< draft-kaliski-pkcs5-v2-02.txt   draft-kaliski-pkcs5-v2-03.txt >
INTERNET-DRAFT B. Kaliski INTERNET-DRAFT B. Kaliski
Expires: May 2000 RSA Laboratories Expires: August 2000 RSA Laboratories
Intended Category: Informational November 1999 Intended Category: Informational February 2000
Password-Based Cryptography Specification Password-Based Cryptography Specification
PKCS #5 v2.0 PKCS #5 v2.0
<draft-kaliski-pkcs5-v2-02.txt> <draft-kaliski-pkcs5-v2-03.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026 except that the right to all provisions of Section 10 of RFC2026 except that the right to
produce derivative works is not granted. Internet-Drafts are working produce derivative works is not granted. This document represents a
documents of the Internet Engineering Task Force (IETF), its areas, republication of PKCS#5 v 2.0 from RSA Laboratories' Public-Key
and its working groups. Note that other groups may also distribute Cryptography Standards (PKCS) series, and change control is retained
working documents as Internet-Drafts. within the PKCS process.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
skipping to change at page 2, line 40 skipping to change at page 2, line 45
Appendices Appendices
A ASN.1 Syntax ................................................. 18 A ASN.1 Syntax ................................................. 18
A.1 PBKDF1 .................................................. 18 A.1 PBKDF1 .................................................. 18
A.2 PBKDF2 .................................................. 18 A.2 PBKDF2 .................................................. 18
A.3 PBES1 ................................................... 20 A.3 PBES1 ................................................... 20
A.4 PBES2 ................................................... 20 A.4 PBES2 ................................................... 20
A.5 PBMAC1 .................................................. 21 A.5 PBMAC1 .................................................. 21
B Supporting Techniques ........................................ 22 B Supporting Techniques ........................................ 22
B.1 Pseudorandom Functions .................................. 22 B.1 Pseudorandom Functions .................................. 22
B.1.1 HMAC-SHA-1 ....................................... 22
B.2 Encryption Schemes ...................................... 23 B.2 Encryption Schemes ...................................... 23
B.2.1 DES-CBC-Pad ...................................... 23
B.2.2 DES-EDE3-CBC-Pad ................................. 24
B.2.3 RC2-CBC-Pad ...................................... 24
B.2.4 RC5-CBC-Pad ...................................... 25
B.3 Message Authentication Schemes .......................... 26 B.3 Message Authentication Schemes .......................... 26
B.3.1 HMAC-SHA-1 ....................................... 26
C ASN.1 Module ................................................. 26 C ASN.1 Module ................................................. 26
D Intellectual Property Considerations ......................... 30 D Intellectual Property Considerations ......................... 30
E Revision History ............................................. 30 E Revision History ............................................. 30
F References ................................................... 31 F References ................................................... 31
G Contact Information & About PKCS ............................. 33 G Contact Information & About PKCS ............................. 33
1. Introduction 1. Introduction
This document provides recommendations for the implementation of This document provides recommendations for the implementation of
password-based cryptography, covering the following aspects: password-based cryptography, covering the following aspects:
 End of changes. 6 change blocks. 
13 lines changed or deleted 11 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/