< draft-housley-aes-key-wrap-with-pad-01.txt   draft-housley-aes-key-wrap-with-pad-02.txt >
INTERNET DRAFT R. Housley INTERNET DRAFT R. Housley
Intended Status: Informational Vigil Security Intended Status: Informational Vigil Security
M. Dworkin M. Dworkin
NIST NIST
Expires: 23 August 2009 23 February 2009 Expires: 24 September 2009 24 March 2009
Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm
<draft-housley-aes-key-wrap-with-pad-01.txt> <draft-housley-aes-key-wrap-with-pad-02.txt>
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts. groups may also distribute working documents as Internet-Drafts.
skipping to change at page 5, line 45 skipping to change at page 5, line 45
support these protocols, the AES Key Wrap with Padding algorithm has support these protocols, the AES Key Wrap with Padding algorithm has
been assigned the following algorithm identifiers, one for each AES been assigned the following algorithm identifiers, one for each AES
KEK size. The AES Key Wrap (without padding) algorithm identifiers KEK size. The AES Key Wrap (without padding) algorithm identifiers
are also included here for convenience. are also included here for convenience.
aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
us(840) organization(1) gov(101) csor(3) us(840) organization(1) gov(101) csor(3)
nistAlgorithm(4) 1 } nistAlgorithm(4) 1 }
id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 } id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 }
id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes TBD } id-aes128-wrap-pad OBJECT IDENTIFIER ::= { aes 8 }
id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 } id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 }
id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes TBD } id-aes192-wrap-pad OBJECT IDENTIFIER ::= { aes 28 }
id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 } id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 }
id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes TBD } id-aes256-wrap-pad OBJECT IDENTIFIER ::= { aes 48 }
In all cases, the AlgorithmIdentifier parameter field must be absent. In all cases, the AlgorithmIdentifier parameter field must be absent.
6. Padded Key Wrap Example 6. Padded Key Wrap Example
The example in this section was generated using the index-based The example in this section was generated using the index-based
implementation of the AES Key Wrap algorithm along with the padding implementation of the AES Key Wrap algorithm along with the padding
approach specified in Section 4 of this document. The example wraps approach specified in Section 4 of this document. The example wraps
20 octets of Key Data with a 192-bit KEK. All values are shown in 20 octets of Key Data with a 192-bit KEK. All values are shown in
hexadecimal. hexadecimal.
 End of changes. 5 change blocks. 
5 lines changed or deleted 5 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/