| < draft-moriarty-pkcs5-v2dot1-02.txt | draft-moriarty-pkcs5-v2dot1-03.txt > | |||
|---|---|---|---|---|
| INTERNET-DRAFT K. Moriarty, Ed. | INTERNET-DRAFT K. Moriarty, Ed. | |||
| Intended Status: Informational EMC | Intended Status: Informational EMC | |||
| Obsoletes: 2898 (once approved) B. Kaliski | Obsoletes: 2898 (once approved) B. Kaliski | |||
| Expires: March 9, 2017 Verisign | Expires: March 12, 2017 Verisign | |||
| A. Rusch | A. Rusch | |||
| RSA | RSA | |||
| September 2, 2016 | September 5, 2016 | |||
| PKCS #5: Password-Based Cryptography Specification | PKCS #5: Password-Based Cryptography Specification | |||
| Version 2.1 | Version 2.1 | |||
| draft-moriarty-pkcs5-v2dot1-02 | draft-moriarty-pkcs5-v2dot1-03 | |||
| Abstract | Abstract | |||
| This document provides recommendations for the implementation of | This document provides recommendations for the implementation of | |||
| password-based cryptography, covering key derivation functions, | password-based cryptography, covering key derivation functions, | |||
| encryption schemes, message-authentication schemes, and ASN.1 syntax | encryption schemes, message-authentication schemes, and ASN.1 syntax | |||
| identifying the techniques. | identifying the techniques. | |||
| The recommendations are intended for general application within | The recommendations are intended for general application within | |||
| computer and communications systems, and as such include a fair | computer and communications systems, and as such include a fair | |||
| amount of flexibility. They are particularly intended for the | amount of flexibility. They are particularly intended for the | |||
| protection of sensitive information such as private keys, as in PKCS | protection of sensitive information such as private keys, as in PKCS | |||
| #8 [PKCS8][RFC5958]. It is expected that application standards and | #8. It is expected that application standards and implementation | |||
| implementation profiles based on these specifications may include | profiles based on these specifications may include additional | |||
| additional constraints. | constraints. | |||
| Other cryptographic techniques based on passwords, such as password- | Other cryptographic techniques based on passwords, such as password- | |||
| based key entity authentication and key establishment protocols are | based key entity authentication and key establishment protocols are | |||
| outside the scope of this document. Guidelines for the selection of | outside the scope of this document. Guidelines for the selection of | |||
| passwords are also outside the scope. | passwords are also outside the scope. | |||
| This document represents a republication of PKCS #5 v2.1 [PKCS5_21] | This document represents a republication of PKCS #5 v2.1 [PKCS5_21] | |||
| from RSA Laboratories' Public-Key Cryptography Standards (PKCS) | from RSA Laboratories' Public-Key Cryptography Standards (PKCS) | |||
| series. By publishing this RFC, change control is transferred to the | series. By publishing this RFC, change control is transferred to the | |||
| IETF. | IETF. | |||
| skipping to change at line 62 ¶ | skipping to change at line 62 ¶ | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/1id-abstracts.html | http://www.ietf.org/1id-abstracts.html | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
| Copyright and License Notice | Copyright and License Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| End of changes. 5 change blocks. | ||||
| 7 lines changed or deleted | 7 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||