< draft-moriarty-pkcs1-02.txt   draft-moriarty-pkcs1-03.txt >
skipping to change at page 1, line 14 skipping to change at page 1, line 14
Internet-Draft EMC Corporation Internet-Draft EMC Corporation
Obsoletes: 3447 (if approved) B. Kaliski Obsoletes: 3447 (if approved) B. Kaliski
Intended status: Informational Verisign Intended status: Informational Verisign
Expires: March 9, 2017 J. Jonsson Expires: March 9, 2017 J. Jonsson
Subset AB Subset AB
A. Rusch A. Rusch
RSA RSA
September 5, 2016 September 5, 2016
PKCS #1 Version 2.2: RSA Cryptography Specifications PKCS #1 Version 2.2: RSA Cryptography Specifications
draft-moriarty-pkcs1-02 draft-moriarty-pkcs1-03
Abstract Abstract
This memo represents a republication of PKCS #1 v2.2 from RSA This document represents a republication of PKCS #1 v2.2 from RSA
Laboratories' Public-Key Cryptography Standards (PKCS) series. By Laboratories' Public-Key Cryptography Standards (PKCS) series. By
publishing this RFC, change control is transferred to the IETF. publishing this RFC, change control is transferred to the IETF.
This document also obsoletes RFC 3447.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
skipping to change at page 11, line 33 skipping to change at page 11, line 33
3. Output x. 3. Output x.
5. Cryptographic primitives 5. Cryptographic primitives
Cryptographic primitives are basic mathematical operations on which Cryptographic primitives are basic mathematical operations on which
cryptographic schemes can be built. They are intended for cryptographic schemes can be built. They are intended for
implementation in hardware or as software modules, and are not implementation in hardware or as software modules, and are not
intended to provide security apart from a scheme. intended to provide security apart from a scheme.
Four types of primitives are specified in this document, organized in Four types of primitive are specified in this document, organized in
pairs: encryption and decryption; and signature and verification. pairs: encryption and decryption; and signature and verification.
The specifications of the primitives assume that certain conditions The specifications of the primitives assume that certain conditions
are met by the inputs, in particular that RSA public and private keys are met by the inputs, in particular that RSA public and private keys
are valid. are valid.
5.1. Encryption and decryption primitives 5.1. Encryption and decryption primitives
An encryption primitive produces a ciphertext representative from a An encryption primitive produces a ciphertext representative from a
message representative under the control of a public key, and a message representative under the control of a public key, and a
 End of changes. 4 change blocks. 
3 lines changed or deleted 5 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/