| < draft-ietf-tls-rfc4492bis-10.txt | draft-ietf-tls-rfc4492bis-11.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 13 ¶ | skipping to change at page 1, line 13 ¶ | |||
| TLS Working Group Y. Nir | TLS Working Group Y. Nir | |||
| Internet-Draft Check Point | Internet-Draft Check Point | |||
| Obsoletes: 4492 (if approved) S. Josefsson | Obsoletes: 4492 (if approved) S. Josefsson | |||
| Intended status: Standards Track SJD AB | Intended status: Standards Track SJD AB | |||
| Expires: July 15, 2017 M. Pegourie-Gonnard | Expires: July 15, 2017 M. Pegourie-Gonnard | |||
| Independent / PolarSSL | Independent / PolarSSL | |||
| January 11, 2017 | January 11, 2017 | |||
| Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer | Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer | |||
| Security (TLS) Versions 1.2 and Earlier | Security (TLS) Versions 1.2 and Earlier | |||
| draft-ietf-tls-rfc4492bis-10 | draft-ietf-tls-rfc4492bis-11 | |||
| Abstract | Abstract | |||
| This document describes key exchange algorithms based on Elliptic | This document describes key exchange algorithms based on Elliptic | |||
| Curve Cryptography (ECC) for the Transport Layer Security (TLS) | Curve Cryptography (ECC) for the Transport Layer Security (TLS) | |||
| protocol. In particular, it specifies the use of Ephemeral Elliptic | protocol. In particular, it specifies the use of Ephemeral Elliptic | |||
| Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the | Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the | |||
| use of Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards | use of Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards | |||
| Digital Signature Algorithm (EdDSA) as authentication mechanisms. | Digital Signature Algorithm (EdDSA) as authentication mechanisms. | |||
| skipping to change at page 24, line 25 ¶ | skipping to change at page 24, line 25 ¶ | |||
| algorithm wih no hashing (EdDSA will internally run the data through | algorithm wih no hashing (EdDSA will internally run the data through | |||
| the PH function). | the PH function). | |||
| RFC 4492 anticipated the standardization of a mechanism for | RFC 4492 anticipated the standardization of a mechanism for | |||
| specifying the required hash function in the certificate, perhaps in | specifying the required hash function in the certificate, perhaps in | |||
| the parameters field of the subjectPublicKeyInfo. Such | the parameters field of the subjectPublicKeyInfo. Such | |||
| standardization never took place, and as a result, SHA-1 is used in | standardization never took place, and as a result, SHA-1 is used in | |||
| TLS 1.1 and earlier (except for EdDSA, which uses identity function). | TLS 1.1 and earlier (except for EdDSA, which uses identity function). | |||
| TLS 1.2 added a SignatureAndHashAlgorithm parameter to the | TLS 1.2 added a SignatureAndHashAlgorithm parameter to the | |||
| DigitallySigned struct, thus allowing agility in choosing the | DigitallySigned struct, thus allowing agility in choosing the | |||
| signature hash. EdDSA signatures MUST have HashAlgorithm of 0 | signature hash. EdDSA signatures MUST have HashAlgorithm of TBD5 | |||
| (None). | (Intrinsic). | |||
| All RSA signatures must be generated and verified according to | All RSA signatures must be generated and verified according to | |||
| [PKCS1] block type 1. | [PKCS1] block type 1. | |||
| 5.11. Public Key Validation | 5.11. Public Key Validation | |||
| With the NIST curves, each party must validate the public key sent by | With the NIST curves, each party must validate the public key sent by | |||
| its peer. A receiving party MUST check that the x and y parameters | its peer. A receiving party MUST check that the x and y parameters | |||
| from the peer's public value satisfy the curve equation, y^2 = x^3 + | from the peer's public value satisfy the curve equation, y^2 = x^3 + | |||
| ax + b mod p. See section 2.3 of [Menezes] for details. Failing to | ax + b mod p. See section 2.3 of [Menezes] for details. Failing to | |||
| End of changes. 2 change blocks. | ||||
| 3 lines changed or deleted | 3 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||