<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.27 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-security-protocol-comparison-01" category="info" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title>Comparison of CoAP Security Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-security-protocol-comparison-01"/>
    <author initials="J" surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Vučinić" fullname="Mališa Vučinić">
      <organization>INRIA</organization>
      <address>
        <email>malisa.vucinic@inria.fr</email>
      </address>
    </author>
    <date year="2023" month="April" day="07"/>
    <workgroup>IOTOPS Working Group</workgroup>
    <abstract>
      <t>This document analyzes and compares the sizes of key exchange flights and the per-packet message size overheads when using different security protocols to secure CoAP. The described overheads are independent of the underlying transport. Small message sizes are very important for reducing energy consumption, latency, and time to completion in constrained radio network such as Low-Power Wide Area Networks (LPWANs). The analyzed security protocols are DTLS 1.2, DTLS 1.3, TLS 1.2, TLS 1.3, cTLS, EDHOC, OSCORE, and Group OSCORE. The DTLS and TLS record layers are analyzed with and without 6LoWPAN-GHC compression. DTLS is analyzed with and without Connection ID.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-iotops-security-protocol-comparison/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IOT Operations (iotops) Working Group mailing list (<eref target="mailto:iotops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/iotops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/iotops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lwig-wg/protocol-comparison"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Small message sizes are very important for reducing energy consumption, latency, and time to completion in constrained radio network such as Low-Power Personal Area Networks (LPPANs) and Low-Power Wide Area Networks (LPWANs). Constrained radio networks are not only characterized by very small frame sizes on the order of tens of bytes transmitted a few times per day at ultra-low speeds, but also high latency, and severe duty cycles constraints. Some constrained radio networks are also multi-hop where the already small frame sizes are additionally reduced for each additional hop. Too large payload sizes can easily lead to unacceptable completion times due to fragmentation into a large number of frames and long waiting times between frames can be sent (or resent in the case of transmission errors). In constrained radio networks, the processing energy costs are typically almost negligible compared to the energy costs for radio and the energy costs for sensor measurement. Keeping the number of bytes or frames low is also essential for low latency and time to completion as well as efficient use of spectrum to support a large number of devices. For an overview of LPWANs and their limitations, see <xref target="RFC8376"/> and <xref target="I-D.ietf-lake-reqs"/>.</t>
      <t>To reduce overhead, processing, and energy consumption in constrained radio networks, IETF has created several working groups and technologies for constrained networks, e.g., (here technologies in parenthesis when the name is different from the working group): 6lo, 6LoWPAN, 6TiSCH, ACE, CBOR, CoRE (CoAP, OSCORE), COSE, LAKE (EDHOC), LPWAN (SCHC), ROLL (RPL), and TLS (cTLS). Compact formats and protocol have also been suggested as a way to decrease the energy consumption of Internet Applications and Systems in general <xref target="E-impact"/>.</t>
      <t>This document analyzes and compares the sizes of key exchange flights and the per-packet message size overheads when using different security protocols to secure CoAP over UPD <xref target="RFC7252"/> and TCP <xref target="RFC8323"/>. The analyzed security protocols are DTLS 1.2 <xref target="RFC6347"/>, DTLS 1.3 <xref target="RFC9147"/>, TLS 1.2 <xref target="RFC5246"/>, TLS 1.3 <xref target="RFC8446"/>, cTLS <xref target="I-D.ietf-tls-ctls"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/> <xref target="I-D.ietf-core-oscore-edhoc"/>, OSCORE <xref target="RFC8613"/>, and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>. The described overheads are independent of the underlying transport.</t>
      <t>The protocols are analyzed with different algorithms and options. The DTLS and TLS record layers are analyzed with and without 6LoWPAN-GHC compression <xref target="RFC7400"/>. DTLS is analyzed with and without Connection ID <xref target="RFC9146"/>. Readers are expected to be familiar with some of the terms described in RFC 7925 <xref target="RFC7925"/>, such as Integrity Check Value (ICV). <xref target="handshake"/> compares the overhead of mutually authenticated key exchange, while <xref target="record"/> covers the overhead for protection of application data.</t>
      <t>Readers of this document also might be interested in the following documents: <xref target="Illustrated-TLS12"/>, <xref target="Illustrated-TLS13"/>, <xref target="Illustrated-DTLS13"/>, and <xref target="I-D.ietf-lake-traces"/> explain every byte in example TLS 1.2, TLS 1.3, DTLS 1.3, and EDHOC instances. <xref target="RFC9191"/> looks at potential tools available for overcoming the deployment challenges induced by large certificates and long certificate chains and discusses solutions available to overcome these challenges. <xref target="I-D.ietf-cose-cbor-encoded-cert"/> gives examples of IoT and Web certificates as well as examples on how effective C509 and TLS certificate compression <xref target="RFC8879"/> is at compressing example certificate and certificate chains. <xref target="I-D.kampanakis-tls-scas-latest"/> describes how TLS clients or servers can reduce the size of the TLS handshake by not sending certificate authority certificates. <xref target="I-D.mattsson-tls-compact-ecc"/> proposes new optimized encodings for key exchange and signatures with P-256 in TLS 1.3.</t>
      <section anchor="underlying-layers">
        <name>Underlying layers</name>
        <t>DTLS and cTLS are typically sent over 8 bytes UDP datagram headers while TLS is typically sent over 20 bytes TCP segment headers. TCP also uses some more bytes for additional messages used in TCP internally. EDHOC is typically sent over CoAP which would add 4 bytes to flight #1 and #2 and 5 or 20 bytes to flight #3 depending on if OSCORE is used <xref target="I-D.ietf-core-oscore-edhoc"/>. OSCORE and Group OSCORE is part of CoAP and are typically sent over UDP.</t>
        <t>IPv6, UDP, and CoAP can be compressed with the Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP) <xref target="RFC8824"/><xref target="I-D.tiloca-lpwan-8824-update"/>. Use of SCHC can significantly reduce the overhead. <xref target="SCHC-eval"/> gives an evaluation of how SCHC reduces this overhead for OSCORE and the DTLS 1.2 record layer when used in four of the most widely used LPWAN radio technologies</t>
        <t>Fragmentation can significantly increase the total overhead as many more packet headers have to be sent. CoAP, (D)TLS handshake, and IP supports fragmentation. If, how, and where fragmentation is done depends heavily on the underlying layers.</t>
      </section>
    </section>
    <section anchor="handshake">
      <name>Overhead of Key Exchange Protocols</name>
      <t>This section analyzes and compares the sizes of key exchange flights for different protocols.</t>
      <t>To enable a comparison between protocols, the following assumptions are made:</t>
      <ul spacing="normal">
        <li>The overhead calculations in this section use an 8 bytes ICV (e.g., AES_128_CCM_8 or AES-CCM-16-64-128) or 16 bytes (e.g., AES-CCM, AES-GCM, or ChaCha20-Poly1305).</li>
        <li>A minimum number of algorithms and cipher suites is offered. The algorithm used/offered are P-256 or Curve25519, ECDSA with P-256 and SHA-256 or Ed25519, AES-CCM_8, and SHA-256.</li>
        <li>The length of key identifiers are 1 byte.</li>
        <li>The length of connection identifiers are 1 byte.</li>
        <li>DTLS handshake message fragmentation is not considered.</li>
        <li>As many (D)TLS handshake messages as possible are sent in a single record.</li>
        <li>Only mandatory (D)TLS extensions are included.</li>
        <li>DoS protection with DTLS HelloRetryRequest or the CoAP Echo Option is not considered.</li>
      </ul>
      <t>The choices of algorithms are based on the profiles in <xref target="RFC7925"/>, <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and <xref target="I-D.ietf-core-oscore-edhoc"/>. Many DTLS implementations splits flight #2 in two records.</t>
      <t><xref target="summ-handshake"/> gives a short summary of the message overhead based on different parameters and some assumptions. The following sections detail the assumptions and the calculations.</t>
      <section anchor="summ-handshake">
        <name>Summary</name>
        <t>The DTLS, EDHOC, and cTLS overhead is dependent on the parameter Connection ID. The EDHOC and cTLS overhead is dependent on the key/certificate identifiers included. If 8 bytes key/certificate identifiers are used instead of 1 byte, the RPK numbers for flight #2 and #3 increases with 7 bytes and the PSK numbers for flight #1 increases with 7 bytes.</t>
        <t>The TLS, DTLS, and cTLS overhead is dependent on the group used for key exchange and the signature algorithm. secp256r1 and ecdsa_secp256r1_sha256 have less optimized encoding than x25519, ed25519, and <xref target="I-D.mattsson-tls-compact-ecc"/>.</t>
        <t><xref target="fig-compare1"/> compares the message sizes of DTLS 1.3, cTLS, and EDHOC handshakes with connection ID and the mandatory to implement algorithms CCM_8, P-256, and ECDSA <xref target="I-D.ietf-uta-tls13-iot-profile"/> <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Editor's note: The protocol and algorithm encoding in cTLS is currently not stable and the number might change in the final version. This version of the document analyses the -08 version of cTLS. It is uncertain if the TLS WG will adopt more compact encoding for P-256 and ECDSA such as secp256r1_compact and ecdsa_secp256r1_sha256_compact <xref target="I-D.mattsson-tls-compact-ecc"/>.</t>
        <figure anchor="fig-compare1">
          <name>Comparison of message sizes in bytes with CCM_8, P-256, and ECDSA and with Connection ID</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 552,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 552,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,254 L 552,254" fill="none" stroke="black"/>
                <path d="M 8,258 L 552,258" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Flight</text>
                  <text x="348" y="52">#1</text>
                  <text x="412" y="52">#2</text>
                  <text x="476" y="52">#3</text>
                  <text x="528" y="52">Total</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.3</text>
                  <text x="88" y="84">-</text>
                  <text x="120" y="84">RPKs,</text>
                  <text x="168" y="84">ECDHE</text>
                  <text x="344" y="84">185</text>
                  <text x="408" y="84">454</text>
                  <text x="472" y="84">255</text>
                  <text x="536" y="84">894</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="88" y="100">-</text>
                  <text x="140" y="100">Compressed</text>
                  <text x="208" y="100">RPKs,</text>
                  <text x="256" y="100">ECDHE</text>
                  <text x="344" y="100">185</text>
                  <text x="408" y="100">422</text>
                  <text x="472" y="100">223</text>
                  <text x="536" y="100">830</text>
                  <text x="28" y="116">DTLS</text>
                  <text x="64" y="116">1.3</text>
                  <text x="88" y="116">-</text>
                  <text x="124" y="116">Cached</text>
                  <text x="172" y="116">RPK,</text>
                  <text x="212" y="116">PRK,</text>
                  <text x="256" y="116">ECDHE</text>
                  <text x="344" y="116">224</text>
                  <text x="408" y="116">402</text>
                  <text x="472" y="116">255</text>
                  <text x="536" y="116">881</text>
                  <text x="28" y="132">DTLS</text>
                  <text x="64" y="132">1.3</text>
                  <text x="88" y="132">-</text>
                  <text x="124" y="132">Cached</text>
                  <text x="180" y="132">X.509,</text>
                  <text x="228" y="132">RPK,</text>
                  <text x="272" y="132">ECDHE</text>
                  <text x="344" y="132">218</text>
                  <text x="408" y="132">396</text>
                  <text x="472" y="132">255</text>
                  <text x="536" y="132">869</text>
                  <text x="28" y="148">DTLS</text>
                  <text x="64" y="148">1.3</text>
                  <text x="88" y="148">-</text>
                  <text x="116" y="148">PSK,</text>
                  <text x="160" y="148">ECDHE</text>
                  <text x="344" y="148">219</text>
                  <text x="408" y="148">226</text>
                  <text x="476" y="148">56</text>
                  <text x="536" y="148">501</text>
                  <text x="28" y="164">DTLS</text>
                  <text x="64" y="164">1.3</text>
                  <text x="88" y="164">-</text>
                  <text x="112" y="164">PSK</text>
                  <text x="344" y="164">136</text>
                  <text x="408" y="164">153</text>
                  <text x="476" y="164">56</text>
                  <text x="536" y="164">345</text>
                  <text x="32" y="196">EDHOC</text>
                  <text x="64" y="196">-</text>
                  <text x="112" y="196">Signature</text>
                  <text x="184" y="196">X.509s,</text>
                  <text x="236" y="196">x5t,</text>
                  <text x="280" y="196">ECDHE</text>
                  <text x="348" y="196">37</text>
                  <text x="408" y="196">115</text>
                  <text x="476" y="196">90</text>
                  <text x="536" y="196">242</text>
                  <text x="32" y="212">EDHOC</text>
                  <text x="64" y="212">-</text>
                  <text x="112" y="212">Signature</text>
                  <text x="176" y="212">RPKs,</text>
                  <text x="236" y="212">kid,</text>
                  <text x="280" y="212">ECDHE</text>
                  <text x="348" y="212">37</text>
                  <text x="408" y="212">102</text>
                  <text x="476" y="212">77</text>
                  <text x="536" y="212">216</text>
                  <text x="32" y="228">EDHOC</text>
                  <text x="64" y="228">-</text>
                  <text x="100" y="228">Static</text>
                  <text x="140" y="228">DH</text>
                  <text x="184" y="228">X.509s,</text>
                  <text x="236" y="228">x5t,</text>
                  <text x="280" y="228">ECDHE</text>
                  <text x="348" y="228">37</text>
                  <text x="412" y="228">58</text>
                  <text x="476" y="228">33</text>
                  <text x="536" y="228">128</text>
                  <text x="32" y="244">EDHOC</text>
                  <text x="64" y="244">-</text>
                  <text x="100" y="244">Static</text>
                  <text x="140" y="244">DH</text>
                  <text x="176" y="244">RPKs,</text>
                  <text x="236" y="244">kid,</text>
                  <text x="280" y="244">ECDHE</text>
                  <text x="348" y="244">37</text>
                  <text x="412" y="244">45</text>
                  <text x="476" y="244">19</text>
                  <text x="536" y="244">101</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
=====================================================================
 Flight                                   #1      #2      #3   Total
---------------------------------------------------------------------
 DTLS 1.3 - RPKs, ECDHE                  185     454     255     894
 DTLS 1.3 - Compressed RPKs, ECDHE       185     422     223     830
 DTLS 1.3 - Cached RPK, PRK, ECDHE       224     402     255     881
 DTLS 1.3 - Cached X.509, RPK, ECDHE     218     396     255     869
 DTLS 1.3 - PSK, ECDHE                   219     226      56     501
 DTLS 1.3 - PSK                          136     153      56     345
---------------------------------------------------------------------
 EDHOC - Signature X.509s, x5t, ECDHE     37     115      90     242
 EDHOC - Signature RPKs,   kid, ECDHE     37     102      77     216
 EDHOC - Static DH X.509s, x5t, ECDHE     37      58      33     128
 EDHOC - Static DH RPKs,   kid, ECDHE     37      45      19     101
=====================================================================
]]></artwork>
          </artset>
        </figure>
        <t><xref target="fig-compare2"/> compares of message sizes of DTLS 1.3 <xref target="RFC9147"/> and TLS 1.3 <xref target="RFC8446"/> handshakes without connection ID but with the same algorithms CCM_8, P-256, and ECDSA.</t>
        <figure anchor="fig-compare2">
          <name>Comparison of message sizes in bytes with CCM_8, secp256r1, and ecdsa_secp256r1_sha256 or PSK and without Connection ID</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 552,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 552,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
                <path d="M 8,254 L 552,254" fill="none" stroke="black"/>
                <path d="M 8,258 L 552,258" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Flight</text>
                  <text x="348" y="52">#1</text>
                  <text x="412" y="52">#2</text>
                  <text x="476" y="52">#3</text>
                  <text x="528" y="52">Total</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.3</text>
                  <text x="88" y="84">-</text>
                  <text x="120" y="84">RPKs,</text>
                  <text x="168" y="84">ECDHE</text>
                  <text x="344" y="84">179</text>
                  <text x="408" y="84">447</text>
                  <text x="472" y="84">254</text>
                  <text x="536" y="84">880</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="88" y="100">-</text>
                  <text x="116" y="100">PSK,</text>
                  <text x="160" y="100">ECDHE</text>
                  <text x="344" y="100">213</text>
                  <text x="408" y="100">219</text>
                  <text x="476" y="100">55</text>
                  <text x="536" y="100">487</text>
                  <text x="28" y="116">DTLS</text>
                  <text x="64" y="116">1.3</text>
                  <text x="88" y="116">-</text>
                  <text x="112" y="116">PSK</text>
                  <text x="344" y="116">130</text>
                  <text x="408" y="116">146</text>
                  <text x="476" y="116">55</text>
                  <text x="536" y="116">331</text>
                  <text x="24" y="148">TLS</text>
                  <text x="56" y="148">1.3</text>
                  <text x="88" y="148">-</text>
                  <text x="120" y="148">RPKs,</text>
                  <text x="168" y="148">ECDHE</text>
                  <text x="344" y="148">162</text>
                  <text x="408" y="148">394</text>
                  <text x="472" y="148">233</text>
                  <text x="536" y="148">789</text>
                  <text x="24" y="164">TLS</text>
                  <text x="56" y="164">1.3</text>
                  <text x="88" y="164">-</text>
                  <text x="116" y="164">PSK,</text>
                  <text x="160" y="164">ECDHE</text>
                  <text x="344" y="164">196</text>
                  <text x="408" y="164">190</text>
                  <text x="476" y="164">50</text>
                  <text x="536" y="164">436</text>
                  <text x="24" y="180">TLS</text>
                  <text x="56" y="180">1.3</text>
                  <text x="88" y="180">-</text>
                  <text x="112" y="180">PSK</text>
                  <text x="344" y="180">113</text>
                  <text x="408" y="180">117</text>
                  <text x="476" y="180">50</text>
                  <text x="536" y="180">280</text>
                  <text x="40" y="212">cTLS-08</text>
                  <text x="88" y="212">-</text>
                  <text x="124" y="212">X.509s</text>
                  <text x="164" y="212">by</text>
                  <text x="220" y="212">reference,</text>
                  <text x="288" y="212">ECDHE</text>
                  <text x="344" y="212">107</text>
                  <text x="408" y="212">200</text>
                  <text x="476" y="212">98</text>
                  <text x="536" y="212">405</text>
                  <text x="40" y="228">cTLS-08</text>
                  <text x="88" y="228">-</text>
                  <text x="116" y="228">PSK,</text>
                  <text x="160" y="228">ECDHE</text>
                  <text x="344" y="228">108</text>
                  <text x="408" y="228">120</text>
                  <text x="476" y="228">20</text>
                  <text x="536" y="228">250</text>
                  <text x="40" y="244">cTLS-08</text>
                  <text x="88" y="244">-</text>
                  <text x="112" y="244">PSK</text>
                  <text x="348" y="244">43</text>
                  <text x="412" y="244">57</text>
                  <text x="476" y="244">20</text>
                  <text x="536" y="244">120</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
=====================================================================
 Flight                                   #1      #2      #3   Total
---------------------------------------------------------------------
 DTLS 1.3 - RPKs, ECDHE                  179     447     254     880
 DTLS 1.3 - PSK, ECDHE                   213     219      55     487
 DTLS 1.3 - PSK                          130     146      55     331
---------------------------------------------------------------------
 TLS 1.3  - RPKs, ECDHE                  162     394     233     789
 TLS 1.3  - PSK, ECDHE                   196     190      50     436
 TLS 1.3  - PSK                          113     117      50     280
---------------------------------------------------------------------
 cTLS-08  - X.509s by reference, ECDHE   107     200      98     405
 cTLS-08  - PSK, ECDHE                   108     120      20     250
 cTLS-08  - PSK                           43      57      20     120 
=====================================================================
]]></artwork>
          </artset>
        </figure>
        <t><xref target="fig-compare3"/> is the same as <xref target="fig-compare2"/> but with more efficiently encoded key shares and signatures such as x25519 and ed25519. The algorithms in <xref target="I-D.mattsson-tls-compact-ecc"/> with point compressed secp256r1 RPKs would add 15 bytes to #2 and #3 in the rows with RPKs.</t>
        <figure anchor="fig-compare3">
          <name>Comparison of message sizes in bytes with CCM_8, x25519, and ed25519 or PSK and without Connection ID</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 552,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 552,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
                <path d="M 8,254 L 552,254" fill="none" stroke="black"/>
                <path d="M 8,258 L 552,258" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Flight</text>
                  <text x="348" y="52">#1</text>
                  <text x="412" y="52">#2</text>
                  <text x="476" y="52">#3</text>
                  <text x="528" y="52">Total</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.3</text>
                  <text x="88" y="84">-</text>
                  <text x="120" y="84">RPKs,</text>
                  <text x="168" y="84">ECDHE</text>
                  <text x="344" y="84">146</text>
                  <text x="408" y="84">360</text>
                  <text x="472" y="84">200</text>
                  <text x="536" y="84">706</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="88" y="100">-</text>
                  <text x="116" y="100">PSK,</text>
                  <text x="160" y="100">ECDHE</text>
                  <text x="344" y="100">180</text>
                  <text x="408" y="100">186</text>
                  <text x="476" y="100">55</text>
                  <text x="536" y="100">421</text>
                  <text x="28" y="116">DTLS</text>
                  <text x="64" y="116">1.3</text>
                  <text x="88" y="116">-</text>
                  <text x="112" y="116">PSK</text>
                  <text x="344" y="116">130</text>
                  <text x="408" y="116">146</text>
                  <text x="476" y="116">55</text>
                  <text x="536" y="116">331</text>
                  <text x="24" y="148">TLS</text>
                  <text x="56" y="148">1.3</text>
                  <text x="88" y="148">-</text>
                  <text x="120" y="148">RPKs,</text>
                  <text x="168" y="148">ECDHE</text>
                  <text x="344" y="148">129</text>
                  <text x="408" y="148">307</text>
                  <text x="472" y="148">179</text>
                  <text x="536" y="148">615</text>
                  <text x="24" y="164">TLS</text>
                  <text x="56" y="164">1.3</text>
                  <text x="88" y="164">-</text>
                  <text x="116" y="164">PSK,</text>
                  <text x="160" y="164">ECDHE</text>
                  <text x="344" y="164">163</text>
                  <text x="408" y="164">157</text>
                  <text x="476" y="164">50</text>
                  <text x="536" y="164">370</text>
                  <text x="24" y="180">TLS</text>
                  <text x="56" y="180">1.3</text>
                  <text x="88" y="180">-</text>
                  <text x="112" y="180">PSK</text>
                  <text x="344" y="180">113</text>
                  <text x="408" y="180">117</text>
                  <text x="476" y="180">50</text>
                  <text x="536" y="180">280</text>
                  <text x="40" y="212">cTLS-08</text>
                  <text x="88" y="212">-</text>
                  <text x="124" y="212">X.509s</text>
                  <text x="164" y="212">by</text>
                  <text x="220" y="212">reference,</text>
                  <text x="288" y="212">ECDHE</text>
                  <text x="348" y="212">74</text>
                  <text x="408" y="212">160</text>
                  <text x="476" y="212">91</text>
                  <text x="536" y="212">325</text>
                  <text x="40" y="228">cTLS-08</text>
                  <text x="88" y="228">-</text>
                  <text x="116" y="228">PSK,</text>
                  <text x="160" y="228">ECDHE</text>
                  <text x="348" y="228">75</text>
                  <text x="412" y="228">89</text>
                  <text x="476" y="228">20</text>
                  <text x="536" y="228">186</text>
                  <text x="40" y="244">cTLS-08</text>
                  <text x="88" y="244">-</text>
                  <text x="112" y="244">PSK</text>
                  <text x="348" y="244">43</text>
                  <text x="412" y="244">57</text>
                  <text x="476" y="244">20</text>
                  <text x="536" y="244">120</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
=====================================================================
 Flight                                   #1      #2      #3   Total
---------------------------------------------------------------------
 DTLS 1.3 - RPKs, ECDHE                  146     360     200     706
 DTLS 1.3 - PSK, ECDHE                   180     186      55     421
 DTLS 1.3 - PSK                          130     146      55     331
---------------------------------------------------------------------
 TLS 1.3  - RPKs, ECDHE                  129     307     179     615
 TLS 1.3  - PSK, ECDHE                   163     157      50     370
 TLS 1.3  - PSK                          113     117      50     280
---------------------------------------------------------------------
 cTLS-08  - X.509s by reference, ECDHE    74     160      91     325
 cTLS-08  - PSK, ECDHE                    75      89      20     186
 cTLS-08  - PSK                           43      57      20     120 
=====================================================================
]]></artwork>
          </artset>
        </figure>
        <t>The numbers in <xref target="fig-compare2"/>, <xref target="fig-compare2"/>, and <xref target="fig-compare3"/> were calculated with 8 bytes tags which is the mandatory to implement in <xref target="I-D.ietf-uta-tls13-iot-profile"/> and <xref target="I-D.ietf-core-oscore-edhoc"/>. If 16 bytes tag are used, the numbers in the #2 and #3 columns increases with 8 and the numbers in the Total column increases with 16.</t>
      </section>
      <section anchor="dtls-13">
        <name>DTLS 1.3</name>
        <t>This section gives an estimate of the message sizes of DTLS 1.3 with different authentication methods. Note that the examples in this section are not test vectors, the cryptographic parts are just replaced with byte strings of the same length, while other fixed length fields are replaced with arbitrary strings or omitted, in which case their length is indicated. Values that are not arbitrary are given in hexadecimal.</t>
        <section anchor="size-dtls13rpk">
          <name>Message Sizes RPK + ECDHE</name>
          <t>In this section, CCM_8, P-256, and ECDSA and a Connection ID of 1 byte are used.</t>
          <section anchor="dtls13f1rpk">
            <name>Flight #1</name>
            <artwork><![CDATA[
Record Header - DTLSPlaintext (13 bytes):
16 fe fd EE EE SS SS SS SS SS SS LL LL

  Handshake Header - Client Hello (12 bytes):
  01 LL LL LL SS SS 00 00 00 LL LL LL

    Legacy Version (2 bytes):
    fe fd

    Client Random (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

    Legacy Session ID (1 bytes):
    00

    Legacy Cookie (1 bytes):
    00

    Cipher Suites (TLS_AES_128_CCM_8_SHA256) (4 bytes):
    00 02 13 05

    Compression Methods (null) (2 bytes):
    01 00

    Extensions Length (2 bytes):
    LL LL

      Extension - Supported Groups (secp256r1) (8 bytes):
      00 0a 00 04 00 02 00 17

      Extension - Signature Algorithms (ecdsa_secp256r1_sha256)
      (8 bytes):
      00 0d 00 04 00 02 04 03

      Extension - Key Share (secp256r1) (75 bytes):
      00 33 00 27 00 25 00 1d 00 41
      04 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12
      13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 00 01 02 03 04 05 06
      07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a
      1b 1c 1d 1e 1f

      Extension - Supported Versions (1.3) (7 bytes):
      00 2b 00 03 02 03 04

      Extension - Client Certificate Type (Raw Public Key) (6 bytes):
      00 13 00 02 01 02

      Extension - Server Certificate Type (Raw Public Key) (6 bytes):
      00 14 00 02 01 02

      Extension - Connection Identifier (42) (6 bytes):
      00 36 00 02 01 42

13 + 12 + 2 + 32 + 1 + 1 + 4 + 2 + 2 + 8 + 8 + 75 + 7 + 6 + 6 + 6
= 185 bytes
]]></artwork>
            <t>DTLS 1.3 RPK + ECDHE flight #1 gives 185 bytes of overhead.
With efficiently encoded key share such as x25519 or <xref target="I-D.mattsson-tls-compact-ecc"/> the overhead is 185 - 33 = 152 bytes.</t>
          </section>
          <section anchor="dtls13f2rpk">
            <name>Flight #2</name>
            <artwork><![CDATA[
Record Header - DTLSPlaintext (13 bytes):
16 fe fd EE EE SS SS SS SS SS SS LL LL

  Handshake Header - Server Hello (12 bytes):
  02 LL LL LL SS SS 00 00 00 LL LL LL

    Legacy Version (2 bytes):
    fe fd

    Server Random (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

    Legacy Session ID (1 bytes):
    00

    Cipher Suite (TLS_AES_128_CCM_8_SHA256) (2 bytes):
    13 05

    Compression Method (null) (1 bytes):
    00

    Extensions Length (2 bytes):
    LL LL

      Extension - Key Share (secp256r1) (73 bytes):
      00 33 00 45 00 1d 00 41
      04 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12
      13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 00 01 02 03 04 05 06
      07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a
      1b 1c 1d 1e 1f

      Extension - Supported Versions (1.3) (6 bytes):
      00 2b 00 02 03 04

      Extension - Connection Identifier (43) (6 bytes):
      00 36 00 02 01 43

Record Header - DTLSCiphertext (3 bytes):
HH 42 SS

  Handshake Header - Encrypted Extensions (12 bytes):
  08 LL LL LL SS SS 00 00 00 LL LL LL

    Extensions Length (2 bytes):
    LL LL

      Extension - Client Certificate Type (Raw Public Key) (6 bytes):
      00 13 00 01 01 02

      Extension - Server Certificate Type (Raw Public Key) (6 bytes):
      00 14 00 01 01 02

  Handshake Header - Certificate Request (12 bytes):
  0d LL LL LL SS SS 00 00 00 LL LL LL

    Request Context (1 bytes):
    00

    Extensions Length (2 bytes):
    LL LL

      Extension - Signature Algorithms (ecdsa_secp256r1_sha256)
      (8 bytes):
      00 0d 00 04 00 02 08 07

  Handshake Header - Certificate (12 bytes):
  0b LL LL LL SS SS 00 00 00 LL LL LL

    Request Context (1 bytes):
    00

    Certificate List Length (3 bytes):
    LL LL LL

    Certificate Length (3 bytes):
    LL LL LL

    Certificate (Uncompressed secp256r1 RPK) (91 bytes):
    30 59 30 13 ... // DER encoded RPK, See Section 2.2.7.

    Certificate Extensions (2 bytes):
    00 00

  Handshake Header - Certificate Verify (12 bytes):
  0f LL LL LL SS SS 00 00 00 LL LL LL

    Signature (ecdsa_secp256r1_sha256) (average 75 bytes):
    04 03 LL LL
    30 LL 02 LL ... 02 LL ... // DER encoded signature

  Handshake Header - Finished (12 bytes):
  14 LL LL LL SS SS 00 00 00 LL LL LL

    Verify Data (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Record Type (1 byte):
  16

Auth Tag (8 bytes):
e0 8b 0e 45 5a 35 0a e5

13 + 137 + 3 + 26 + 23 + 112 + 87 + 44 + 1 + 8 = 454 bytes
]]></artwork>
            <t>DTLS 1.3 RPK + ECDHE flight #2 gives 454 bytes of overhead.
With a point compressed secp256r1 RPK the overhead is 454 - 32 = 422 bytes, see <xref target="rpkformat"/>.
With an ed25519 RPK and signature the overhead is 454 - 47 - 7 = 400 bytes.
With an efficiently encoded key share such as x25519 or <xref target="I-D.mattsson-tls-compact-ecc"/> the overhead is 454 - 33 = 421 bytes.
With an efficiently encoded signature such <xref target="I-D.mattsson-tls-compact-ecc"/> the overhead is 454 - 7 = 447 bytes.
With x25519 and ed25519 he overhead is 454 - 47 - 33 - 7 = 367 bytes.</t>
          </section>
          <section anchor="dtls13f3rpk">
            <name>Flight #3</name>
            <artwork><![CDATA[
Record Header (3 bytes): // DTLSCiphertext
ZZ 43 SS

  Handshake Header - Certificate (12 bytes):
  0b LL LL LL SS SS XX XX XX LL LL LL

    Request Context (1 bytes):
    00

    Certificate List Length (3 bytes):
    LL LL LL

    Certificate Length (3 bytes):
    LL LL LL

    Certificate (Uncompressed secp256r1 RPK) (91 bytes):
    30 59 30 13 ... // DER encoded RPK, See Section 2.2.7.

    Certificate Extensions (2 bytes):
    00 00

  Handshake Header - Certificate Verify (12 bytes):
  0f LL LL LL SS SS 00 00 00 LL LL LL

    Signature (ecdsa_secp256r1_sha256) (average 75 bytes):
    04 03 LL LL
    30 LL 02 LL ... 02 LL ... // // DER encoded signature

  Handshake Header - Finished (12 bytes):
  14 LL LL LL SS SS 00 00 00 LL LL LL

    Verify Data (32 bytes) // SHA-256:
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Record Type (1 byte):
  16

Auth Tag (8 bytes) // AES-CCM_8:
00 01 02 03 04 05 06 07

3 + 112 + 87 + 44 + 1 + 8 = 255 bytes
]]></artwork>
            <t>DTLS 1.3 RPK + ECDHE flight #3 gives 255 bytes of overhead.
With a point compressed secp256r1 RPK the overhead is 255 - 32 = 223 bytes, see <xref target="rpkformat"/>.
With an ed25519 RPK and signature the overhead is 255 - 47 - 7 = 201 bytes.
With an efficiently encoded signature such as <xref target="I-D.mattsson-tls-compact-ecc"/> the overhead is 255 - 7 = 248 bytes.</t>
          </section>
        </section>
        <section anchor="message-sizes-psk-ecdhe">
          <name>Message Sizes PSK + ECDHE</name>
          <section anchor="dtls13f1pskecdhe">
            <name>Flight #1</name>
            <t>The differences in overhead compared to <xref target="dtls13f1rpk"/> are:</t>
            <t>The following is added:</t>
            <artwork><![CDATA[
+ Extension - PSK Key Exchange Modes (6 bytes):
  00 2d 00 02 01 01

+ Extension - Pre-Shared Key (48 bytes):
  00 29 00 2F
  00 0a 00 01 ID 00 00 00 00
  00 21 20 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10
  11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f
]]></artwork>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Signature Algorithms (ecdsa_secp256r1_sha256) (8 bytes)

- Extension - Client Certificate Type (Raw Public Key) (6 bytes)

- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
185 + 6 + 48 - 8 - 6 - 6 = 219 bytes
]]></artwork>
            <t>DTLS 1.3 PSK + ECDHE flight #1 gives 219 bytes of overhead.</t>
          </section>
          <section anchor="dtls13f2pskecdhe">
            <name>Flight #2</name>
            <t>The differences in overhead compared to <xref target="dtls13f2rpk"/> are:</t>
            <t>The following is added:</t>
            <artwork><![CDATA[
+ Extension - Pre-Shared Key (6 bytes)
  00 29 00 02 00 00
]]></artwork>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Handshake Message Certificate (112 bytes)

- Handshake Message CertificateVerify (87 bytes)

- Handshake Message CertificateRequest (23 bytes)

- Extension - Client Certificate Type (Raw Public Key) (6 bytes)

- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
454 + 6 - 112 - 87 - 23 - 6 - 6 = 226 bytes
]]></artwork>
            <t>DTLS 1.3 PSK + ECDHE flight #2 gives 226 bytes of overhead.</t>
          </section>
          <section anchor="dtls13f3pskecdhe">
            <name>Flight #3</name>
            <t>The differences in overhead compared to <xref target="dtls13f3rpk"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Handshake Message Certificate (112 bytes)

- Handshake Message Certificate Verify (87 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
255 - 112 - 87 = 56 bytes
]]></artwork>
            <t>DTLS 1.3 PSK + ECDHE flight #3 gives 56 bytes of overhead.</t>
          </section>
        </section>
        <section anchor="message-sizes-psk">
          <name>Message Sizes PSK</name>
          <section anchor="dtls13f1psk">
            <name>Flight #1</name>
            <t>The differences in overhead compared to <xref target="dtls13f1pskecdhe"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Supported Groups (x25519) (8 bytes)

- Extension - Key Share (75 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
219 - 8 - 75 = 136 bytes
]]></artwork>
            <t>DTLS 1.3 PSK flight #1 gives 136 bytes of overhead.</t>
          </section>
          <section anchor="dtls13f2psk">
            <name>Flight #2</name>
            <t>The differences in overhead compared to <xref target="dtls13f2pskecdhe"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Key Share (73 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
226 - 73 = 153 bytes
]]></artwork>
            <t>DTLS 1.3 PSK flight #2 gives 153 bytes of overhead.</t>
          </section>
          <section anchor="dtls13f3psk">
            <name>Flight #3</name>
            <t>There are no differences in overhead compared to <xref target="dtls13f3pskecdhe"/>.</t>
            <t>DTLS 1.3 PSK flight #3 gives 56 bytes of overhead.</t>
          </section>
        </section>
        <section anchor="cached-information">
          <name>Cached Information</name>
          <t>In this section, we consider the effect of <xref target="RFC7924"/> on the message size overhead.</t>
          <t>Cached information can be used to use a cached server certificate from a previous connection and move bytes from flight #2 to flight #1. The cached certificate can be a RPK or X.509.</t>
          <t>The differences compared to <xref target="size-dtls13rpk"/> are the following.</t>
          <section anchor="flight-1">
            <name>Flight #1</name>
            <t>For the flight #1, the following is added:</t>
            <artwork><![CDATA[
+ Extension - Client Cashed Information (39 bytes):
  00 19 LL LL LL LL
  01 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11
  12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f
]]></artwork>
            <t>Giving a total of:</t>
            <artwork><![CDATA[
185 + 39 = 224 bytes
]]></artwork>
            <t>In the case the cached certificate is X.509 the following is removed:</t>
            <artwork><![CDATA[
- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>Giving a total of:</t>
            <artwork><![CDATA[
224 - 6 = 218 bytes
]]></artwork>
          </section>
          <section anchor="flight-2">
            <name>Flight #2</name>
            <t>For the flight #2, the following is added:</t>
            <artwork><![CDATA[
+ Extension - Server Cashed Information (7 bytes):
  00 19 LL LL LL LL 01
]]></artwork>
            <t>And the following is reduced:</t>
            <artwork><![CDATA[
- Server Certificate (91 bytes -> 32 bytes)
]]></artwork>
            <t>Giving a total of:</t>
            <artwork><![CDATA[
454 + 7 - 59 = 402 bytes
]]></artwork>
            <t>In the case the cached certificate is X.509 the following is removed:</t>
            <artwork><![CDATA[
- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>Giving a total of:</t>
            <artwork><![CDATA[
402 - 6 = 396 bytes
]]></artwork>
          </section>
        </section>
        <section anchor="resumption">
          <name>Resumption</name>
          <t>To enable resumption, a 4th flight with the handshake message New Session Ticket is added to the DTLS handshake.</t>
          <artwork><![CDATA[
Record Header - DTLSCiphertext (3 bytes):
HH 42 SS

  Handshake Header - New Session Ticket (12 bytes):
  04 LL LL LL SS SS 00 00 00 LL LL LL

    Ticket Lifetime (4 bytes):
    00 01 02 03

    Ticket Age Add (4 bytes):
    00 01 02 03

    Ticket Nonce (2 bytes):
    01 00

    Ticket (6 bytes):
    00 04 ID ID ID ID

    Extensions (2 bytes):
    00 00

Auth Tag (8 bytes) // AES-CCM_8:
00 01 02 03 04 05 06 07

3 + 12 + 4 + 4 + 2 + 6 + 2 + 8 = 41 bytes
]]></artwork>
          <t>Enabling resumption adds 41 bytes to the initial DTLS handshake. The resumption handshake is an ordinary PSK handshake with our without ECDHE.</t>
        </section>
        <section anchor="dtls-without-connection-id">
          <name>DTLS Without Connection ID</name>
          <t>Without a Connection ID the DTLS 1.3 flight sizes changes as follows.</t>
          <artwork><![CDATA[
DTLS 1.3 flight #1:   -6 bytes
DTLS 1.3 flight #2:   -7 bytes
DTLS 1.3 flight #3:   -1 byte
]]></artwork>
        </section>
        <section anchor="rpkformat">
          <name>Raw Public Keys</name>
          <t>This sections illustrates the format of P-256 (secp256r1) SubjectPublicKeyInfo <xref target="RFC5480"/> with and without point compression as well as an ed25519 SubjectPublicKeyInfo. Point compression in SubjectPublicKeyInfo is standardized in <xref target="RFC5480"/> and is therefore theoretically possible to use in PRKs and X.509 certificates used in (D)TLS but does not seems to be supported by (D)TLS implementations.</t>
          <section anchor="secp256r1-subjectpublickeyinfo-without-point-compression">
            <name>secp256r1 SubjectPublicKeyInfo Without Point Compression</name>
            <artwork><![CDATA[
0x30 // Sequence
0x59 // Size 89

0x30 // Sequence
0x13 // Size 19
0x06 0x07 0x2A 0x86 0x48 0xCE 0x3D 0x02 0x01
     // OID 1.2.840.10045.2.1 (ecPublicKey)
0x06 0x08 0x2A 0x86 0x48 0xCE 0x3D 0x03 0x01 0x07
     // OID 1.2.840.10045.3.1.7 (secp256r1)

0x03 // Bit string
0x42 // Size 66
0x00 // Unused bits 0
0x04 // Uncompressed
...... 64 bytes X and Y

Total of 91 bytes
]]></artwork>
          </section>
          <section anchor="secp256r1-subjectpublickeyinfo-with-point-compression">
            <name>secp256r1 SubjectPublicKeyInfo With Point Compression</name>
            <artwork><![CDATA[
0x30 // Sequence
0x39 // Size 57

0x30 // Sequence
0x13 // Size 19
0x06 0x07 0x2A 0x86 0x48 0xCE 0x3D 0x02 0x01
     // OID 1.2.840.10045.2.1 (ecPublicKey)
0x06 0x08 0x2A 0x86 0x48 0xCE 0x3D 0x03 0x01 0x07
     // OID 1.2.840.10045.3.1.7 (secp256r1)

0x03 // Bit string
0x22 // Size 34
0x00 // Unused bits 0
0x03 // Compressed
...... 32 bytes X

Total of 59 bytes
]]></artwork>
          </section>
          <section anchor="ed25519-subjectpublickeyinfo">
            <name>ed25519 SubjectPublicKeyInfo</name>
            <artwork><![CDATA[
0x30 // Sequence
0x2A // Size 42

0x30 // Sequence
0x05 // Size 5
0x06 0x03 0x2B 0x65 0x70
     // OID 1.3.101.112 (ed25519)

0x03 // Bit string
0x21 // Size 33
0x00 // Unused bits 0
...... 32 bytes 

Total of 44 bytes
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="tls-13">
        <name>TLS 1.3</name>
        <t>In this section, the message sizes are calculated for TLS 1.3. The major changes compared to DTLS 1.3 are a different record header, the handshake headers is smaller, and that Connection ID is not supported.  Recently, additional work has taken shape with the goal to further reduce overhead for TLS 1.3 (see <xref target="I-D.ietf-tls-ctls"/>).</t>
        <section anchor="message-sizes-rpk-ecdhe">
          <name>Message Sizes RPK + ECDHE</name>
          <t>In this section, CCM_8, x25519, and ed25519 are used.</t>
          <section anchor="tls13f1rpk">
            <name>Flight #1</name>
            <artwork><![CDATA[
Record Header - TLSPlaintext (5 bytes):
16 03 03 LL LL

  Handshake Header - Client Hello (4 bytes):
  01 LL LL LL

    Legacy Version (2 bytes):
    03 03

    Client Random (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

    Legacy Session ID (1 bytes):
    00

    Cipher Suites (TLS_AES_128_CCM_8_SHA256) (4 bytes):
    00 02 13 05

    Compression Methods (null) (2 bytes):
    01 00

    Extensions Length (2 bytes):
    LL LL

      Extension - Supported Groups (x25519) (8 bytes):
      00 0a 00 04 00 02 00 1d

      Extension - Signature Algorithms (ed25519)
      (8 bytes):
      00 0d 00 04 00 02 08 07

      Extension - Key Share (x25519) (42 bytes):
      00 33 00 26 00 24 00 1d 00 20
      00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
      14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

      Extension - Supported Versions (1.3) (7 bytes):
      00 2b 00 03 02 03 04

      Extension - Client Certificate Type (Raw Public Key) (6 bytes):
      00 13 00 01 01 02

      Extension - Server Certificate Type (Raw Public Key) (6 bytes):
      00 14 00 01 01 02

5 + 4 + 2 + 32 + 1 + 4 + 2 + 2 + 8 + 8 + 42 + 7 + 6 + 6 = 129 bytes
]]></artwork>
            <t>TLS 1.3 RPK + ECDHE flight #1 gives 129 bytes of overhead.</t>
          </section>
          <section anchor="tls13f2rpk">
            <name>Flight #2</name>
            <artwork><![CDATA[
Record Header - TLSPlaintext (5 bytes):
16 03 03 LL LL

  Handshake Header - Server Hello (4 bytes):
  02 LL LL LL

    Legacy Version (2 bytes):
    fe fd

    Server Random (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

    Legacy Session ID (1 bytes):
    00

    Cipher Suite (TLS_AES_128_CCM_8_SHA256) (2 bytes):
    13 05

    Compression Method (null) (1 bytes):
    00

    Extensions Length (2 bytes):
    LL LL

      Extension - Key Share (x25519) (40 bytes):
      00 33 00 24 00 1d 00 20
      00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
      14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

      Extension - Supported Versions (1.3) (6 bytes):
      00 2b 00 02 03 04

Record Header - TLSCiphertext (5 bytes):
17 03 03 LL LL

  Handshake Header - Encrypted Extensions (4 bytes):
  08 LL LL LL

    Extensions Length (2 bytes):
    LL LL

      Extension - Client Certificate Type (Raw Public Key) (6 bytes):
      00 13 00 01 01 02

      Extension - Server Certificate Type (Raw Public Key) (6 bytes):
      00 14 00 01 01 02

  Handshake Header - Certificate Request (4 bytes):
  0d LL LL LL

    Request Context (1 bytes):
    00

    Extensions Length (2 bytes):
    LL LL

      Extension - Signature Algorithms (ed25519)
      (8 bytes):
      00 0d 00 04 00 02 08 07

  Handshake Header - Certificate (4 bytes):
  0b LL LL LL

    Request Context (1 bytes):
    00

    Certificate List Length (3 bytes):
    LL LL LL

    Certificate Length (3 bytes):
    LL LL LL

    Certificate (ed25519 RPK) (44 bytes):
    30 2A 30 05 ... // DER encoded RPK, see Section 2.2.7.     
     
    Certificate Extensions (2 bytes):
    00 00

  Handshake Header - Certificate Verify (4 bytes):
  0f LL LL LL

    Signature (ed25519) (68 bytes):
    08 07 LL LL
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Handshake Header - Finished (4 bytes):
  14 LL LL LL

    Verify Data (32 bytes):
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Record Type (1 byte):
  16

Auth Tag (8 bytes):
e0 8b 0e 45 5a 35 0a e5

5 + 90 + 5 + 18 + 15 + 57 + 72 + 36 + 1 + 8 = 307 bytes
]]></artwork>
            <t>TLS 1.3 RPK + ECDHE flight #2 gives 307 bytes of overhead.</t>
          </section>
          <section anchor="tls13f3rpk">
            <name>Flight #3</name>
            <!--TODO: Don't know why this is not formatting correctly in txt, tried to separate in several code sections, it still doesn't work. -->

<artwork><![CDATA[
Record Header - TLSCiphertext (5 bytes):
17 03 03 LL LL

  Handshake Header - Certificate (4 bytes):
  0b LL LL LL

    Request Context (1 bytes):
    00

    Certificate List Length (3 bytes):
    LL LL LL


    Certificate Length (3 bytes):
    LL LL LL

    Certificate (ed25519 RPK) (44 bytes):
    30 2A 30 05 ... // DER encoded RPK, see Section 2.2.7.     

    Certificate Extensions (2 bytes):
    00 00

  Handshake Header - Certificate Verify (4 bytes):
  0f LL LL LL

    Signature (ed25519) (68 bytes):
    08 07 LL LL
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Handshake Header - Finished (4 bytes):
  14 LL LL LL

    Verify Data (32 bytes) // SHA-256:
    00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13
    14 15 16 17 18 19 1a 1b 1c 1d 1e 1f

  Record Type (1 byte)
  16

Auth Tag (8 bytes) // AES-CCM_8:
00 01 02 03 04 05 06 07

5 + 57 + 72 + 36 + 1 + 8 = 179 bytes
]]></artwork>
            <t>TLS 1.3 RPK + ECDHE flight #3 gives 179 bytes of overhead.</t>
          </section>
        </section>
        <section anchor="message-sizes-psk-ecdhe-1">
          <name>Message Sizes PSK + ECDHE</name>
          <section anchor="tls13f1pskecdhe">
            <name>Flight #1</name>
            <t>The differences in overhead compared to <xref target="tls13f3rpk"/> are:</t>
            <t>The following is added:</t>
            <artwork><![CDATA[
+ Extension - PSK Key Exchange Modes (6 bytes):
  00 2d 00 02 01 01

+ Extension - Pre-Shared Key (48 bytes):
  00 29 00 2F
  00 0a 00 01 ID 00 00 00 00
  00 21 20 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10
  11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f
]]></artwork>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Signature Algorithms (ecdsa_secp256r1_sha256) (8 bytes)

- Extension - Client Certificate Type (Raw Public Key) (6 bytes)

- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
129 + 6 + 48 - 8 - 6 - 6 = 163 bytes
]]></artwork>
            <t>TLS 1.3 PSK + ECDHE flight #1 gives 163 bytes of overhead.</t>
          </section>
          <section anchor="tls13f2pskecdhe">
            <name>Flight #2</name>
            <t>The differences in overhead compared to <xref target="tls13f2rpk"/> are:</t>
            <t>The following is added:</t>
            <artwork><![CDATA[
+ Extension - Pre-Shared Key (6 bytes)
  00 29 00 02 00 00
]]></artwork>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Handshake Message Certificate (57 bytes)

- Handshake Message CertificateVerify (72 bytes)

- Handshake Message CertificateRequest (15 bytes)

- Extension - Client Certificate Type (Raw Public Key) (6 bytes)

- Extension - Server Certificate Type (Raw Public Key) (6 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
307 - 57 - 72 - 15 - 6 - 6  + 6 = 157 bytes
]]></artwork>
            <t>TLS 1.3 PSK + ECDHE flight #2 gives 157 bytes of overhead.</t>
          </section>
          <section anchor="tls13f3pskecdhe">
            <name>Flight #3</name>
            <t>The differences in overhead compared to <xref target="tls13f3rpk"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Handshake Message Certificate (57 bytes)

- Handshake Message Certificate Verify (72 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
179 - 57 - 72 = 50 bytes
]]></artwork>
            <t>TLS 1.3 PSK + ECDHE flight #3 gives 50 bytes of overhead.</t>
          </section>
        </section>
        <section anchor="message-sizes-psk-1">
          <name>Message Sizes PSK</name>
          <section anchor="tls13f1psk">
            <name>Flight #1</name>
            <t>The differences in overhead compared to <xref target="tls13f1pskecdhe"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Supported Groups (x25519) (8 bytes)

- Extension - Key Share (42 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
163 - 8 - 42 = 113 bytes
]]></artwork>
            <t>TLS 1.3 PSK flight #1 gives 113 bytes of overhead.</t>
          </section>
          <section anchor="tls13f2psk">
            <name>Flight #2</name>
            <t>The differences in overhead compared to <xref target="tls13f2pskecdhe"/> are:</t>
            <t>The following is removed:</t>
            <artwork><![CDATA[
- Extension - Key Share (40 bytes)
]]></artwork>
            <t>In total:</t>
            <artwork><![CDATA[
157 - 40 = 117 bytes
]]></artwork>
            <t>TLS 1.3 PSK flight #2 gives 117 bytes of overhead.</t>
          </section>
          <section anchor="tls13f3psk">
            <name>Flight #3</name>
            <t>There are no differences in overhead compared to <xref target="tls13f3pskecdhe"/>.</t>
            <t>TLS 1.3 PSK flight #3 gives 50 bytes of overhead.</t>
          </section>
        </section>
      </section>
      <section anchor="tls-12-and-dtls-12">
        <name>TLS 1.2 and DTLS 1.2</name>
        <t>The TLS 1.2 and DTLS 1.2 handshakes are not analyzed in detail in this document. One rough comparison on expected size between the TLS 1.2 and TLS 1.3 handshakes can be found by counting the number of bytes in the example handshakes of <xref target="Illustrated-TLS12"/> and <xref target="Illustrated-TLS13"/>. In these examples the server authenticates with a certificate and the client is not authenticated.</t>
        <t>In TLS 1.2 the number of bytes in the four flights are 170, 1188, 117, and 75 for a total of 1550 bytes. In TLS 1.3 the number of bytes in the three flights are 253, 1367, and 79 for a total of 1699 bytes. In general, the (D)TLS 1.2 and (D)TLS 1.3 handshakes can be expected to have similar number of bytes.</t>
      </section>
      <section anchor="ctls">
        <name>cTLS</name>
        <t>Version -08 of the cTLS specification <xref target="I-D.ietf-tls-ctls"/> has a single example with CCM_8, x25519, and ed25519 in Appendix A. This document uses that examples and calculates number for different parameters as follows:</t>
        <t>Using secp256r1 instead x25519 add 33 bytes to the KeyShareEntry.key_exchange in flight #1 and flight #2.</t>
        <t>Using ecdsa_secp256r1_sha256 instead ed25519 add an average of 7 bytes to CertificateVerify.signature in flight #2 and flight #3.</t>
        <t>Using PSK authentication instead of ed25519 add 1 byte (psk identifier) to flight #1 and removes 71 bytes (certificate and certificate_verify) from flight #2 and #3.</t>
        <t>Using PSK key exchange x25519 removes 32 bytes (KeyShareEntry.key_exchange) from flight #1 and #2.</t>
        <t>Using Connection ID adds 1 byte to flight #1 and #3, and 2 bytes to flight #2.</t>
      </section>
      <section anchor="edhoc">
        <name>EDHOC</name>
        <t>This section gives an estimate of the message sizes of EDHOC <xref target="I-D.ietf-lake-edhoc"/> authenticated with static Diffie-Hellman keys and where the static Diffie-Hellman are identified with a key identifier (kid). All examples are given in CBOR diagnostic notation and hexadecimal, and are based on the test vectors in Section 4 of <xref target="I-D.ietf-lake-traces"/>.</t>
        <section anchor="message-sizes-rpk">
          <name>Message Sizes RPK</name>
          <section anchor="message1">
            <name>message_1</name>
            <artwork><![CDATA[
message_1 = (
  3,
  2,
  h'8af6f430ebe18d34184017a9a11bf511c8dff8f834730b96c1b7c8dbca2f
    c3b6',
  -24
)
]]></artwork>
            <artwork><![CDATA[
message_1 (37 bytes):
03 02 58 20 8a f6 f4 30 eb e1 8d 34 18 40 17 a9 a1 1b f5 11 c8
df f8 f8 34 73 0b 96 c1 b7 c8 db ca 2f c3 b6 37
]]></artwork>
          </section>
          <section anchor="message2">
            <name>message_2</name>
            <artwork><![CDATA[
message_2 = (
  h'419701D7F00A26C2DC587A36DD752549F33763C893422C8EA0F955A13A4F
    F5D5042459E2DA6C75143F35',
  -8
)
]]></artwork>
            <artwork><![CDATA[
message_2 (45 bytes):
 58 2a 41 97 01 d7 f0 0a 26 c2 dc 58 7a 36 dd 75 25 49 f3 37
 63 c8 93 42 2c 8e a0 f9 55 a1 3a 4f f5 d5 04 24 59 e2 da 6c
 75 14 3f 35 27
]]></artwork>
          </section>
          <section anchor="message3">
            <name>message_3</name>
            <artwork><![CDATA[
message_3 = (
  h'C2B62835DC9B1F53419C1D3A2261EEED3505'
)
]]></artwork>
            <artwork><![CDATA[
message_3 (19 bytes):
52 c2 b6 28 35 dc 9b 1f 53 41 9c 1d 3a 22 61 ee ed 35 05
]]></artwork>
          </section>
        </section>
        <section anchor="summary">
          <name>Summary</name>
          <t>Based on the example above it is relatively easy to calculate numbers also for EDHOC authenticated with signature keys and for authentication keys identified with a SHA-256/64 hash (x5t). Signatures increase the size of flight #2 and #3 with (64 - 8 + 1) bytes while x5t increases the size with 13-14 bytes. The typical message sizes for the previous example and for the other combinations are summarized in <xref target="fig-summary"/>. Note that EDHOC treats authentication keys stored in RPK and X.509 in the same way. More detailed examples can be found in <xref target="I-D.ietf-lake-traces"/>.</t>
          <figure anchor="fig-summary">
            <name>Typical message sizes in bytes</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="472" viewBox="0 0 472 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                  <path d="M 8,30 L 464,30" fill="none" stroke="black"/>
                  <path d="M 8,34 L 464,34" fill="none" stroke="black"/>
                  <path d="M 168,64 L 288,64" fill="none" stroke="black"/>
                  <path d="M 344,64 L 464,64" fill="none" stroke="black"/>
                  <path d="M 8,96 L 464,96" fill="none" stroke="black"/>
                  <path d="M 8,160 L 464,160" fill="none" stroke="black"/>
                  <path d="M 8,190 L 464,190" fill="none" stroke="black"/>
                  <path d="M 8,194 L 464,194" fill="none" stroke="black"/>
                  <g class="text">
                    <text x="196" y="52">Static</text>
                    <text x="236" y="52">DH</text>
                    <text x="268" y="52">Keys</text>
                    <text x="384" y="52">Signature</text>
                    <text x="444" y="52">Keys</text>
                    <text x="184" y="84">kid</text>
                    <text x="272" y="84">x5t</text>
                    <text x="360" y="84">kid</text>
                    <text x="448" y="84">x5t</text>
                    <text x="48" y="116">message_1</text>
                    <text x="188" y="116">37</text>
                    <text x="276" y="116">37</text>
                    <text x="364" y="116">37</text>
                    <text x="452" y="116">37</text>
                    <text x="48" y="132">message_2</text>
                    <text x="188" y="132">45</text>
                    <text x="276" y="132">58</text>
                    <text x="360" y="132">102</text>
                    <text x="448" y="132">115</text>
                    <text x="48" y="148">message_3</text>
                    <text x="188" y="148">19</text>
                    <text x="276" y="148">33</text>
                    <text x="364" y="148">77</text>
                    <text x="452" y="148">90</text>
                    <text x="32" y="180">Total</text>
                    <text x="184" y="180">101</text>
                    <text x="272" y="180">128</text>
                    <text x="360" y="180">216</text>
                    <text x="448" y="180">242</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
==========================================================
                     Static DH Keys        Signature Keys
                    ----------------      ----------------
                     kid        x5t        kid        x5t
----------------------------------------------------------
 message_1            37         37         37         37
 message_2            45         58        102        115
 message_3            19         33         77         90
----------------------------------------------------------
 Total               101        128        216        242
==========================================================
]]></artwork>
            </artset>
          </figure>
        </section>
      </section>
      <section anchor="summary-1">
        <name>Summary</name>
        <t>To do a fair comparison, one has to choose a specific deployment and look at the topology, the whole protocol stack, frame sizes (e.g., 51 or 128 bytes), how and where in the protocol stack fragmentation is done, and the expected packet loss. Note that the number of bytes in each frame that is available for the key exchange protocol may depend on the underlying protocol layers as well as on the number of hops in multi-hop networks. The packet loss may depend on how many other devices are transmitting at the same time, and may increase during network formation.  The total overhead will be larger due to mechanisms for fragmentation, retransmission, and packet ordering.  The overhead of fragmentation is roughly proportional to the number of fragments, while the expected overhead due to retransmission in noisy environments is a superlinear function of the flight sizes.</t>
      </section>
    </section>
    <section anchor="record">
      <name>Overhead for Protection of Application Data</name>
      <t>To enable comparison, all the overhead calculations in this section use an 8 bytes ICV (e.g., AES_128_CCM_8 or AES-CCM-16-64-128) or 16 bytes (e.g., AES-CCM, AES-GCM, or ChaCha20-Poly1305), a plaintext of 6 bytes, and the sequence number ‘05’. This follows the example in <xref target="RFC7400"/>, Figure 16.</t>
      <t>Note that the compressed overhead calculations for DLTS 1.2, DTLS 1.3, TLS 1.2 and TLS 1.3 are dependent on the parameters epoch, sequence number, and length (where applicable), and all the overhead calculations are dependent on the parameter Connection ID when used. Note that the OSCORE overhead calculations are dependent on the CoAP option numbers, as well as the length of the OSCORE parameters Sender ID, ID Context, and Sequence Number (where applicable). cTLS uses the DTLS 1.3 record layer. The following calculations are only examples.</t>
      <t><xref target="summ-record"/> gives a short summary of the message overhead based on different parameters and some assumptions. The following sections detail the assumptions and the calculations.</t>
      <section anchor="summ-record">
        <name>Summary</name>
        <t>The DTLS overhead is dependent on the parameter Connection ID. The following overheads apply for all Connection IDs with the same length.</t>
        <t>The compression overhead (GHC) is dependent on the parameters epoch, sequence number, Connection ID, and length (where applicable). The following overheads should be representative for sequence numbers and Connection IDs with the same length.</t>
        <t>The OSCORE overhead is dependent on the included CoAP Option numbers as well as the length of the OSCORE parameters Sender ID and sequence number. The following overheads apply for all sequence numbers and Sender IDs with the same length.</t>
        <figure anchor="fig-overhead">
          <name>Overhead (8 bytes ICV) in bytes as a function of sequence number (Connection/Sender ID = '')</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="368" width="512" viewBox="0 0 512 368" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 504,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 504,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 504,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 504,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 504,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 504,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 504,256" fill="none" stroke="black"/>
                <path d="M 8,304 L 504,304" fill="none" stroke="black"/>
                <path d="M 8,350 L 504,350" fill="none" stroke="black"/>
                <path d="M 8,354 L 504,354" fill="none" stroke="black"/>
                <g class="text">
                  <text x="44" y="52">Sequence</text>
                  <text x="108" y="52">Number</text>
                  <text x="292" y="52">'05'</text>
                  <text x="380" y="52">'1005'</text>
                  <text x="468" y="52">'100005'</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.2</text>
                  <text x="292" y="84">29</text>
                  <text x="380" y="84">29</text>
                  <text x="468" y="84">29</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="292" y="100">11</text>
                  <text x="380" y="100">11</text>
                  <text x="468" y="100">11</text>
                  <text x="28" y="132">DTLS</text>
                  <text x="64" y="132">1.2</text>
                  <text x="104" y="132">(GHC)</text>
                  <text x="292" y="132">16</text>
                  <text x="380" y="132">16</text>
                  <text x="468" y="132">16</text>
                  <text x="28" y="148">DTLS</text>
                  <text x="64" y="148">1.3</text>
                  <text x="104" y="148">(GHC)</text>
                  <text x="292" y="148">12</text>
                  <text x="380" y="148">12</text>
                  <text x="468" y="148">12</text>
                  <text x="24" y="180">TLS</text>
                  <text x="64" y="180">1.2</text>
                  <text x="292" y="180">21</text>
                  <text x="380" y="180">21</text>
                  <text x="468" y="180">21</text>
                  <text x="24" y="196">TLS</text>
                  <text x="64" y="196">1.3</text>
                  <text x="292" y="196">14</text>
                  <text x="380" y="196">14</text>
                  <text x="468" y="196">14</text>
                  <text x="24" y="228">TLS</text>
                  <text x="64" y="228">1.2</text>
                  <text x="104" y="228">(GHC)</text>
                  <text x="292" y="228">17</text>
                  <text x="380" y="228">18</text>
                  <text x="468" y="228">19</text>
                  <text x="24" y="244">TLS</text>
                  <text x="64" y="244">1.3</text>
                  <text x="104" y="244">(GHC)</text>
                  <text x="292" y="244">15</text>
                  <text x="380" y="244">16</text>
                  <text x="468" y="244">17</text>
                  <text x="36" y="276">OSCORE</text>
                  <text x="96" y="276">request</text>
                  <text x="292" y="276">13</text>
                  <text x="380" y="276">14</text>
                  <text x="468" y="276">15</text>
                  <text x="36" y="292">OSCORE</text>
                  <text x="100" y="292">response</text>
                  <text x="292" y="292">11</text>
                  <text x="380" y="292">11</text>
                  <text x="468" y="292">11</text>
                  <text x="32" y="324">Group</text>
                  <text x="84" y="324">OSCORE</text>
                  <text x="148" y="324">pairwise</text>
                  <text x="216" y="324">request</text>
                  <text x="292" y="324">14</text>
                  <text x="380" y="324">15</text>
                  <text x="468" y="324">16</text>
                  <text x="32" y="340">Group</text>
                  <text x="84" y="340">OSCORE</text>
                  <text x="148" y="340">pairwise</text>
                  <text x="220" y="340">response</text>
                  <text x="292" y="340">11</text>
                  <text x="380" y="340">11</text>
                  <text x="468" y="340">11</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
===============================================================
 Sequence Number                  '05'      '1005'    '100005'
---------------------------------------------------------------
 DTLS 1.2                          29         29         29
 DTLS 1.3                          11         11         11
---------------------------------------------------------------
 DTLS 1.2 (GHC)                    16         16         16
 DTLS 1.3 (GHC)                    12         12         12
---------------------------------------------------------------
 TLS  1.2                          21         21         21
 TLS  1.3                          14         14         14
---------------------------------------------------------------
 TLS  1.2 (GHC)                    17         18         19
 TLS  1.3 (GHC)                    15         16         17
---------------------------------------------------------------
 OSCORE request                    13         14         15
 OSCORE response                   11         11         11
---------------------------------------------------------------
 Group OSCORE pairwise request     14         15         16
 Group OSCORE pairwise response    11         11         11
===============================================================
]]></artwork>
          </artset>
        </figure>
        <figure anchor="fig-overhead2">
          <name>Overhead (8 bytes ICV) in bytes as a function of Connection/Sender ID (Sequence Number = '05')</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="504" viewBox="0 0 504 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 496,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 496,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 496,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 496,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 496,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 496,208" fill="none" stroke="black"/>
                <path d="M 8,254 L 496,254" fill="none" stroke="black"/>
                <path d="M 8,258 L 496,258" fill="none" stroke="black"/>
                <g class="text">
                  <text x="80" y="52">Connection/Sender</text>
                  <text x="164" y="52">ID</text>
                  <text x="292" y="52">''</text>
                  <text x="380" y="52">'42'</text>
                  <text x="468" y="52">'4002'</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.2</text>
                  <text x="292" y="84">29</text>
                  <text x="380" y="84">30</text>
                  <text x="468" y="84">31</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="292" y="100">11</text>
                  <text x="380" y="100">12</text>
                  <text x="468" y="100">13</text>
                  <text x="28" y="132">DTLS</text>
                  <text x="64" y="132">1.2</text>
                  <text x="104" y="132">(GHC)</text>
                  <text x="292" y="132">16</text>
                  <text x="380" y="132">17</text>
                  <text x="468" y="132">18</text>
                  <text x="28" y="148">DTLS</text>
                  <text x="64" y="148">1.3</text>
                  <text x="104" y="148">(GHC)</text>
                  <text x="292" y="148">12</text>
                  <text x="380" y="148">13</text>
                  <text x="468" y="148">14</text>
                  <text x="36" y="180">OSCORE</text>
                  <text x="96" y="180">request</text>
                  <text x="292" y="180">13</text>
                  <text x="380" y="180">14</text>
                  <text x="468" y="180">15</text>
                  <text x="36" y="196">OSCORE</text>
                  <text x="100" y="196">response</text>
                  <text x="292" y="196">11</text>
                  <text x="380" y="196">11</text>
                  <text x="468" y="196">11</text>
                  <text x="32" y="228">Group</text>
                  <text x="84" y="228">OSCORE</text>
                  <text x="148" y="228">pairwise</text>
                  <text x="216" y="228">request</text>
                  <text x="292" y="228">14</text>
                  <text x="380" y="228">15</text>
                  <text x="468" y="228">16</text>
                  <text x="32" y="244">Group</text>
                  <text x="84" y="244">OSCORE</text>
                  <text x="148" y="244">pairwise</text>
                  <text x="220" y="244">response</text>
                  <text x="292" y="244">11</text>
                  <text x="380" y="244">11</text>
                  <text x="468" y="244">11</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
==============================================================
 Connection/Sender ID              ''        '42'      '4002'
--------------------------------------------------------------
 DTLS 1.2                          29         30         31
 DTLS 1.3                          11         12         13
--------------------------------------------------------------
 DTLS 1.2 (GHC)                    16         17         18
 DTLS 1.3 (GHC)                    12         13         14
--------------------------------------------------------------
 OSCORE request                    13         14         15
 OSCORE response                   11         11         11
--------------------------------------------------------------
 Group OSCORE pairwise request     14         15         16
 Group OSCORE pairwise response    11         11         11
==============================================================
]]></artwork>
          </artset>
        </figure>
        <figure anchor="fig-overhead3">
          <name>Overhead (excluding ICV) in bytes (Connection/Sender ID = '', Sequence Number = '05')</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="496" viewBox="0 0 496 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,30 L 488,30" fill="none" stroke="black"/>
                <path d="M 8,34 L 488,34" fill="none" stroke="black"/>
                <path d="M 8,64 L 488,64" fill="none" stroke="black"/>
                <path d="M 8,112 L 488,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 488,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 488,208" fill="none" stroke="black"/>
                <path d="M 8,254 L 488,254" fill="none" stroke="black"/>
                <path d="M 8,258 L 488,258" fill="none" stroke="black"/>
                <g class="text">
                  <text x="44" y="52">Protocol</text>
                  <text x="292" y="52">Overhead</text>
                  <text x="404" y="52">Overhead</text>
                  <text x="464" y="52">(GHC)</text>
                  <text x="28" y="84">DTLS</text>
                  <text x="64" y="84">1.2</text>
                  <text x="292" y="84">21</text>
                  <text x="424" y="84">8</text>
                  <text x="28" y="100">DTLS</text>
                  <text x="64" y="100">1.3</text>
                  <text x="296" y="100">3</text>
                  <text x="424" y="100">4</text>
                  <text x="24" y="132">TLS</text>
                  <text x="64" y="132">1.2</text>
                  <text x="292" y="132">13</text>
                  <text x="424" y="132">9</text>
                  <text x="24" y="148">TLS</text>
                  <text x="64" y="148">1.3</text>
                  <text x="296" y="148">6</text>
                  <text x="424" y="148">7</text>
                  <text x="36" y="180">OSCORE</text>
                  <text x="96" y="180">request</text>
                  <text x="296" y="180">5</text>
                  <text x="36" y="196">OSCORE</text>
                  <text x="100" y="196">response</text>
                  <text x="296" y="196">3</text>
                  <text x="32" y="228">Group</text>
                  <text x="84" y="228">OSCORE</text>
                  <text x="148" y="228">pairwise</text>
                  <text x="216" y="228">request</text>
                  <text x="296" y="228">6</text>
                  <text x="32" y="244">Group</text>
                  <text x="84" y="244">OSCORE</text>
                  <text x="148" y="244">pairwise</text>
                  <text x="220" y="244">response</text>
                  <text x="296" y="244">3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
=============================================================
 Protocol                       Overhead      Overhead (GHC)
-------------------------------------------------------------
 DTLS 1.2                          21               8
 DTLS 1.3                           3               4
-------------------------------------------------------------
 TLS  1.2                          13               9
 TLS  1.3                           6               7
-------------------------------------------------------------
 OSCORE request                     5
 OSCORE response                    3
-------------------------------------------------------------
 Group OSCORE pairwise request      6
 Group OSCORE pairwise response     3
=============================================================
]]></artwork>
          </artset>
        </figure>
        <t>The numbers in <xref target="fig-overhead"/>, <xref target="fig-overhead2"/>, and <contact fullname="{fig-overhead3"/>} do not consider the different Token processing requirements for clients <xref target="RFC9175"/> required for secure operation as motivated by <xref target="I-D.ietf-core-attacks-on-coap"/>. As reuse of Tokens is easier in OSCORE than DTLS, OSCORE might have slightly lower overhead than DTLS 1.3 for long connection even if DTLS 1.3 has slightly lower overhead than OSCORE for short connections.</t>
        <t>The numbers in <xref target="fig-overhead"/>, <xref target="fig-overhead2"/>, and <contact fullname="{fig-overhead3"/>} do not consider underlying layers. DTLS is typically sent over 8 bytes UDP datagram headers while TLS is typically sent over 20 bytes TCP segment headers. TCP also uses some more bytes for additional messages used in TCP internally. The total overhead for DTLS 1.3 over UDP is significantly less than TLS 1.3 over TCP.</t>
        <t>The numbers in <xref target="fig-overhead"/> and <xref target="fig-overhead2"/> were calculated with 8 bytes ICV which is the mandatory to implement in <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and <xref target="I-D.ietf-core-oscore-edhoc"/>. If 16 bytes tag are used, all numbers increases with 8.</t>
      </section>
      <section anchor="dtls-12">
        <name>DTLS 1.2</name>
        <section anchor="dtls-12-1">
          <name>DTLS 1.2</name>
          <t>This section analyzes the overhead of DTLS 1.2 <xref target="RFC6347"/>. The nonce follow the strict profiling given in <xref target="RFC7925"/>.  This example is taken directly from <xref target="RFC7400"/>, Figure 16.</t>
          <artwork><![CDATA[
DTLS 1.2 record layer (35 bytes, 29 bytes overhead):
17 fe fd 00 01 00 00 00 00 00 05 00 16 00 01 00
00 00 00 00 05 ae a0 15 56 67 92 4d ff 8a 24 e4
cb 35 b9

Content type:
17
Version:
fe fd
Epoch:
00 01
Sequence number:
00 00 00 00 00 05
Length:
00 16
Nonce:
00 01 00 00 00 00 00 05
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>DTLS 1.2 gives 29 bytes overhead.</t>
        </section>
        <section anchor="dtls-12-with-6lowpan-ghc">
          <name>DTLS 1.2 with 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of DTLS 1.2 <xref target="RFC6347"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/>. The compression was done with <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that the sequence number ‘01’ used in <xref target="RFC7400"/>, Figure 15 gives an exceptionally small overhead that is not representative.</t>
          <t>Note that this header compression is not available when DTLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed DTLS 1.2 record layer (22 bytes, 16 bytes overhead):
b0 c3 03 05 00 16 f2 0e ae a0 15 56 67 92 4d ff
8a 24 e4 cb 35 b9

Compressed DTLS 1.2 record layer header and nonce:
b0 c3 03 05 00 16 f2 0e
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, DTLS 1.2 with the above parameters (epoch, sequence number, length) gives 16 bytes overhead.</t>
        </section>
        <section anchor="dtls-12-with-connection-id">
          <name>DTLS 1.2 with Connection ID</name>
          <t>This section analyzes the overhead of DTLS 1.2 <xref target="RFC6347"/> with Connection ID <xref target="RFC9146"/>. The overhead calculations in this section uses Connection ID = '42'. DTLS record layer with a Connection ID = '' (the empty string) is equal to DTLS without Connection ID.</t>
          <artwork><![CDATA[
DTLS 1.2 record layer (36 bytes, 30 bytes overhead):
17 fe fd 00 01 00 00 00 00 00 05 42 00 16 00 01
00 00 00 00 00 05 ae a0 15 56 67 92 4d ff 8a 24
e4 cb 35 b9

Content type:
17
Version:
fe fd
Epoch:
00 01
Sequence number:
00 00 00 00 00 05
Connection ID:
42
Length:
00 16
Nonce:
00 01 00 00 00 00 00 05
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>DTLS 1.2 with Connection ID gives 30 bytes overhead.</t>
        </section>
        <section anchor="dtls-12-with-connection-id-and-6lowpan-ghc">
          <name>DTLS 1.2 with Connection ID and 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of DTLS 1.2 <xref target="RFC6347"/> with Connection ID <xref target="RFC9146"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/> <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that the sequence number ‘01’ used in <xref target="RFC7400"/>, Figure 15 gives an exceptionally small overhead that is not representative.</t>
          <t>Note that this header compression is not available when DTLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed DTLS 1.2 record layer (23 bytes, 17 bytes overhead):
b0 c3 04 05 42 00 16 f2 0e ae a0 15 56 67 92 4d
ff 8a 24 e4 cb 35 b9

Compressed DTLS 1.2 record layer header and nonce:
b0 c3 04 05 42 00 16 f2 0e
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, DTLS 1.2 with the above parameters (epoch, sequence number, Connection ID, length) gives 17 bytes overhead.</t>
        </section>
      </section>
      <section anchor="dtls-13-1">
        <name>DTLS 1.3</name>
        <section anchor="dtls-13-2">
          <name>DTLS 1.3</name>
          <t>This section analyzes the overhead of DTLS 1.3 <xref target="RFC9147"/>. The changes compared to DTLS 1.2 are: omission of version number, merging of epoch into the first byte containing signaling bits, optional omission of length, reduction of sequence number into a 1 or 2-bytes field.</t>
          <t>DTLS 1.3 is only analyzed with an omitted length field and with an 8-bit sequence number (see Figure 4 of <xref target="RFC9147"/>).</t>
          <artwork><![CDATA[
DTLS 1.3 record layer (17 bytes, 11 bytes overhead):
21 05 ae a0 15 56 67 92 ec 4d ff 8a 24 e4 cb 35 b9

First byte (including epoch):
21
Sequence number:
05
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>DTLS 1.3 gives 11 bytes overhead.</t>
        </section>
        <section anchor="dtls-13-with-6lowpan-ghc">
          <name>DTLS 1.3 with 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of DTLS 1.3 <xref target="RFC9147"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/> <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that this header compression is not available when DTLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed DTLS 1.3 record layer (18 bytes, 12 bytes overhead):
11 21 05 ae a0 15 56 67 92 ec 4d ff 8a 24 e4 cb
35 b9

Compressed DTLS 1.3 record layer header and nonce:
11 21 05
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, DTLS 1.3 with the above parameters (epoch, sequence number, no length) gives 12 bytes overhead.</t>
        </section>
        <section anchor="dtls-13-with-connection-id">
          <name>DTLS 1.3 with Connection ID</name>
          <t>This section analyzes the overhead of DTLS 1.3 <xref target="RFC9147"/> with Connection ID <xref target="RFC9146"/>.</t>
          <t>In this example, the length field is omitted, and the 1-byte field is used for the sequence number. The minimal DTLSCiphertext structure is used (see Figure 4 of <xref target="RFC9147"/>), with the addition of the Connection ID field.</t>
          <artwork><![CDATA[
DTLS 1.3 record layer (18 bytes, 12 bytes overhead):
31 42 05 ae a0 15 56 67 92 ec 4d ff 8a 24 e4 cb 35 b9

First byte (including epoch):
31
Connection ID:
42
Sequence number:
05
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>DTLS 1.3 with Connection ID gives 12 bytes overhead.</t>
        </section>
        <section anchor="dtls-13-with-connection-id-and-6lowpan-ghc">
          <name>DTLS 1.3 with Connection ID and 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of DTLS 1.3 <xref target="RFC9147"/> with Connection ID <xref target="RFC9146"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/> <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that this header compression is not available when DTLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed DTLS 1.3 record layer (19 bytes, 13 bytes overhead):
12 31 05 42 ae a0 15 56 67 92 ec 4d ff 8a 24 e4
cb 35 b9

Compressed DTLS 1.3 record layer header and nonce:
12 31 05 42
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, DTLS 1.3 with the above parameters (epoch, sequence number, Connection ID, no length) gives 13 bytes overhead.</t>
        </section>
      </section>
      <section anchor="tls-12">
        <name>TLS 1.2</name>
        <section anchor="tls-12-1">
          <name>TLS 1.2</name>
          <t>This section analyzes the overhead of TLS 1.2 <xref target="RFC5246"/>. The changes compared to DTLS 1.2 is that the TLS 1.2 record layer does not have epoch and sequence number, and that the version is different.</t>
          <artwork><![CDATA[
TLS 1.2 Record Layer (27 bytes, 21 bytes overhead):
17 03 03 00 16 00 00 00 00 00 00 00 05 ae a0 15
56 67 92 4d ff 8a 24 e4 cb 35 b9

Content type:
17
Version:
03 03
Length:
00 16
Nonce:
00 00 00 00 00 00 00 05
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>TLS 1.2 gives 21 bytes overhead.</t>
        </section>
        <section anchor="tls-12-with-6lowpan-ghc">
          <name>TLS 1.2 with 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of TLS 1.2 <xref target="RFC5246"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/> <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that this header compression is not available when TLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed TLS 1.2 record layer (23 bytes, 17 bytes overhead):
05 17 03 03 00 16 85 0f 05 ae a0 15 56 67 92 4d
ff 8a 24 e4 cb 35 b9

Compressed TLS 1.2 record layer header and nonce:
05 17 03 03 00 16 85 0f 05
Ciphertext:
ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, TLS 1.2 with the above parameters (epoch, sequence number, length) gives 17 bytes overhead.</t>
        </section>
      </section>
      <section anchor="tls-13-1">
        <name>TLS 1.3</name>
        <section anchor="tls-13-2">
          <name>TLS 1.3</name>
          <t>This section analyzes the overhead of TLS 1.3 <xref target="RFC8446"/>. The change compared to TLS 1.2 is that the TLS 1.3 record layer uses a different version.</t>
          <artwork><![CDATA[
TLS 1.3 Record Layer (20 bytes, 14 bytes overhead):
17 03 03 00 16 ae a0 15 56 67 92 ec 4d ff 8a 24
e4 cb 35 b9

Content type:
17
Legacy version:
03 03
Length:
00 0f
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>TLS 1.3 gives 14 bytes overhead.</t>
        </section>
        <section anchor="tls-13-with-6lowpan-ghc">
          <name>TLS 1.3 with 6LoWPAN-GHC</name>
          <t>This section analyzes the overhead of TLS 1.3 <xref target="RFC8446"/> when compressed with 6LoWPAN-GHC <xref target="RFC7400"/> <xref target="OlegHahm-ghc"/>.</t>
          <t>Note that this header compression is not available when TLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
          <artwork><![CDATA[
Compressed TLS 1.3 record layer (21 bytes, 15 bytes overhead):
14 17 03 03 00 0f ae a0 15 56 67 92 ec 4d ff 8a
24 e4 cb 35 b9

Compressed TLS 1.3 record layer header and nonce:
14 17 03 03 00 0f
Ciphertext (including encrypted content type):
ae a0 15 56 67 92 ec
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
          <t>When compressed with 6LoWPAN-GHC, TLS 1.3 with the above parameters (epoch, sequence number, length) gives 15 bytes overhead.</t>
        </section>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>This section analyzes the overhead of OSCORE <xref target="RFC8613"/>.</t>
        <t>The below calculation Option Delta = ‘9’, Sender ID = ‘’ (empty string), and Sequence Number = ‘05’ and is only an example. Note that Sender ID = ‘’ (empty string) can only be used by one client per server.</t>
        <artwork><![CDATA[
OSCORE request (19 bytes, 13 bytes overhead):
92 09 05
ff ec ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9

CoAP option delta and length:
92
Option value (flag byte and sequence number):
09 05
Payload marker:
ff
Ciphertext (including encrypted code):
ec ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
        <t>The below calculation Option Delta = ‘9’, Sender ID = ‘42’, and Sequence Number = ‘05’, and is only an example.</t>
        <artwork><![CDATA[
OSCORE request (20 bytes, 14 bytes overhead):
93 09 05 42
ff ec ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9

CoAP option delta and length:
93
Option Value (flag byte, sequence number, and Sender ID):
09 05 42
Payload marker:
ff
Ciphertext (including encrypted code):
ec ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
        <t>The below calculation uses Option Delta = ‘9’.</t>
        <artwork><![CDATA[
OSCORE response (17 bytes, 11 bytes overhead):
90
ff ec ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9

CoAP delta and option length:
90
Option value:
-
Payload marker:
ff
Ciphertext (including encrypted code):
ec ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
        <t>OSCORE with the above parameters gives 13-14 bytes overhead for requests and 11 bytes overhead for responses.</t>
        <t>Unlike DTLS and TLS, OSCORE has much smaller overhead for responses than requests.</t>
      </section>
      <section anchor="group-oscore">
        <name>Group OSCORE</name>
        <t>This section analyzes the overhead of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>. Group OSCORE defines a pairwise mode where each member of the group can efficiently derive a symmetric pairwise key with any other member of the group for pairwise OSCORE communication. An additional requirement compared to <xref target="RFC8613"/> is that ID Context is always included in requests. Assuming 1 byte ID Context and Sender ID this adds 2 bytes to requests.</t>
        <t>The below calculation Option Delta = ‘9’, ID Context = ‘’, Sender ID = ‘42’, and Sequence Number = ‘05’, and is only an example. ID Context = ‘’ would be the standard for local deployments only having a single group.</t>
        <artwork><![CDATA[
OSCORE request (21 bytes, 15 bytes overhead):
93 09 05 42
ff ec ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9

CoAP option delta and length:
93
Option Value (flag byte, ID Context length, sequence nr, Sender ID):
19 00 05 42
Payload marker:
ff
Ciphertext (including encrypted code):
ec ae a0 15 56 67 92
ICV:
4d ff 8a 24 e4 cb 35 b9
]]></artwork>
        <t>The pairwise mode OSCORE with the above parameters gives 15 bytes overhead for requests and 11 bytes overhead for responses.</t>
      </section>
      <section anchor="summary-2">
        <name>Summary</name>
        <t>DTLS 1.2 has quite a large overhead as it uses an explicit sequence number and an explicit nonce. TLS 1.2 has significantly less (but not small) overhead. TLS 1.3 has quite a small overhead. OSCORE and DTLS 1.3 (using the minimal structure) format have very small overhead.</t>
        <t>The Generic Header Compression (6LoWPAN-GHC) can in addition to DTLS 1.2 handle TLS 1.2, and DTLS 1.2 with Connection ID. The Generic Header Compression (6LoWPAN-GHC) works very well for Connection ID and the overhead seems to increase exactly with the length of the Connection ID (which is optimal). The compression of TLS 1.2 is not as good as the compression of DTLS 1.2 (as the static dictionary only contains the DTLS 1.2 version number). Similar compression levels as for DTLS could be achieved also for TLS 1.2, but this would require different static dictionaries. For TLS 1.3 and DTLS 1.3, GHC increases the overhead. The 6LoWPAN-GHC header compression is not available when (D)TLS is used over transports that do not use 6LoWPAN together with 6LoWPAN-GHC.</t>
        <t>New security protocols like OSCORE, TLS 1.3, and DTLS 1.3 have much lower overhead than DTLS 1.2 and TLS 1.2. The overhead is even smaller than DTLS 1.2 and TLS 1.2 over 6LoWPAN with compression, and therefore the small overhead is achieved even on deployments without 6LoWPAN or 6LoWPAN without compression. OSCORE is lightweight because it makes use of CoAP, CBOR, and COSE, which were designed to have as low overhead as possible. As can be seen in <xref target="fig-overhead3"/>, Group OSCORE for pairwise communication increases the overhead of OSCORE requests with 20%.</t>
        <t>Note that the compared protocols have slightly different use cases. TLS and DTLS are designed for the transport layer and are terminated in CoAP proxies. OSCORE is designed for the application layer and protects information end-to-end between the CoAP client and the CoAP server. Group OSCORE is designed for communication in a group.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is purely informational.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
          <author fullname="T. Dierks" initials="T." surname="Dierks"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2008"/>
          <abstract>
            <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5246"/>
        <seriesInfo name="DOI" value="10.17487/RFC5246"/>
      </reference>
      <reference anchor="RFC5480" target="https://www.rfc-editor.org/info/rfc5480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5480.xml">
        <front>
          <title>Elliptic Curve Cryptography Subject Public Key Information</title>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <author fullname="D. Brown" initials="D." surname="Brown"/>
          <author fullname="K. Yiu" initials="K." surname="Yiu"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="T. Polk" initials="T." surname="Polk"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography.  This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5480"/>
        <seriesInfo name="DOI" value="10.17487/RFC5480"/>
      </reference>
      <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
        <front>
          <title>Datagram Transport Layer Security Version 1.2</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
          <date month="January" year="2012"/>
          <abstract>
            <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6347"/>
        <seriesInfo name="DOI" value="10.17487/RFC6347"/>
      </reference>
      <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC7400" target="https://www.rfc-editor.org/info/rfc7400" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7400.xml">
        <front>
          <title>6LoWPAN-GHC: Generic Header Compression for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="November" year="2014"/>
          <abstract>
            <t>RFC 6282 defines header compression in 6LoWPAN packets (where "6LoWPAN" refers to "IPv6 over Low-Power Wireless Personal Area Network").  The present document specifies a simple addition that enables the compression of generic headers and header-like payloads, without a need to define a new header compression scheme for each such new header or header-like payload.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7400"/>
        <seriesInfo name="DOI" value="10.17487/RFC7400"/>
      </reference>
      <reference anchor="RFC7924" target="https://www.rfc-editor.org/info/rfc7924" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7924.xml">
        <front>
          <title>Transport Layer Security (TLS) Cached Information Extension</title>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="July" year="2016"/>
          <abstract>
            <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
            <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7924"/>
        <seriesInfo name="DOI" value="10.17487/RFC7924"/>
      </reference>
      <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
        <front>
          <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
          <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
          <author fullname="T. Fossati" initials="T." surname="Fossati"/>
          <date month="July" year="2016"/>
          <abstract>
            <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
            <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7925"/>
        <seriesInfo name="DOI" value="10.17487/RFC7925"/>
      </reference>
      <reference anchor="RFC8323" target="https://www.rfc-editor.org/info/rfc8323" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8323.xml">
        <front>
          <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="S. Lemay" initials="S." surname="Lemay"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
          <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
            <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8323"/>
        <seriesInfo name="DOI" value="10.17487/RFC8323"/>
      </reference>
      <reference anchor="RFC8376" target="https://www.rfc-editor.org/info/rfc8376" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8376.xml">
        <front>
          <title>Low-Power Wide Area Network (LPWAN) Overview</title>
          <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8376"/>
        <seriesInfo name="DOI" value="10.17487/RFC8376"/>
      </reference>
      <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8613.xml">
        <front>
          <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
            <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8613"/>
        <seriesInfo name="DOI" value="10.17487/RFC8613"/>
      </reference>
      <reference anchor="RFC8824" target="https://www.rfc-editor.org/info/rfc8824" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8824.xml">
        <front>
          <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
          <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
          <author fullname="L. Toutain" initials="L." surname="Toutain"/>
          <author fullname="R. Andreasen" initials="R." surname="Andreasen"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework.  SCHC defines a header compression mechanism adapted for Constrained Devices.  SCHC uses a static description of the header to reduce the header's redundancy and size.  While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers.  The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length.  The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages.  This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8824"/>
        <seriesInfo name="DOI" value="10.17487/RFC8824"/>
      </reference>
      <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
        <front>
          <title>TLS Certificate Compression</title>
          <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
          <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
            <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8879"/>
        <seriesInfo name="DOI" value="10.17487/RFC8879"/>
      </reference>
      <reference anchor="RFC9146" target="https://www.rfc-editor.org/info/rfc9146" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9146.xml">
        <front>
          <title>Connection Identifier for DTLS 1.2</title>
          <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
          <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
          <author fullname="T. Fossati" initials="T." surname="Fossati"/>
          <author fullname="A. Kraus" initials="A." surname="Kraus"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document specifies the Connection ID (CID) construct for the Datagram Transport Layer Security (DTLS) protocol version 1.2.</t>
            <t>A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.</t>
            <t>The new ciphertext record format with the CID also provides content type encryption and record layer padding.</t>
            <t>This document updates RFC 6347.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9146"/>
        <seriesInfo name="DOI" value="10.17487/RFC9146"/>
      </reference>
      <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
        <front>
          <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
          <date month="April" year="2022"/>
          <abstract>
            <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
            <t>This document obsoletes RFC 6347.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9147"/>
        <seriesInfo name="DOI" value="10.17487/RFC9147"/>
      </reference>
      <reference anchor="RFC9175" target="https://www.rfc-editor.org/info/rfc9175" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9175.xml">
        <front>
          <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
          <author fullname="C. Amsüss" initials="C." surname="Amsüss"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases.  The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address.  The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request.  This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9175"/>
        <seriesInfo name="DOI" value="10.17487/RFC9175"/>
      </reference>
      <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
        <front>
          <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
          <author fullname="M. Sethi" initials="M." surname="Sethi"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication.  Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem.  This document looks at this problem in detail and describes the potential solutions available.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9191"/>
        <seriesInfo name="DOI" value="10.17487/RFC9191"/>
      </reference>
      <reference anchor="I-D.ietf-core-attacks-on-coap" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-attacks-on-coap-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-attacks-on-coap.xml">
        <front>
          <title>Attacks on the Constrained Application Protocol (CoAP)</title>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Fornehed" initials="J." surname="Fornehed">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
            <organization>Energy Harvesting Solutions</organization>
          </author>
          <date day="22" month="December" year="2022"/>
          <abstract>
            <t>Being able to securely read information from sensors, to securely control actuators, and to not enable distributed denial-of-service attacks are essential in a world of connected and networking things interacting with the physical world. Using a security protocol such as DTLS, TLS, or OSCORE to protect CoAP is a requirement for secure operation and protects against many attacks. This document summarizes a number of known attacks on CoAP deployments and show that just using CoAP with a security protocol like DTLS, TLS, or OSCORE is not enough for secure operation. Several of the discussed attacks can be mitigated with the solutions in RFC 9175.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-attacks-on-coap-02"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-edhoc-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-oscore-edhoc.xml">
        <front>
          <title>Using EDHOC with CoAP and OSCORE</title>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
            <organization>Fraunhofer AISEC</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>The lightweight authenticated key exchange protocol EDHOC can be run over CoAP and used by two peers to establish an OSCORE Security Context. This document details this use of the EDHOC protocol, by specifying a number of additional and optional mechanisms. These especially include an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-07"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-groupcomm" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-groupcomm-17" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-oscore-groupcomm.xml">
        <front>
          <title>Group OSCORE - Secure Group Communication for CoAP</title>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Jiye Park" initials="J." surname="Park">
            <organization>Universitaet Duisburg-Essen</organization>
          </author>
          <date day="20" month="December" year="2022"/>
          <abstract>
            <t>This document defines Group Object Security for Constrained RESTful Environments (Group OSCORE), providing end-to-end security of CoAP messages exchanged between members of a group, e.g., sent over IP multicast. In particular, the described approach defines how OSCORE is used in a group communication setting to provide source authentication for CoAP group requests, sent by a client to multiple servers, and for protection of the corresponding CoAP responses. Group OSCORE also defines a pairwise mode where each member of the group can efficiently derive a symmetric pairwise key with any other member of the group for pairwise OSCORE communication.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-17"/>
      </reference>
      <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-cbor-encoded-cert.xml">
        <front>
          <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Shahid Raza" initials="S." surname="Raza">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Joel Höglund" initials="J." surname="Höglund">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
            <organization>Nexus Group</organization>
          </author>
          <date day="10" month="January" year="2023"/>
          <abstract>
            <t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%. The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re- encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
      </reference>
      <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <date day="3" month="February" year="2023"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-19"/>
      </reference>
      <reference anchor="I-D.ietf-lake-reqs" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-reqs-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-reqs.xml">
        <front>
          <title>Requirements for a Lightweight AKE for OSCORE</title>
          <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
            <organization>Inria</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Dan Garcia-Carillo" initials="D." surname="Garcia-Carillo">
            <organization>Odin Solutions S.L.</organization>
          </author>
          <date day="8" month="June" year="2020"/>
          <abstract>
            <t>This document compiles the requirements for a lightweight authenticated key exchange protocol for OSCORE. This draft has completed a working group last call (WGLC) in the LAKE working group. Post-WGLC, the requirements are considered sufficiently stable for the working group to proceed with its work. It is not currently planned to publish this draft as an RFC.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lake-reqs-04"/>
      </reference>
      <reference anchor="I-D.ietf-lake-traces" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-traces-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-traces.xml">
        <front>
          <title>Traces of EDHOC</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marek Serafin" initials="M." surname="Serafin">
            <organization>ASSA ABLOY</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE</organization>
          </author>
          <date day="10" month="March" year="2023"/>
          <abstract>
            <t>This document contains some example traces of Ephemeral Diffie- Hellman Over COSE (EDHOC).</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lake-traces-04"/>
      </reference>
      <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
        <front>
          <title>Compact TLS 1.3</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Mozilla</organization>
          </author>
          <author fullname="Richard Barnes" initials="R." surname="Barnes">
            <organization>Cisco</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
            <organization>Google</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-08"/>
      </reference>
      <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
        <front>
          <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Arm Limited</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-06"/>
      </reference>
      <reference anchor="I-D.kampanakis-tls-scas-latest" target="https://datatracker.ietf.org/doc/html/draft-kampanakis-tls-scas-latest-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.kampanakis-tls-scas-latest.xml">
        <front>
          <title>Suppressing CA Certificates in TLS 1.3</title>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Cameron Bytheway" initials="C." surname="Bytheway">
            <organization>AWS</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="5" month="January" year="2023"/>
          <abstract>
            <t>A TLS client or server that has access to the complete set of published intermediate certificates can inform its peer to avoid sending certificate authority certificates, thus reducing the size of the TLS handshake.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kampanakis-tls-scas-latest-03"/>
      </reference>
      <reference anchor="I-D.mattsson-tls-compact-ecc" target="https://datatracker.ietf.org/doc/html/draft-mattsson-tls-compact-ecc-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.mattsson-tls-compact-ecc.xml">
        <front>
          <title>Compact ECDHE and ECDSA Encodings for TLS 1.3</title>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <date day="28" month="March" year="2023"/>
          <abstract>
            <t>The encodings used in the ECDHE groups secp256r1, secp384r1, and secp521r1 and the ECDSA signature algorithms ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, and ecdsa_secp521r1_sha512 have significant overhead and the ECDSA encoding produces variable-length signatures. This document defines new optimal fixed-length encodings and registers new ECDHE groups and ECDSA signature algorithms using these new encodings. The new encodings reduce the size of the ECDHE groups with 33, 49, and 67 bytes and the ECDSA algorithms with an average of 7 bytes. These new encodings also work in DTLS 1.3 and are especially useful in cTLS.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-mattsson-tls-compact-ecc-04"/>
      </reference>
      <reference anchor="I-D.tiloca-lpwan-8824-update" target="https://datatracker.ietf.org/doc/html/draft-tiloca-lpwan-8824-update-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.tiloca-lpwan-8824-update.xml">
        <front>
          <title>Clarifications and Updates on using Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Laurent Toutain" initials="L." surname="Toutain">
            <organization>IMT Atlantique</organization>
          </author>
          <author fullname="Ivan Martinez" initials="I." surname="Martinez">
            <organization>IMT Atlantique</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>This document clarifies, updates and extends the method specified in RFC 8824 for compressing Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. In particular, it considers recently defined CoAP options and specifies how CoAP headers are compressed in the presence of intermediaries. Therefore, this document updates RFC 8824.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-tiloca-lpwan-8824-update-00"/>
      </reference>
      <reference anchor="SCHC-eval" target="https://ieeexplore.ieee.org/document/9685592">
        <front>
          <title>Effective interoperability and security support for constrained IoT networks</title>
          <author initials="M." surname="Dumay">
            <organization/>
          </author>
          <author initials="D." surname="Barthel">
            <organization/>
          </author>
          <author initials="L." surname="Toutain">
            <organization/>
          </author>
          <author initials="J." surname="Lecoeuvre">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="E-impact" target="https://www.iab.org/activities/workshops/e-impact/">
        <front>
          <title>Workshop on Environmental Impact of Internet Applications and Systems</title>
          <author initials="" surname="Internet Architecture Board">
            <organization/>
          </author>
          <date year="2022" month="December"/>
        </front>
      </reference>
      <reference anchor="OlegHahm-ghc" target="https://github.com/OlegHahm/ghc">
        <front>
          <title>Generic Header Compression</title>
          <author initials="O." surname="Hahm">
            <organization/>
          </author>
          <date year="2016" month="July"/>
        </front>
      </reference>
      <reference anchor="IoT-Cert" target="https://kth.diva-portal.org/smash/get/diva2:1153958/FULLTEXT01.pdf">
        <front>
          <title>Digital Certificates for the Internet of Things</title>
          <author initials="F." surname="Forsby">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
      </reference>
      <reference anchor="Illustrated-TLS12" target="https://tls12.xargs.org/">
        <front>
          <title>The Illustrated TLS 1.2 Connection</title>
          <author initials="M." surname="Driscoll">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Illustrated-TLS13" target="https://tls13.xargs.org/">
        <front>
          <title>The Illustrated TLS 1.3 Connection</title>
          <author initials="M." surname="Driscoll">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Illustrated-DTLS13" target="https://dtls.xargs.org/">
        <front>
          <title>The Illustrated DTLS 1.3 Connection</title>
          <author initials="M." surname="Driscoll">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank
<contact fullname="Carsten Bormann"/>,
<contact fullname="Ari Keränen"/>,
<contact fullname="Erik Kline"/>,
<contact fullname="Stephan Koch"/>,
<contact fullname="Achim Kraus"/>,
<contact fullname="Michael Richardsson"/>,
<contact fullname="Göran Selander"/>,
<contact fullname="Bill Silverajan"/>,
<contact fullname="Akram Sheriff"/>,
<contact fullname="Marco Tiloca"/>,
and
<contact fullname="Hannes Tschofenig"/>
for comments and suggestions on previous versions of the draft.</t>
      <t>All 6LoWPAN-GHC compression was done with <xref target="OlegHahm-ghc"/>. <xref target="Illustrated-TLS13"/> as a was a useful resource for the TLS handshake content and formatting and <xref target="IoT-Cert"/> was a useful resource for SubjectPublicKeyInfo formatting.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
