Movatterモバイル変換


[0]ホーム

URL:


Internet Assigned Numbers Authority

CBOR Object Signing and Encryption (COSE)

Created
2017-01-11
Last Updated
2026-02-06
Available Formats

XML

HTML

Plain text

Registries Included Below

COSE Header Parameters

Expert(s)
Francesca Palombini, Carsten Bormann
Reference
[RFC9052]
Available Formats

CSV
RangeRegistration Procedures
Integers less than -65536Private Use
Integer values in the range -1 to -65536delegated to the COSE Header Algorithm Parameters registry
Integer values between 1 and 255Standards Action With Expert Review
Integer values from 256 to 65535Specification Required
Integer values greater than 65535Expert Review
Strings of length 1Standards Action With Expert Review
Strings of length 2Specification Required
Strings of length greater than 2Expert Review
NameLabelValue TypeValue RegistryDescriptionReference
Reserved for Private Useless than -65536[RFC9052]
delegated to the COSE Header Algorithm Parameters registry-65536 to -1
Reserved0[RFC9052]
alg1int / tstr[COSE Algorithms]Cryptographic algorithm to use[RFC9052]
crit2[+ label][COSE Header Parameters]Critical headers to be understood[RFC9052]
content type3tstr / uint[COAP Content-Formats] or [Media Types]Content type of the payload[RFC9052]
kid4bstrKey identifier[RFC9052]
IV5bstrFull Initialization Vector[RFC9052]
Partial IV6bstrPartial Initialization Vector[RFC9052]
counter signature7COSE_Signature / [+ COSE_Signature ]CBOR-encoded signature structure (Deprecated by [RFC9338])[RFC8152]
Unassigned8
CounterSignature09bstrCounter signature with implied signer and headers (Deprecated by [RFC9338])[RFC8152]
kid context10bstrIdentifies the context for the key identifier[RFC8613, Section 5.1]
Countersignature version 211COSE_Countersignature / [+ COSE_Countersignature]V2 countersignature attribute[RFC9338]
Countersignature0 version 212COSE_Countersignature0V2 Abbreviated Countersignature[RFC9338]
kcwt13COSE_MessagesA CBOR Web Token (CWT) containing a COSE_Key in a 'cnf' claim and possibly other claims. CWT is defined in [RFC8392]. COSE_Messages is defined in [RFC9052].[RFC9528]
kccs14mapA CWT Claims Set (CCS) containing a COSE_Key in a 'cnf' claim and possibly other claims. CCS is defined in [RFC8392].[RFC9528]
CWT Claims15mapmap keys in [CWT Claims]Location for CWT Claims in COSE Header Parameters.[RFC9597, Section 2]
typ (type)16uint / tstr[COAP Content-Formats] or [Media Types]Content type of the complete COSE object[RFC9596, Section 2]
sd_claims (TEMPORARY - registered 2026-01-16, expires 2027-01-16)17[ +bstr ]A list of selectively disclosed claims, which were originally redacted, then later disclosed at the discretion of the sender.[RFC-ietf-spice-sd-cwt-06, Section 4]
Unassigned18-21
c5t (TEMPORARY - registered 2024-03-11, publication requested 2025-09-23)22COSE_CertHashHash of a C509Certificate[draft-ietf-cose-cbor-encoded-cert-12]
c5u (TEMPORARY - registered 2024-03-11, publication requested 2025-09-23)23uriURI pointing to a COSE_C509 containing an ordered chain of certificates[draft-ietf-cose-cbor-encoded-cert-12]
c5b (TEMPORARY - registered 2024-03-11, publication requested 2025-09-23)24COSE_C509An unordered bag of C509 certificates[draft-ietf-cose-cbor-encoded-cert-12]
c5c (TEMPORARY - registered 2024-03-11, publication requested 2025-09-23)25COSE_C509An ordered chain of C509 certificates[draft-ietf-cose-cbor-encoded-cert-12]
Unassigned26-31
x5bag32COSE_X509An unordered bag of X.509 certificates[RFC9360]
x5chain33COSE_X509An ordered chain of X.509 certificates[RFC9360]
x5t34COSE_CertHashHash of an X.509 certificate[RFC9360]
x5u35uriURI pointing to an X.509 certificate[RFC9360]
Unassigned36-169
sd_alg (TEMPORARY - registered 2026-01-16, expires 2027-01-16)170int[COSE Algorithms]The hash algorithm used for redacting disclosures.[RFC-ietf-spice-sd-cwt-06, Section 7]
sd_aead_encrypted_claims (TEMPORARY - registered 2026-01-16, expires 2027-01-16)171[ +[bstr,bstr,bstr] ]A list of AEAD encrypted selectively disclosed claims, which were originally redacted, then later disclosed at the discretion of the sender.[RFC-ietf-spice-sd-cwt-06, Section 12.1]
sd_aead (TEMPORARY - registered 2026-01-16, expires 2027-01-16)172uint .size 2[AEAD Algorithms]The AEAD algorithm used for encrypting disclosures.[RFC-ietf-spice-sd-cwt-06, Section 12.1]
Unassigned173-255
CUPHNonce256bstrChallenge Nonce[FIDO Device Onboard Specification]
CUPHOwnerPubKey257arrayPublic Key[FIDO Device Onboard Specification]
payload-hash-alg258int[COSE Algorithms]The hash algorithm used to produce the payload of a COSE_Sign1[RFC-ietf-cose-hash-envelope-09, Section 3]
preimage-content-type259uint / tstr[CoAP Content-Formats]The content-format number or content-type (media-type name) of data that has been hashed to produce the payload of the COSE_Sign1[RFC-ietf-cose-hash-envelope-09, Section 3]
payload-location260tstrThe string or URI hint for the location of the data hashed to produce the payload of a COSE_Sign1[RFC-ietf-cose-hash-envelope-09, Section 3]
x5ts261array of COSE_CertHashCBOR array of instances of COSE_CertHash[TS 119 152-1 V0.0.9, Clause 5.2.2]
srCms262array of SrCmset of commitments and optional commitments qualifiers[TS 119 152-1 V0.0.9, Clause 5.2.3]
sigPl263mapCBOR map for indicating the location where the signature was generated. It may contain an indication of the country, the locality, the region, a box number in a post office, the postal code, and the street address[TS 119 152-1 V0.0.9, Clause 5.2.4]
srAts264mapCBOR map that may contain: an array of attributes that the signer claims to be in possession of, an array of attribute certificates (X.509 attribute certificates or other) issued to the signer, an array of signed assertions issued by a third party to the signer,or any combination of the three aforementioned CBOR arrays[TS 119 152-1 V0.0.9, Clause 5.2.5]
adoTst265mapCBOR map that encapsulates one or more electronic time-stamps, generated before the signature production, and whose message imprint computation input is the COSE Payload of the CB-AdES signature[TS 119 152-1 V0.0.9, Clause 5.2.6]
sigPId266mapCBOR map that identifies a certain signature policy and may contain the digest of the document defining this signature policy.[TS 119 152-1 V0.0.9, Clause 5.2.7]
sigD267mapCBOR map that references data objects that are detached from the CB-AdES signature and that are collectively signed.[TS 119 152-1 V0.0.9, Clause 5.2.8]
uHeaders268[+bstr]CBOR array that contains a number of CBOR elements that are placed within the array in the order they are incorporated into the CB-AdES signature[TS 119 152-1 V0.0.9, Clause 5.3.1]
3161-ttc269bstr[RFC3161] timestamp token: Timestamp then COSE[RFC-ietf-cose-tsa-tst-header-parameter-07, Section 3.2]
3161-ctt270bstr[RFC3161] timestamp token: COSE then Timestamp[RFC-ietf-cose-tsa-tst-header-parameter-07, Section 3.1]
Unassigned271-393
receipts394arrayPriority ordered sequence of CBOR encoded Receipts[RFC-ietf-cose-merkle-tree-proofs-18, Section 2]
vds395int[COSE Verifiable Data Structure Algorithms]Algorithm identifier for verifiable data structures, used to produce verifiable data structure proofs[RFC-ietf-cose-merkle-tree-proofs-18, Section 2]
vdp396mapmap key in [COSE Verifiable Data Structure Proofs]Location for verifiable data structure proofs in COSE Header Parameters[RFC-ietf-cose-merkle-tree-proofs-18, Section 2]

COSE Header Algorithm Parameters

Registration Procedure(s)
Expert Review
Expert(s)
Göran Selander, Derek Atkins, Sean Turner
Reference
[RFC9053]
Available Formats

CSV
NameAlgorithmLabelTypeDescriptionReference
Unassigned-65536 to -30
x5chain-senderECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-29COSE_X509static key X.509 certificate chain[RFC9360]
x5u-senderECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-28uriURI for the sender's X.509 certificate[RFC9360]
x5t-senderECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-27COSE_CertHashThumbprint for the sender's X.509 certificate[RFC9360]
PartyV otherdirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-26bstrParty V other provided information[RFC9053]
PartyV noncedirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-25bstr / intParty V provided nonce[RFC9053]
PartyV identitydirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-24bstrParty V identity information[RFC9053]
PartyU otherdirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-23bstrParty U other provided information[RFC9053]
PartyU noncedirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-22bstr / intParty U provided nonce[RFC9053]
PartyU identitydirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-21bstrParty U identity information[RFC9053]
saltdirect+HKDF-SHA-256, direct+HKDF-SHA-512, direct+HKDF-AES-128, direct+HKDF-AES-256, ECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-20bstrRandom salt[RFC9053]
Unassigned-19 to -4
static key idECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-3bstrStatic public key identifier for the sender[RFC9053]
static keyECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW-2COSE_KeyStatic public key for the sender[RFC9053]
ephemeral keyECDH-ES+HKDF-256, ECDH-ES+HKDF-512, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW-1COSE_KeyEphemeral public key for the sender[RFC9053]

COSE Algorithms

Expert(s)
Göran Selander, Derek Atkins, Sean Turner
Reference
[RFC9053][RFC9054][RFC9864, Section 4.2]
Available Formats

CSV
RangeRegistration Procedures
Integers less than -65536Private Use
Integer values from -65536 to -257Specification Required
Integer values between -256 and 255Standards Action With Expert Review
Integer values from 256 to 65535Specification Required
Integer values greater than 65535Expert Review
Strings of length 1Standards Action With Expert Review
Strings of length 2Specification Required
Strings of length greater than 2Expert Review
NameValueDescriptionCapabilitiesChange ControllerReferenceRecommended
Reserved for Private Useless than -65536[RFC9053]No
Unassigned-65536
RS1-65535RSASSA-PKCS1-v1_5 using SHA-1[kty]IESG[RFC8812][RFC9053]Deprecated
A128CTR-65534AES-CTR w/ 128-bit key[kty]IETF[RFC9459]Deprecated
A192CTR-65533AES-CTR w/ 192-bit key[kty]IETF[RFC9459]Deprecated
A256CTR-65532AES-CTR w/ 256-bit key[kty]IETF[RFC9459]Deprecated
A128CBC-65531AES-CBC w/ 128-bit key[kty]IETF[RFC9459]Deprecated
A192CBC-65530AES-CBC w/ 192-bit key[kty]IETF[RFC9459]Deprecated
A256CBC-65529AES-CBC w/ 256-bit key[kty]IETF[RFC9459]Deprecated
Unassigned-65528 to -269
ESB512-268ECDSA using BrainpoolP512r1 curve and SHA-512[kty]IETF[RFC9864, Section 2.1]No
ESB384-267ECDSA using BrainpoolP384r1 curve and SHA-384[kty]IETF[RFC9864, Section 2.1]No
ESB320-266ECDSA using BrainpoolP320r1 curve and SHA-384[kty]IETF[RFC9864, Section 2.1]No
ESB256-265ECDSA using BrainpoolP256r1 curve and SHA-256[kty]IETF[RFC9864, Section 2.1]No
KT256-264KT256 XOF[kty]IETF[RFC9861]No
KT128-263KT128 XOF[kty]IETF[RFC9861]No
TurboSHAKE256-262TurboSHAKE256 XOF[kty]IETF[RFC9861]No
TurboSHAKE128-261TurboSHAKE128 XOF[kty]IETF[RFC9861]No
WalnutDSA-260WalnutDSA signature[kty][RFC9021][RFC9053]No
RS512-259RSASSA-PKCS1-v1_5 using SHA-512[kty]IESG[RFC8812][RFC9053]No
RS384-258RSASSA-PKCS1-v1_5 using SHA-384[kty]IESG[RFC8812][RFC9053]No
RS256-257RSASSA-PKCS1-v1_5 using SHA-256[kty]IESG[RFC8812][RFC9053]No
Unassigned-256 to -54
Ed448-53EdDSA using the Ed448 parameter set in Section 5.2 of [RFC8032][kty]IETF[RFC9864, Section 2.2]Yes
ESP512-52ECDSA using P-521 curve and SHA-512[kty]IETF[RFC9864, Section 2.1]Yes
ESP384-51ECDSA using P-384 curve and SHA-384[kty]IETF[RFC9864, Section 2.1]Yes
ML-DSA-87-50CBOR Object Signing Algorithm for ML-DSA-87[kty]IETF[RFC-ietf-cose-dilithium-10]Yes
ML-DSA-65-49CBOR Object Signing Algorithm for ML-DSA-65[kty]IETF[RFC-ietf-cose-dilithium-10]Yes
ML-DSA-44-48CBOR Object Signing Algorithm for ML-DSA-44[kty]IETF[RFC-ietf-cose-dilithium-10]Yes
ES256K-47ECDSA using secp256k1 curve and SHA-256[kty]IESG[RFC8812][RFC9053]No
HSS-LMS-46HSS/LMS hash-based digital signature[kty][RFC8778][RFC9053]Yes
SHAKE256-45SHAKE-256 512-bit Hash Value[kty][RFC9054][RFC9053]Yes
SHA-512-44SHA-2 512-bit Hash[kty][RFC9054][RFC9053]Yes
SHA-384-43SHA-2 384-bit Hash[kty][RFC9054][RFC9053]Yes
RSAES-OAEP w/ SHA-512-42RSAES-OAEP w/ SHA-512[kty][RFC8230][RFC9053]Yes
RSAES-OAEP w/ SHA-256-41RSAES-OAEP w/ SHA-256[kty][RFC8230][RFC9053]Yes
RSAES-OAEP w/ RFC 8017 default parameters-40RSAES-OAEP w/ SHA-1[kty][RFC8230][RFC9053]Yes
PS512-39RSASSA-PSS w/ SHA-512[kty][RFC8230][RFC9053]Yes
PS384-38RSASSA-PSS w/ SHA-384[kty][RFC8230][RFC9053]Yes
PS256-37RSASSA-PSS w/ SHA-256[kty][RFC8230][RFC9053]Yes
ES512-36ECDSA w/ SHA-512[kty]IETF[RFC9053][RFC9864]Deprecated
ES384-35ECDSA w/ SHA-384[kty]IETF[RFC9053][RFC9864]Deprecated
ECDH-SS + A256KW-34ECDH SS w/ Concat KDF and AES Key Wrap w/ 256-bit key[kty][RFC9053]Yes
ECDH-SS + A192KW-33ECDH SS w/ Concat KDF and AES Key Wrap w/ 192-bit key[kty][RFC9053]Yes
ECDH-SS + A128KW-32ECDH SS w/ Concat KDF and AES Key Wrap w/ 128-bit key[kty][RFC9053]Yes
ECDH-ES + A256KW-31ECDH ES w/ Concat KDF and AES Key Wrap w/ 256-bit key[kty][RFC9053]Yes
ECDH-ES + A192KW-30ECDH ES w/ Concat KDF and AES Key Wrap w/ 192-bit key[kty][RFC9053]Yes
ECDH-ES + A128KW-29ECDH ES w/ Concat KDF and AES Key Wrap w/ 128-bit key[kty][RFC9053]Yes
ECDH-SS + HKDF-512-28ECDH SS w/ HKDF - generate key directly[kty][RFC9053]Yes
ECDH-SS + HKDF-256-27ECDH SS w/ HKDF - generate key directly[kty][RFC9053]Yes
ECDH-ES + HKDF-512-26ECDH ES w/ HKDF - generate key directly[kty][RFC9053]Yes
ECDH-ES + HKDF-256-25ECDH ES w/ HKDF - generate key directly[kty][RFC9053]Yes
Unassigned-24 to -20
Ed25519-19EdDSA using the Ed25519 parameter set in Section 5.1 of [RFC8032][kty]IETF[RFC9864, Section 2.2]Yes
SHAKE128-18SHAKE-128 256-bit Hash Value[kty][RFC9054][RFC9053]Yes
SHA-512/256-17SHA-2 512-bit Hash truncated to 256-bits[kty][RFC9054][RFC9053]Yes
SHA-256-16SHA-2 256-bit Hash[kty][RFC9054][RFC9053]Yes
SHA-256/64-15SHA-2 256-bit Hash truncated to 64-bits[kty][RFC9054][RFC9053]Filter Only
SHA-1-14SHA-1 Hash[kty][RFC9054][RFC9053]Filter Only
direct+HKDF-AES-256-13Shared secret w/ AES-MAC 256-bit key[kty][RFC9053]Yes
direct+HKDF-AES-128-12Shared secret w/ AES-MAC 128-bit key[kty][RFC9053]Yes
direct+HKDF-SHA-512-11Shared secret w/ HKDF and SHA-512[kty][RFC9053]Yes
direct+HKDF-SHA-256-10Shared secret w/ HKDF and SHA-256[kty][RFC9053]Yes
ESP256-9ECDSA using P-256 curve and SHA-256[kty]IETF[RFC9864, Section 2.1]Yes
EdDSA-8EdDSA[kty]IETF[RFC9053][RFC9864]Deprecated
ES256-7ECDSA w/ SHA-256[kty]IETF[RFC9053][RFC9864]Deprecated
direct-6Direct use of CEK[kty][RFC9053]Yes
A256KW-5AES Key Wrap w/ 256-bit key[kty][RFC9053]Yes
A192KW-4AES Key Wrap w/ 192-bit key[kty][RFC9053]Yes
A128KW-3AES Key Wrap w/ 128-bit key[kty][RFC9053]Yes
Unassigned-2 to -1
Reserved0[RFC9053]No
A128GCM1AES-GCM mode w/ 128-bit key, 128-bit tag[kty][RFC9053]Yes
A192GCM2AES-GCM mode w/ 192-bit key, 128-bit tag[kty][RFC9053]Yes
A256GCM3AES-GCM mode w/ 256-bit key, 128-bit tag[kty][RFC9053]Yes
HMAC 256/644HMAC w/ SHA-256 truncated to 64 bits[kty][RFC9053]Yes
HMAC 256/2565HMAC w/ SHA-256[kty][RFC9053]Yes
HMAC 384/3846HMAC w/ SHA-384[kty][RFC9053]Yes
HMAC 512/5127HMAC w/ SHA-512[kty][RFC9053]Yes
Unassigned8-9
AES-CCM-16-64-12810AES-CCM mode 128-bit key, 64-bit tag, 13-byte nonce[kty][RFC9053]Yes
AES-CCM-16-64-25611AES-CCM mode 256-bit key, 64-bit tag, 13-byte nonce[kty][RFC9053]Yes
AES-CCM-64-64-12812AES-CCM mode 128-bit key, 64-bit tag, 7-byte nonce[kty][RFC9053]Yes
AES-CCM-64-64-25613AES-CCM mode 256-bit key, 64-bit tag, 7-byte nonce[kty][RFC9053]Yes
AES-MAC 128/6414AES-MAC 128-bit key, 64-bit tag[kty][RFC9053]Yes
AES-MAC 256/6415AES-MAC 256-bit key, 64-bit tag[kty][RFC9053]Yes
Unassigned16-23
ChaCha20/Poly130524ChaCha20/Poly1305 w/ 256-bit key, 128-bit tag[kty][RFC9053]Yes
AES-MAC 128/12825AES-MAC 128-bit key, 128-bit tag[kty][RFC9053]Yes
AES-MAC 256/12826AES-MAC 256-bit key, 128-bit tag[kty][RFC9053]Yes
Unassigned27-29
AES-CCM-16-128-12830AES-CCM mode 128-bit key, 128-bit tag, 13-byte nonce[kty][RFC9053]Yes
AES-CCM-16-128-25631AES-CCM mode 256-bit key, 128-bit tag, 13-byte nonce[kty][RFC9053]Yes
AES-CCM-64-128-12832AES-CCM mode 128-bit key, 128-bit tag, 7-byte nonce[kty][RFC9053]Yes
AES-CCM-64-128-25633AES-CCM mode 256-bit key, 128-bit tag, 7-byte nonce[kty][RFC9053]Yes
IV-GENERATION34For doing IV generation for symmetric algorithms.[RFC9053]No

COSE Key Common Parameters

Expert(s)
Francesca Palombini, Carsten Bormann
Reference
[RFC9052]
Available Formats

CSV
RangeRegistration Procedures
Integers less than -65536Private Use
Integer values in the range -65536 to -1used for key parameters specific to a single algorithmdelegated to the COSE Key Type Parameters registry
Integer values between 0 and 255Standards Action With Expert Review
Integer values from 256 to 65535Specification Required
Integer values greater than 65535Expert Review
Strings of length 1Standards Action With Expert Review
Strings of length 2Specification Required
Strings of length greater than 2Expert Review
NameLabelCBOR TypeValue RegistryDescriptionReference
Reserved for Private Useless than -65536[RFC9052]
used for key parameters specific to a single algorithm delegated to the COSE Key Type Parameters registry-65536 to -1[RFC9052]
Reserved0[RFC9052]
kty1tstr / int[COSE Key Types]Identification of the key type[RFC9052]
kid2bstrKey identification value - match to kid in message[RFC9052]
alg3tstr / int[COSE Algorithms]Key usage restriction to this algorithm[RFC9052]
key_ops4[+ (tstr/int)]Restrict set of permissible operations[RFC9052]
Base IV5bstrBase IV to be XORed with Partial IVs[RFC9052]

COSE Key Type Parameters

Registration Procedure(s)
Expert Review
Expert(s)
Göran Selander, Derek Atkins, Sean Turner
Reference
[RFC9053]
Available Formats

CSV
Key TypeNameLabelCBOR TypeDescriptionReference
1crv-1int / tstrEC identifier -- Taken from the "COSE Elliptic Curves" registry[RFC9053]
1x-2bstrPublic Key[RFC9053]
1d-4bstrPrivate key[RFC9053]
2crv-1int / tstrEC identifier -- Taken from the "COSE Elliptic Curves" registry[RFC9053]
2x-2bstrx-coordinate[RFC9053]
2y-3bstr / booly-coordinate[RFC9053]
2d-4bstrPrivate key[RFC9053]
3n-1bstrthe RSA modulus n[RFC8230]
3e-2bstrthe RSA public exponent e[RFC8230]
3d-3bstrthe RSA private exponent d[RFC8230]
3p-4bstrthe prime factor p of n[RFC8230]
3q-5bstrthe prime factor q of n[RFC8230]
3dP-6bstrdP is d mod (p - 1)[RFC8230]
3dQ-7bstrdQ is d mod (q - 1)[RFC8230]
3qInv-8bstrqInv is the CRT coefficient q^(-1) mod p[RFC8230]
3other-9arrayother prime infos, an array[RFC8230]
3r_i-10bstra prime factor r_i of n, where i >= 3[RFC8230]
3d_i-11bstrd_i = d mod (r_i - 1)[RFC8230]
3t_i-12bstrthe CRT coefficient t_i = (r_1 * r_2 * ... * r_(i-1))^(-1) mod r_i[RFC8230]
4k-1bstrKey Value[RFC9053]
5pub-1bstrPublic key for HSS/LMS hash-based digital signature[RFC8778]
6N-1uintGroup and Matrix (NxN) size[RFC9021]
6q-2uintFinite field F_q[RFC9021]
6t-values-3array (of uint)List of T-values, entries in F_q[RFC9021]
6matrix 1-4array (of array of uint)NxN Matrix of entries in F_q in column-major form[RFC9021]
6permutation 1-5array (of uint)Permutation associated with matrix 1[RFC9021]
6matrix 2-6array (of array of uint)NxN Matrix of entries in F_q in column-major form[RFC9021]
7pub-1bstrPublic key[RFC-ietf-cose-dilithium-10]
7priv-2bstrPrivate key[RFC-ietf-cose-dilithium-10]

COSE Key Types

Registration Procedure(s)
Expert Review
Expert(s)
Göran Selander, Derek Atkins, Sean Turner
Reference
[RFC9053]
Available Formats

CSV
NameValueDescriptionCapabilitiesReference
Reserved0This value is reserved[RFC9053]
OKP1Octet Key Pair[kty(1), crv][RFC9053]
EC22Elliptic Curve Keys w/ x- and y-coordinate pair[kty(2), crv][RFC9053]
RSA3RSA Key[kty(3)][RFC8230][RFC9053]
Symmetric4Symmetric Keys[kty(4)][RFC9053]
HSS-LMS5Public key for HSS/LMS hash-based digital signature[kty(5), hash algorithm][RFC8778][RFC9053]
WalnutDSA6WalnutDSA public key[kty(6)][RFC9021][RFC9053]
AKP7COSE Key Type for Algorithm Key Pairs[kty(7)][RFC-ietf-cose-dilithium-10]

COSE Elliptic Curves

Expert(s)
Göran Selander, Derek Atkins, Sean Turner
Reference
[RFC9053]
Available Formats

CSV
RangeRegistration Procedures
Integers less than -65536Private Use
Integer values -65536 to -257Specification Required
Integer values -256 to 255Standards Action With Expert Review
Integer values 256 to 65535Specification Required
Integer values greater than 65535Expert Review
NameValueKey TypeDescriptionChange ControllerReferenceRecommended
Reserved for Private UseInteger values less than -65536[RFC9053]No
Unassigned-65536 to -1
Reserved0[RFC9053]No
P-2561EC2NIST P-256 also known as secp256r1[RFC9053]Yes
P-3842EC2NIST P-384 also known as secp384r1[RFC9053]Yes
P-5213EC2NIST P-521 also known as secp521r1[RFC9053]Yes
X255194OKPX25519 for use w/ ECDH only[RFC9053]Yes
X4485OKPX448 for use w/ ECDH only[RFC9053]Yes
Ed255196OKPEd25519 for use w/ EdDSA only[RFC9053]Yes
Ed4487OKPEd448 for use w/ EdDSA only[RFC9053]Yes
secp256k18EC2SECG secp256k1 curveIESG[RFC8812]No
Unassigned9-255
brainpoolP256r1256EC2BrainpoolP256r1[ISO/IEC JTC 1/SC 17/WG 10][ISO/IEC 18013-5:2021, 9.1.5.2]No
brainpoolP320r1257EC2BrainpoolP320r1[ISO/IEC JTC 1/SC 17/WG 10][ISO/IEC 18013-5:2021, 9.1.5.2]No
brainpoolP384r1258EC2BrainpoolP384r1[ISO/IEC JTC 1/SC 17/WG 10][ISO/IEC 18013-5:2021, 9.1.5.2]No
brainpoolP512r1259EC2BrainpoolP512r1[ISO/IEC JTC 1/SC 17/WG 10][ISO/IEC 18013-5:2021, 9.1.5.2]No

COSE Verifiable Data Structure Algorithms

Registration Procedure(s)
Specification Required
Expert(s)
Mike Jones, Orie Steele
Reference
[RFC-ietf-cose-merkle-tree-proofs-18]
Available Formats

CSV
NameValueDescriptionChange ControllerReference
Reserved0Reserved[RFC-ietf-cose-merkle-tree-proofs-18]
RFC9162_SHA2561SHA256 Binary Merkle TreeIETF[RFC9162, Section 2.1]

COSE Verifiable Data Structure Proofs

Registration Procedure(s)
Specification Required
Expert(s)
Mike Jones, Orie Steele
Reference
[RFC-ietf-cose-merkle-tree-proofs-18]
Available Formats

CSV
Verifiable Data StructureNameLabelCBOR TypeDescriptionChange ControllerReference
1inclusion proofs-1array (of bstr)Proof of inclusionIETF[RFC-ietf-cose-merkle-tree-proofs-18, Section 5.2]
1consistency proofs-2array (of bstr)Proof of append only propertyIETF[RFC-ietf-cose-merkle-tree-proofs-18, Section 5.3]

[8]ページ先頭

©2009-2026 Movatter.jp