBxs4IUE+ZyoYjDKEP+fSY+4bDKN/70FMvq
JxNaNbNZb5gDs9Y0mu1mpVmv16xqBf6rx4N7g1fp4Hq722ga1XbfGtRb/YFZ
N/uVZr/bbdRqDdMc6AmxbirZFvU6LlltGbh0o/EtISuNllE3q/VW/ajdOOrV
zG6/Wus3B0c9q9qrNSuDQa1rWtWq0Wg2K71Wq9mqm81+DWQyzV6zZ/Z69aN6
u9rqWlbb3JLJlfYUhfpt9jyR6Tlk7I0Onz3/lljPIbefPf9Rgj3/UOCcfc2b
nbDSl9Sp2YsVglvWCf+ngs6tWMPgL/Rzu8KtdHGmPXag+Kb3XHfjO/lGOzz+
mjex3uzPIK5fq5utfrtarVhGrwbPBi2jX2+ZRqvXr5tGt9tvwQGOulZ30GrV
rGazXjuqtqtWr1XtWa2+2e0O+o1Bvd6qAuJhjQrgoFIH01dNw6zBgeGciWZi
YX8AHH+U1LDtbyAF7l7t8JJZ5PUOoT0TXm/4/MOHD4U/i9vjV/2j0ujYKhkN
8/+hm0BX2V6UjZ/O5I0394PFx8KPAXa3VRlYVfOoMuj2eu0jA6YZg0G1324b
faPWqw+a7VZ9YLSrbatv9mqDWrPRAsRU2u1+t9FqNI6q9XZl0DuKgV0DYLfh
6JU8Nsym2TLbpmX2zD7o9Qh0Wv3Hg/9HnWwL/NVKkZeMyjb+d53x+Xf5yUmW
FmA+nuYZ+J1768cdiRtQUuGI286fdpXvgfIOvz65zv0+U3ux+w1Xx2k7xA2D
iIp5lESsT2bjl468kCe39ruhPO2deOP5Gd53HeN8NZbV7uWbo8HZ1bA+9AE4
/G8/8S/0HRVmgwD4wyrYEu825Ch85T/9DbezbdpoarhH4/n5WrzrVn4xB13r
TeywsbzC/V27bkE/litacuefHhFp1A7kLPRu3h+bn8Ko0rJEe+R9/Hynh0Bw
nokwMY17NvaDwA+swZvFzDivv7oe3vwufz8tBcETFb5X0/Rbp8GIfnmNvwC6
Du3FHl7do/0uanhUdR63gLyTtuHdDm8C+f765ObXl2/n21YpWCDEq+tCUZtl
yypFzYkJJT7VSPqzR0assf2TrXaxbcqqDwz8tu42e2evP19bNT86lqf1qXPe
GLwPfjl5Z0Sll3ffCYD26n37pv/SOP314u38WPXN2+PprbULAHe/nkwGn2e9
RnsiP0b+q+j94t3HnqyU3m0D4H8BjqGj6Pg3AAA=

-->

</rfc>

