| < draft-moriarty-pkcs1-02.txt | draft-moriarty-pkcs1-03.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 14 ¶ | skipping to change at page 1, line 14 ¶ | |||
| Internet-Draft EMC Corporation | Internet-Draft EMC Corporation | |||
| Obsoletes: 3447 (if approved) B. Kaliski | Obsoletes: 3447 (if approved) B. Kaliski | |||
| Intended status: Informational Verisign | Intended status: Informational Verisign | |||
| Expires: March 9, 2017 J. Jonsson | Expires: March 9, 2017 J. Jonsson | |||
| Subset AB | Subset AB | |||
| A. Rusch | A. Rusch | |||
| RSA | RSA | |||
| September 5, 2016 | September 5, 2016 | |||
| PKCS #1 Version 2.2: RSA Cryptography Specifications | PKCS #1 Version 2.2: RSA Cryptography Specifications | |||
| draft-moriarty-pkcs1-02 | draft-moriarty-pkcs1-03 | |||
| Abstract | Abstract | |||
| This memo represents a republication of PKCS #1 v2.2 from RSA | This document represents a republication of PKCS #1 v2.2 from RSA | |||
| Laboratories' Public-Key Cryptography Standards (PKCS) series. By | Laboratories' Public-Key Cryptography Standards (PKCS) series. By | |||
| publishing this RFC, change control is transferred to the IETF. | publishing this RFC, change control is transferred to the IETF. | |||
| This document also obsoletes RFC 3447. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| skipping to change at page 11, line 33 ¶ | skipping to change at page 11, line 33 ¶ | |||
| 3. Output x. | 3. Output x. | |||
| 5. Cryptographic primitives | 5. Cryptographic primitives | |||
| Cryptographic primitives are basic mathematical operations on which | Cryptographic primitives are basic mathematical operations on which | |||
| cryptographic schemes can be built. They are intended for | cryptographic schemes can be built. They are intended for | |||
| implementation in hardware or as software modules, and are not | implementation in hardware or as software modules, and are not | |||
| intended to provide security apart from a scheme. | intended to provide security apart from a scheme. | |||
| Four types of primitives are specified in this document, organized in | Four types of primitive are specified in this document, organized in | |||
| pairs: encryption and decryption; and signature and verification. | pairs: encryption and decryption; and signature and verification. | |||
| The specifications of the primitives assume that certain conditions | The specifications of the primitives assume that certain conditions | |||
| are met by the inputs, in particular that RSA public and private keys | are met by the inputs, in particular that RSA public and private keys | |||
| are valid. | are valid. | |||
| 5.1. Encryption and decryption primitives | 5.1. Encryption and decryption primitives | |||
| An encryption primitive produces a ciphertext representative from a | An encryption primitive produces a ciphertext representative from a | |||
| message representative under the control of a public key, and a | message representative under the control of a public key, and a | |||
| End of changes. 4 change blocks. | ||||
| 3 lines changed or deleted | 5 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||