| < draft-ietf-smime-3278bis-06.txt | draft-ietf-smime-3278bis-07.txt > | |||
|---|---|---|---|---|
| S/MIME WG Sean Turner, IECA | S/MIME WG Sean Turner, IECA | |||
| Internet Draft Dan Brown, Certicom | Internet Draft Dan Brown, Certicom | |||
| Intended Status: Informational April 14, 2009 | Intended Status: Informational May 5, 2009 | |||
| Obsoletes: 3278 (once approved) | Obsoletes: 3278 (once approved) | |||
| Expires: October 14, 2009 | Expires: November 5, 2009 | |||
| Use of Elliptic Curve Cryptography (ECC) Algorithms | Use of Elliptic Curve Cryptography (ECC) Algorithms | |||
| in Cryptographic Message Syntax (CMS) | in Cryptographic Message Syntax (CMS) | |||
| draft-ietf-smime-3278bis-06.txt | draft-ietf-smime-3278bis-07.txt | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
| provisions of BCP 78 and BCP 79. This document may contain material | provisions of BCP 78 and BCP 79. This document may contain material | |||
| from IETF Documents or IETF Contributions published or made publicly | from IETF Documents or IETF Contributions published or made publicly | |||
| available before November 10, 2008. The person(s) controlling the | available before November 10, 2008. The person(s) controlling the | |||
| copyright in some of this material may not have granted the IETF | copyright in some of this material may not have granted the IETF | |||
| Trust the right to allow modifications of such material outside the | Trust the right to allow modifications of such material outside the | |||
| IETF Standards Process. Without obtaining an adequate license from | IETF Standards Process. Without obtaining an adequate license from | |||
| skipping to change at page 1, line 43 ¶ | skipping to change at page 1, line 43 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
| This Internet-Draft will expire on October 14, 2009. | This Internet-Draft will expire on November 5, 2009. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2009 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents in effect on the date of | |||
| publication of this document (http://trustee.ietf.org/license-info). | publication of this document (http://trustee.ietf.org/license-info). | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 3, line 16 ¶ | skipping to change at page 3, line 16 ¶ | |||
| 9. Security Considerations.......................................28 | 9. Security Considerations.......................................28 | |||
| 10. IANA Considerations..........................................33 | 10. IANA Considerations..........................................33 | |||
| 11. References...................................................33 | 11. References...................................................33 | |||
| 11.1. Normative...............................................33 | 11.1. Normative...............................................33 | |||
| 11.2. Informative.............................................35 | 11.2. Informative.............................................35 | |||
| Appendix A ASN.1 Modules.........................................36 | Appendix A ASN.1 Modules.........................................36 | |||
| Appendix A.1 1988 ASN.1 Module................................36 | Appendix A.1 1988 ASN.1 Module................................36 | |||
| Appendix A.2 2004 ASN.1 Module................................43 | Appendix A.2 2004 ASN.1 Module................................43 | |||
| Appendix B Changes since RFC 3278................................53 | Appendix B Changes since RFC 3278................................53 | |||
| Acknowledgements.................................................56 | Acknowledgements.................................................56 | |||
| Authors' Addresses...............................................56 | Author's Addresses...............................................56 | |||
| 1. Introduction | 1. Introduction | |||
| The Cryptographic Message Syntax (CMS) is cryptographic algorithm | The Cryptographic Message Syntax (CMS) is cryptographic algorithm | |||
| independent. This specification defines a profile for the use of | independent. This specification defines a profile for the use of | |||
| Elliptic Curve Cryptography (ECC) public key algorithms in the CMS. | Elliptic Curve Cryptography (ECC) public key algorithms in the CMS. | |||
| The ECC algorithms are incorporated into the following CMS content | The ECC algorithms are incorporated into the following CMS content | |||
| types: | types: | |||
| - 'SignedData' to support ECC-based digital signature methods | - 'SignedData' to support ECC-based digital signature methods | |||
| skipping to change at page 14, line 33 ¶ | skipping to change at page 14, line 33 ¶ | |||
| key agreement, KDF is key derivation function, and Wrap is key wrap | key agreement, KDF is key derivation function, and Wrap is key wrap | |||
| algorithm): | algorithm): | |||
| KA=ECDH standard KDF=SHA-1 Wrap=Triple-DES | KA=ECDH standard KDF=SHA-1 Wrap=Triple-DES | |||
| 30 1c 06 09 2b 81 05 10 86 48 3f 00 02 30 0f 06 0b 2a 86 48 86 | 30 1c 06 09 2b 81 05 10 86 48 3f 00 02 30 0f 06 0b 2a 86 48 86 | |||
| f7 0d 01 09 10 03 06 05 00 | f7 0d 01 09 10 03 06 05 00 | |||
| KA=ECDH standard KDF=SHA-224 Wrap=Triple-DES | KA=ECDH standard KDF=SHA-224 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0B 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0B 00 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH standard KDF=SHA-256 Wrap=Triple-DES | KA=ECDH standard KDF=SHA-256 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0B 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0B 01 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH standard KDF=SHA-384 Wrap=Triple-DES | KA=ECDH standard KDF=SHA-384 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0B 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0B 02 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH standard KDF=SHA-512 Wrap=Triple-DES | KA=ECDH standard KDF=SHA-512 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0B 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0B 03 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH standard KDF=SHA-1 Wrap=AES-128 | KA=ECDH standard KDF=SHA-1 Wrap=AES-128 | |||
| 30 18 06 09 2b 81 05 10 86 48 3f 00 02 30 0b 06 09 60 86 48 01 | 30 18 06 09 2b 81 05 10 86 48 3f 00 02 30 0b 06 09 60 86 48 01 | |||
| 65 03 04 01 05 | 65 03 04 01 05 | |||
| KA=ECDH standard KDF=SHA-224 Wrap=AES-128 | KA=ECDH standard KDF=SHA-224 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0B 00 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0B 00 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 05 | 01 05 | |||
| skipping to change at page 16, line 42 ¶ | skipping to change at page 16, line 42 ¶ | |||
| 30 15 06 06 2b 81 04 01 0B 03 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0B 03 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 2D | 01 2D | |||
| KA=ECDH cofactor KDF=SHA-1 Wrap=Triple-DES | KA=ECDH cofactor KDF=SHA-1 Wrap=Triple-DES | |||
| 30 1c 06 09 2b 81 05 10 86 48 3f 00 03 30 0f 06 0b 2a 86 48 86 | 30 1c 06 09 2b 81 05 10 86 48 3f 00 03 30 0f 06 0b 2a 86 48 86 | |||
| f7 0d 01 09 10 03 06 05 00 | f7 0d 01 09 10 03 06 05 00 | |||
| KA=ECDH cofactor KDF=SHA-224 Wrap=Triple-DES | KA=ECDH cofactor KDF=SHA-224 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0E 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0E 00 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH cofactor KDF=SHA-256 Wrap=Triple-DES | KA=ECDH cofactor KDF=SHA-256 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0E 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0E 01 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH cofactor KDF=SHA-384 Wrap=Triple-DES | KA=ECDH cofactor KDF=SHA-384 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0E 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0E 02 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH cofactor KDF=SHA-512 Wrap=Triple-DES | KA=ECDH cofactor KDF=SHA-512 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0E 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0E 03 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECDH cofactor KDF=SHA-1 Wrap=AES-128 | KA=ECDH cofactor KDF=SHA-1 Wrap=AES-128 | |||
| 30 18 06 09 2b 81 05 10 86 48 3f 00 03 30 0b 06 09 60 86 48 01 | 30 18 06 09 2b 81 05 10 86 48 3f 00 03 30 0b 06 09 60 86 48 01 | |||
| 65 03 04 01 05 | 65 03 04 01 05 | |||
| KA=ECDH cofactor KDF=SHA-224 Wrap=AES-128 | KA=ECDH cofactor KDF=SHA-224 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0E 00 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0E 00 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 05 | 01 05 | |||
| skipping to change at page 19, line 7 ¶ | skipping to change at page 19, line 7 ¶ | |||
| 30 15 06 06 2b 81 04 01 0E 03 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0E 03 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 2D | 01 2D | |||
| KA=ECMQV 1-Pass KDF=SHA-1 Wrap=Triple-DES | KA=ECMQV 1-Pass KDF=SHA-1 Wrap=Triple-DES | |||
| 30 1c 06 09 2b 81 05 10 86 48 3f 00 10 30 0f 06 0b 2a 86 48 86 | 30 1c 06 09 2b 81 05 10 86 48 3f 00 10 30 0f 06 0b 2a 86 48 86 | |||
| f7 0d 01 09 10 03 06 05 00 | f7 0d 01 09 10 03 06 05 00 | |||
| KA=ECMQV 1-Pass KDF=SHA-224 Wrap=Triple-DES | KA=ECMQV 1-Pass KDF=SHA-224 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0F 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0F 00 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECMQV 1-Pass KDF=SHA-256 Wrap=Triple-DES | KA=ECMQV 1-Pass KDF=SHA-256 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0F 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0F 01 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECMQV 1-Pass KDF=SHA-384 Wrap=Triple-DES | KA=ECMQV 1-Pass KDF=SHA-384 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0F 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0F 02 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECMQV 1-Pass KDF=SHA-512 Wrap=Triple-DES | KA=ECMQV 1-Pass KDF=SHA-512 Wrap=Triple-DES | |||
| 30 19 06 06 2b 81 04 01 0F 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 | 30 17 06 06 2b 81 04 01 0F 03 30 0d 06 0b 2a 86 48 86 f7 0d 01 | |||
| 09 10 03 06 05 00 | 09 10 03 06 | |||
| KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-128 | KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-128 | |||
| 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 | 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 | |||
| 65 03 04 01 05 | 65 03 04 01 05 | |||
| KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-128 | KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 05 | 01 05 | |||
| KA=ECMQV 1-Pass KDF=SHA-256 Wrap=AES-128 | KA=ECMQV 1-Pass KDF=SHA-256 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0F 01 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0F 01 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 05 | 01 05 | |||
| KA=ECMQV 1-Pass KDF=SHA-384 Wrap=AES-128 | KA=ECMQV 1-Pass KDF=SHA-384 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0F 02 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0F 02 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 05 05 00 | 01 05 | |||
| KA=ECMQV 1-Pass KDF=SHA-512 Wrap=AES-128 | KA=ECMQV 1-Pass KDF=SHA-512 Wrap=AES-128 | |||
| 30 15 06 06 2b 81 04 01 0F 03 30 0d 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0F 03 30 0d 06 09 60 86 48 01 65 03 04 | |||
| 01 05 05 00 | 01 05 | |||
| KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-192 | KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-192 | |||
| 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 | 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 | |||
| 65 03 04 01 19 | 65 03 04 01 19 | |||
| KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-192 | KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-192 | |||
| 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 | 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 | |||
| 01 19 | 01 19 | |||
| End of changes. 19 change blocks. | ||||
| 31 lines changed or deleted | 31 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||