<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NRF9160 PSK Cipher-Suites in modem and TLS 1.3</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/113552/nrf9160-psk-cipher-suites-in-modem-and-tls-1-3</link><description>Hello, 
 the BSI (German Federal Office for Information Security) released a document February this year which contains a list for recommended cipher suites and TLS versions: 
 BSI TR-02102-2: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 31 Jul 2024 15:55:47 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/113552/nrf9160-psk-cipher-suites-in-modem-and-tls-1-3" /><item><title>RE: NRF9160 PSK Cipher-Suites in modem and TLS 1.3</title><link>https://devzone.nordicsemi.com/thread/496449?ContentTypeID=1</link><pubDate>Wed, 31 Jul 2024 15:55:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:38b04c72-5352-419c-bd63-0c8f11bbfd0d</guid><dc:creator>Achim Kraus</dc:creator><description>&lt;p&gt;The usage of TLS_ECDHE_PSK requires ECC calculations and therefore using TLS_ECDHE_ECDSA requires not that more calculations. The pain may be using x509, if RawPublicKey (RFC 7250) isn&amp;#39;t supported (AFAIK mbedtls doesn&amp;#39;t support it).&lt;/p&gt;
&lt;p&gt;With RPK and an efficient ECC implementation (either hw or micro-ecc) using TLS_ECDHE_ECDSA is pretty well (see Eclipse/tinydtls&amp;nbsp; and Eclipse/Californium). UDP payload handshake all together about 1225 bytes, time for handshake 1s (nRF9160, micro_ecc), and with DTLS 1.2 CID, that is only required once for a &amp;quot;pretty long time&amp;quot;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: NRF9160 PSK Cipher-Suites in modem and TLS 1.3</title><link>https://devzone.nordicsemi.com/thread/496439?ContentTypeID=1</link><pubDate>Wed, 31 Jul 2024 14:35:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e6c136d4-e01a-4250-a3e7-8c3bf7d1e807</guid><dc:creator>dejans</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
[quote user=""]Are there any plans to add more cipher suites to the modem firmware of the NRF9160 in the future?&amp;nbsp;Especially of interest are cipher suites that are recommended to be used up to 2030+. Are there any timelines for future modem firmware releases?[/quote]
&lt;p&gt;For future plans, modem releases and timelines please contact your regional sales manager.&lt;/p&gt;
[quote user=""]Are there any plans to add support for TLS 1.3 to the modem firmware and/or to zephyr (e.g. with mbedTLS) in the future, in case usage of TLS 1.2 will not be recommended anymore in a few years?[/quote]
&lt;p&gt;Maybe you can get this information by asking in the Zephyr Discord channel directly (visit &lt;a href="https://www.zephyrproject.org/community/"&gt;Zephyr community&lt;/a&gt;&amp;nbsp;and go to Community-&amp;gt;Connect with Zephyr-&amp;gt;Discord). Otherwise, please contact your regional sales manager regarding future support for TLS v1.3.&lt;br /&gt;&lt;br /&gt;Best regards,&lt;br /&gt;Dejan&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>