< draft-kaliski-pkcs5-v2-00.txt   draft-kaliski-pkcs5-v2-01.txt >
RSA Laboratories B. Kaliski RSA Laboratories B. Kaliski
Internet Draft Security Dynamics Internet Draft Security Dynamics
Expires December 1999 June 1999 Expires December 1999 June 1999
Password-Based Cryptography Standard Password-Based Cryptography Specification
PKCS #5 v2.0 PKCS #5 v2.0
<draft-kaliski-pkcs5-v2-00.txt> <draft-kaliski-pkcs5-v2-01.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026 except that the right to all provisions of Section 10 of RFC2026 except that the right to
produce derivative works is not granted.. Internet-Drafts are produce derivative works is not granted.. Internet-Drafts are
working documents of the Internet Engineering Task Force (IETF), its working documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts. distribute working documents as Internet-Drafts.
skipping to change at page 3, line 13 skipping to change at page 3, line 13
D Intellectual Property Considerations ......................... 28 D Intellectual Property Considerations ......................... 28
Table of Contents Table of Contents
E Revision History ............................................. 28 E Revision History ............................................. 28
E.1 Versions 1.0-1.3 ........................................ 28 E.1 Versions 1.0-1.3 ........................................ 28
E.2 Version 1.4 ............................................. 28 E.2 Version 1.4 ............................................. 28
E.3 Version 1.5 ............................................. 28 E.3 Version 1.5 ............................................. 28
E.4 Version 2.0 ............................................. 29 E.4 Version 2.0 ............................................. 29
F References ................................................... 29 F References ................................................... 29
G About PKCS ................................................... 31 G Contact Information & About PKCS ............................. 31
1. Introduction 1. Introduction
This document provides recommendations for the implementation of This document provides recommendations for the implementation of
password-based cryptography, covering the following aspects: password-based cryptography, covering the following aspects:
- key derivation functions - key derivation functions
- encryption schemes - encryption schemes
- message-authentication schemes - message-authentication schemes
- ASN.1 syntax identifying the techniques - ASN.1 syntax identifying the techniques
skipping to change at page 28, line 26 skipping to change at page 28, line 26
RSA Data Security makes no patent claims on the general constructions RSA Data Security makes no patent claims on the general constructions
described in this document, although specific underlying techniques described in this document, although specific underlying techniques
may be covered. Among the underlying techniques, the RC5 encryption may be covered. Among the underlying techniques, the RC5 encryption
algorithm (Appendix B.2.4) is protected by U.S. Patents 5,724,428 algorithm (Appendix B.2.4) is protected by U.S. Patents 5,724,428
[22] and 5,835,600 [23]. [22] and 5,835,600 [23].
RC2 and RC5 are trademarks of RSA Data Security. RC2 and RC5 are trademarks of RSA Data Security.
License to copy this document is granted provided that it is License to copy this document is granted provided that it is
identified as ôRSA Data Security, Inc. Public-Key Cryptography identified as RSA Data Security, Inc. Public-Key Cryptography
Standards (PKCS)ö in all material mentioning or referencing this Standards (PKCS) in all material mentioning or referencing this
document. document.
RSA Data Security makes no representations regarding intellectual RSA Data Security makes no representations regarding intellectual
property claims by other parties. Such determination is the property claims by other parties. Such determination is the
responsibility of the user. responsibility of the user.
E. Revision history E. Revision history
Versions 1.0-1.3 Versions 1.0-1.3
skipping to change at page 31, line 5 skipping to change at page 31, line 5
[25] RSA Laboratories. PKCS #8: Private-Key Information Syntax Standard. [25] RSA Laboratories. PKCS #8: Private-Key Information Syntax Standard.
Version 1.2, November 1993. Version 1.2, November 1993.
[26] T. Wu. The Secure Remote Password protocol. In Proceedings of the [26] T. Wu. The Secure Remote Password protocol. In Proceedings of the
1998 Internet Society Network and Distributed System Security 1998 Internet Society Network and Distributed System Security
Symposium, pages 97-111, Internet Society, 1998. Symposium, pages 97-111, Internet Society, 1998.
[27] F. Yergeau. RFC 2279: UTF-8, a Transformation Format of ISO 10646. [27] F. Yergeau. RFC 2279: UTF-8, a Transformation Format of ISO 10646.
IETF, January 1998. IETF, January 1998.
G. About PKCS G. Contact Information & About PKCS
The Public-Key Cryptography Standards are specifications produced by The Public-Key Cryptography Standards are specifications produced by
RSA Laboratories in cooperation with secure systems developers RSA Laboratories in cooperation with secure systems developers
worldwide for the purpose of accelerating the deployment of worldwide for the purpose of accelerating the deployment of
public-key cryptography. First published in 1991 as a result of public-key cryptography. First published in 1991 as a result of
meetings with a small group of early adopters of public-key meetings with a small group of early adopters of public-key
technology, the PKCS documents have become widely referenced and technology, the PKCS documents have become widely referenced and
implemented. Contributions from the PKCS series have become part of implemented. Contributions from the PKCS series have become part of
many formal and de facto standards, including ANSI X9 documents, many formal and de facto standards, including ANSI X9 documents,
PKIX, SET, S/MIME, and SSL. PKIX, SET, S/MIME, and SSL.
 End of changes. 5 change blocks. 
6 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/