| < draft-kaliski-pkcs5-v2-00.txt | draft-kaliski-pkcs5-v2-01.txt > | |||
|---|---|---|---|---|
| RSA Laboratories B. Kaliski | RSA Laboratories B. Kaliski | |||
| Internet Draft Security Dynamics | Internet Draft Security Dynamics | |||
| Expires December 1999 June 1999 | Expires December 1999 June 1999 | |||
| Password-Based Cryptography Standard | Password-Based Cryptography Specification | |||
| PKCS #5 v2.0 | PKCS #5 v2.0 | |||
| <draft-kaliski-pkcs5-v2-00.txt> | <draft-kaliski-pkcs5-v2-01.txt> | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026 except that the right to | all provisions of Section 10 of RFC2026 except that the right to | |||
| produce derivative works is not granted.. Internet-Drafts are | produce derivative works is not granted.. Internet-Drafts are | |||
| working documents of the Internet Engineering Task Force (IETF), its | working documents of the Internet Engineering Task Force (IETF), its | |||
| areas, and its working groups. Note that other groups may also | areas, and its working groups. Note that other groups may also | |||
| distribute working documents as Internet-Drafts. | distribute working documents as Internet-Drafts. | |||
| skipping to change at page 3, line 13 ¶ | skipping to change at page 3, line 13 ¶ | |||
| D Intellectual Property Considerations ......................... 28 | D Intellectual Property Considerations ......................... 28 | |||
| Table of Contents | Table of Contents | |||
| E Revision History ............................................. 28 | E Revision History ............................................. 28 | |||
| E.1 Versions 1.0-1.3 ........................................ 28 | E.1 Versions 1.0-1.3 ........................................ 28 | |||
| E.2 Version 1.4 ............................................. 28 | E.2 Version 1.4 ............................................. 28 | |||
| E.3 Version 1.5 ............................................. 28 | E.3 Version 1.5 ............................................. 28 | |||
| E.4 Version 2.0 ............................................. 29 | E.4 Version 2.0 ............................................. 29 | |||
| F References ................................................... 29 | F References ................................................... 29 | |||
| G About PKCS ................................................... 31 | G Contact Information & About PKCS ............................. 31 | |||
| 1. Introduction | 1. Introduction | |||
| This document provides recommendations for the implementation of | This document provides recommendations for the implementation of | |||
| password-based cryptography, covering the following aspects: | password-based cryptography, covering the following aspects: | |||
| - key derivation functions | - key derivation functions | |||
| - encryption schemes | - encryption schemes | |||
| - message-authentication schemes | - message-authentication schemes | |||
| - ASN.1 syntax identifying the techniques | - ASN.1 syntax identifying the techniques | |||
| skipping to change at page 28, line 26 ¶ | skipping to change at page 28, line 26 ¶ | |||
| RSA Data Security makes no patent claims on the general constructions | RSA Data Security makes no patent claims on the general constructions | |||
| described in this document, although specific underlying techniques | described in this document, although specific underlying techniques | |||
| may be covered. Among the underlying techniques, the RC5 encryption | may be covered. Among the underlying techniques, the RC5 encryption | |||
| algorithm (Appendix B.2.4) is protected by U.S. Patents 5,724,428 | algorithm (Appendix B.2.4) is protected by U.S. Patents 5,724,428 | |||
| [22] and 5,835,600 [23]. | [22] and 5,835,600 [23]. | |||
| RC2 and RC5 are trademarks of RSA Data Security. | RC2 and RC5 are trademarks of RSA Data Security. | |||
| License to copy this document is granted provided that it is | License to copy this document is granted provided that it is | |||
| identified as ôRSA Data Security, Inc. Public-Key Cryptography | identified as RSA Data Security, Inc. Public-Key Cryptography | |||
| Standards (PKCS)ö in all material mentioning or referencing this | Standards (PKCS) in all material mentioning or referencing this | |||
| document. | document. | |||
| RSA Data Security makes no representations regarding intellectual | RSA Data Security makes no representations regarding intellectual | |||
| property claims by other parties. Such determination is the | property claims by other parties. Such determination is the | |||
| responsibility of the user. | responsibility of the user. | |||
| E. Revision history | E. Revision history | |||
| Versions 1.0-1.3 | Versions 1.0-1.3 | |||
| skipping to change at page 31, line 5 ¶ | skipping to change at page 31, line 5 ¶ | |||
| [25] RSA Laboratories. PKCS #8: Private-Key Information Syntax Standard. | [25] RSA Laboratories. PKCS #8: Private-Key Information Syntax Standard. | |||
| Version 1.2, November 1993. | Version 1.2, November 1993. | |||
| [26] T. Wu. The Secure Remote Password protocol. In Proceedings of the | [26] T. Wu. The Secure Remote Password protocol. In Proceedings of the | |||
| 1998 Internet Society Network and Distributed System Security | 1998 Internet Society Network and Distributed System Security | |||
| Symposium, pages 97-111, Internet Society, 1998. | Symposium, pages 97-111, Internet Society, 1998. | |||
| [27] F. Yergeau. RFC 2279: UTF-8, a Transformation Format of ISO 10646. | [27] F. Yergeau. RFC 2279: UTF-8, a Transformation Format of ISO 10646. | |||
| IETF, January 1998. | IETF, January 1998. | |||
| G. About PKCS | G. Contact Information & About PKCS | |||
| The Public-Key Cryptography Standards are specifications produced by | The Public-Key Cryptography Standards are specifications produced by | |||
| RSA Laboratories in cooperation with secure systems developers | RSA Laboratories in cooperation with secure systems developers | |||
| worldwide for the purpose of accelerating the deployment of | worldwide for the purpose of accelerating the deployment of | |||
| public-key cryptography. First published in 1991 as a result of | public-key cryptography. First published in 1991 as a result of | |||
| meetings with a small group of early adopters of public-key | meetings with a small group of early adopters of public-key | |||
| technology, the PKCS documents have become widely referenced and | technology, the PKCS documents have become widely referenced and | |||
| implemented. Contributions from the PKCS series have become part of | implemented. Contributions from the PKCS series have become part of | |||
| many formal and de facto standards, including ANSI X9 documents, | many formal and de facto standards, including ANSI X9 documents, | |||
| PKIX, SET, S/MIME, and SSL. | PKIX, SET, S/MIME, and SSL. | |||
| End of changes. 5 change blocks. | ||||
| 6 lines changed or deleted | 6 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||