| < draft-kaliski-pkcs5-v2-02.txt | draft-kaliski-pkcs5-v2-03.txt > | |||
|---|---|---|---|---|
| INTERNET-DRAFT B. Kaliski | INTERNET-DRAFT B. Kaliski | |||
| Expires: May 2000 RSA Laboratories | Expires: August 2000 RSA Laboratories | |||
| Intended Category: Informational November 1999 | Intended Category: Informational February 2000 | |||
| Password-Based Cryptography Specification | Password-Based Cryptography Specification | |||
| PKCS #5 v2.0 | PKCS #5 v2.0 | |||
| <draft-kaliski-pkcs5-v2-02.txt> | <draft-kaliski-pkcs5-v2-03.txt> | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026 except that the right to | all provisions of Section 10 of RFC2026 except that the right to | |||
| produce derivative works is not granted. Internet-Drafts are working | produce derivative works is not granted. This document represents a | |||
| documents of the Internet Engineering Task Force (IETF), its areas, | republication of PKCS#5 v 2.0 from RSA Laboratories' Public-Key | |||
| and its working groups. Note that other groups may also distribute | Cryptography Standards (PKCS) series, and change control is retained | |||
| working documents as Internet-Drafts. | within the PKCS process. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF), its areas, and its working groups. Note that other | ||||
| groups may also distribute working documents as Internet-Drafts. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| skipping to change at page 2, line 40 ¶ | skipping to change at page 2, line 45 ¶ | |||
| Appendices | Appendices | |||
| A ASN.1 Syntax ................................................. 18 | A ASN.1 Syntax ................................................. 18 | |||
| A.1 PBKDF1 .................................................. 18 | A.1 PBKDF1 .................................................. 18 | |||
| A.2 PBKDF2 .................................................. 18 | A.2 PBKDF2 .................................................. 18 | |||
| A.3 PBES1 ................................................... 20 | A.3 PBES1 ................................................... 20 | |||
| A.4 PBES2 ................................................... 20 | A.4 PBES2 ................................................... 20 | |||
| A.5 PBMAC1 .................................................. 21 | A.5 PBMAC1 .................................................. 21 | |||
| B Supporting Techniques ........................................ 22 | B Supporting Techniques ........................................ 22 | |||
| B.1 Pseudorandom Functions .................................. 22 | B.1 Pseudorandom Functions .................................. 22 | |||
| B.1.1 HMAC-SHA-1 ....................................... 22 | ||||
| B.2 Encryption Schemes ...................................... 23 | B.2 Encryption Schemes ...................................... 23 | |||
| B.2.1 DES-CBC-Pad ...................................... 23 | ||||
| B.2.2 DES-EDE3-CBC-Pad ................................. 24 | ||||
| B.2.3 RC2-CBC-Pad ...................................... 24 | ||||
| B.2.4 RC5-CBC-Pad ...................................... 25 | ||||
| B.3 Message Authentication Schemes .......................... 26 | B.3 Message Authentication Schemes .......................... 26 | |||
| B.3.1 HMAC-SHA-1 ....................................... 26 | ||||
| C ASN.1 Module ................................................. 26 | C ASN.1 Module ................................................. 26 | |||
| D Intellectual Property Considerations ......................... 30 | D Intellectual Property Considerations ......................... 30 | |||
| E Revision History ............................................. 30 | E Revision History ............................................. 30 | |||
| F References ................................................... 31 | F References ................................................... 31 | |||
| G Contact Information & About PKCS ............................. 33 | G Contact Information & About PKCS ............................. 33 | |||
| 1. Introduction | 1. Introduction | |||
| This document provides recommendations for the implementation of | This document provides recommendations for the implementation of | |||
| password-based cryptography, covering the following aspects: | password-based cryptography, covering the following aspects: | |||
| End of changes. 6 change blocks. | ||||
| 13 lines changed or deleted | 11 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||