Skip to main content
  • Previewing the updated RFC-Editor.org website at IETF 124 Montreal

    The RFC-Editor.org website, the official distribution channel of RFC documents that describe the Internet's technical foundations, is being reimagined to address the needs of RFC consumers. An early preview of the site will be shared at the upcoming IETF 124 Montreal meeting on 1-7 November. The new website is expected to be put into production early next year.

    16 Oct 2025
  • Suggested IETF 124 Sessions for Getting Familiar with New Topics

    These IETF 124 meeting sessions are likely to include discussions and proposals that are accessible to a broad range of Internet technologists whether they are new to the IETF or long-time participants.

    9 Oct 2025
  • Preventing Internet Route Hijack with SIDRops Technology

    Route hijack attacks cause malicious rerouting of Internet traffic by exploiting the trusting nature of the Internet’s routing system. During the summer of 2025, a route hijack attack affected the Domain Name System’s (DNS) root servers. If it were more widely deployed, technology developed in the IETF’s Secure Inter-Domain Routing Operations (SIDRops) Working Group could have quickly detected and defeated this attack.

    8 Oct 2025
  • Applied Networking Research Prize 2026 Nominations Now Open

    Submit nominations for the 2026 Applied Networking Research Prize (ANRP) until 17 November 2025 to recognize the best recent results in applied networking, interesting new research ideas of potential relevance to the Internet standards community, and upcoming people that are likely to have an impact on Internet standards and technologies.

    6 Oct 2025
  • Making RFCs easier to find and use through a re-imagined RFC Editor website

    The widespread dissemination, understanding, and use of the open standards published in RFCs is critical to the development of an open Internet—and a reimagined RFC-Editor.org website aims to make them more available and accessible than ever.

    21 Aug 2025

Filter by topic and date

Filter by topic and date

EDHOC - A new lightweight authenticated key exchange protocol provides improved security with less overhead for Internet-of-Things devices

5 Jun 2024

Ephemeral Diffie-Hellman Over COSE (EDHOC) is a very compact, lightweight authenticated key exchange protocol, providing state-of-the-art security including mutual authentication, forward secrecy and identity protection.

pexels-mhafetrey-2416657-4048177

Running an authenticated key exchange protocol over low-power Internet-of-Things radio technologies is challenging. These technologies often have Maximum Transmission Units (MTUs) on the order of several tens of bytes and very limited data rates, sometimes lower than dial-up modems used to access the Internet in the 1990s. What is more, the devices are also constrained in terms of the available memory and processing. EDHOC—described in the recently-published RFC 9528 and RFC 9529—enables state-of-the-art key exchange, for which we have formal security proofs, yet avoids message fragmentation even in the presence of these radio constraints thanks to small message sizes. EDHOC implementations require a minimal amount of code and data memory.

EDHOC is designed to be a security enabler in the next generation of Internet-of-Things products and can be used for instance in appliances for home and businesses. One example of a company working in this area is ASSA ABLOY, who offer a broad range of access solutions where EDHOC is considered as a suitable authentication component enabling modern standards-based IoT integrations that are power efficient, fast and lightweight.

EDHOC is built on proven technologies. It uses the Concise Binary Object Representation (CBOR) encoding for message compactness, without sacrificing on extensibility. It leverages the CBOR Object Signing and Encryption (COSE) algorithms to provide cryptographic agility and reduce the amount of new code that is required on constrained devices. EDHOC also uses COSE for identification of authentication credentials, including COSE keys, CBOR Web Token (CWT), CWT Claims Set (CCS), X.509, and CBOR-encoded X.509 (C509) certificates. EDHOC’s authentication credentials, e.g. certificates, need not be transported over the air, a feature that enables significant byte savings. Through this effective usage of Internet technologies standardized for constrained environments, and careful cryptographic design, EDHOC guarantees mutual authentication of the two endpoints and the confidentiality of the established shared secret. This secret can then be used by other protocols such as Object Security for Constrained RESTful Environments (OSCORE) or COSE for data encryption.

Following up on the successful standardization stories of TLS 1.3 and Messaging Layer Security (MLS), particular attention during the standardization process in the LAKE working group was given to formal verification of protocol security. The academic community was invited to study the protocol and responded with more than 5 independent studies. The open process gives assurance that the protocol is sound.

Screenshot 2024-06-03 at 16.22.11

EDHOC is already widely implemented. Optimized implementations for microcontrollers exist in Rust and in C, and in Java for non-constrained systems. Implementations have been interop-tested through several interop events organized by the LAKE working group. More implementation effort is always welcome and any feedback should be communicated to the LAKE working group, which is continuing the maintenance of EDHOC by compiling implementation experience, defining application profiles and adding security applications through the integration point defined by the base protocol.


Share this page