keyDerivation issues

Hello, we'd like to have some clarifications about the key derivation
process (partly related to the issues 35 [1] and 36 [2]):

* What is the output of deriveKey supposed to be? I know you can choose
  to generate a key with the derivedKeyType parameter (e.g. AES-CBC),
  but is it possible to have the raw output of the operation, i.e.
  exponentiation for classic DH and multiplication for ECDH? Do you
  plan to enforce some kind of hash pass before returning the key?
  In our algorithms (FHMQV [3] and Boudot's solution for SMP [4]) we
  use EC multiplication quite frequently and being able to have a native
  implementation would be very useful.
* Is it always possible to export a private/symmetric key?

Alessandro Di Federico

[1] https://www.w3.org/2012/webcrypto/track/issues/35
[2] https://www.w3.org/2012/webcrypto/track/issues/36
[3] http://eprint.iacr.org/2009/408.pdf
[4] http://www.win.tue.nl/~berry/papers/dam.pdf

Received on Friday, 26 July 2013 12:47:16 UTC