< draft-moriarty-pkcs5-v2dot1-02.txt   draft-moriarty-pkcs5-v2dot1-03.txt >
INTERNET-DRAFT K. Moriarty, Ed. INTERNET-DRAFT K. Moriarty, Ed.
Intended Status: Informational EMC Intended Status: Informational EMC
Obsoletes: 2898 (once approved) B. Kaliski Obsoletes: 2898 (once approved) B. Kaliski
Expires: March 9, 2017 Verisign Expires: March 12, 2017 Verisign
A. Rusch A. Rusch
RSA RSA
September 2, 2016 September 5, 2016
PKCS #5: Password-Based Cryptography Specification PKCS #5: Password-Based Cryptography Specification
Version 2.1 Version 2.1
draft-moriarty-pkcs5-v2dot1-02 draft-moriarty-pkcs5-v2dot1-03
Abstract Abstract
This document provides recommendations for the implementation of This document provides recommendations for the implementation of
password-based cryptography, covering key derivation functions, password-based cryptography, covering key derivation functions,
encryption schemes, message-authentication schemes, and ASN.1 syntax encryption schemes, message-authentication schemes, and ASN.1 syntax
identifying the techniques. identifying the techniques.
The recommendations are intended for general application within The recommendations are intended for general application within
computer and communications systems, and as such include a fair computer and communications systems, and as such include a fair
amount of flexibility. They are particularly intended for the amount of flexibility. They are particularly intended for the
protection of sensitive information such as private keys, as in PKCS protection of sensitive information such as private keys, as in PKCS
#8 [PKCS8][RFC5958]. It is expected that application standards and #8. It is expected that application standards and implementation
implementation profiles based on these specifications may include profiles based on these specifications may include additional
additional constraints. constraints.
Other cryptographic techniques based on passwords, such as password- Other cryptographic techniques based on passwords, such as password-
based key entity authentication and key establishment protocols are based key entity authentication and key establishment protocols are
outside the scope of this document. Guidelines for the selection of outside the scope of this document. Guidelines for the selection of
passwords are also outside the scope. passwords are also outside the scope.
This document represents a republication of PKCS #5 v2.1 [PKCS5_21] This document represents a republication of PKCS #5 v2.1 [PKCS5_21]
from RSA Laboratories' Public-Key Cryptography Standards (PKCS) from RSA Laboratories' Public-Key Cryptography Standards (PKCS)
series. By publishing this RFC, change control is transferred to the series. By publishing this RFC, change control is transferred to the
IETF. IETF.
skipping to change at line 62 skipping to change at line 62
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
Copyright and License Notice Copyright and License Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
 End of changes. 5 change blocks. 
7 lines changed or deleted 7 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/