< draft-turner-ecprivatekey-03.txt   draft-turner-ecprivatekey-04.txt >
Network Working Group Sean Turner, IECA Network Working Group Sean Turner, IECA
Internet Draft Dan Brown, Certicom Internet Draft Dan Brown, Certicom
Intended Status: Informational February 2, 2010 Intended Status: Informational February 3, 2010
Expires: August 2, 2010 Expires: August 3, 2010
Elliptic Curve Private Key Structure Elliptic Curve Private Key Structure
draft-turner-ecprivatekey-03.txt draft-turner-ecprivatekey-04.txt
Abstract Abstract
This document specifies the syntax and semantics for conveying This document specifies the syntax and semantics for conveying
Elliptic Curve (EC) private key information. This syntax and Elliptic Curve (EC) private key information. This syntax and
semantics defined herein are based on a similar syntax and semantics semantics defined herein are based on a similar syntax and semantics
defined in Standards for Efficient Cryptography Group (SECG). defined in Standards for Efficient Cryptography Group (SECG).
Status of this Memo Status of this Memo
skipping to change at page 1, line 38 skipping to change at page 1, line 38
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on August 2, 2010. This Internet-Draft will expire on August 3, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 32 skipping to change at page 2, line 32
The structure defined in this document allows the entity that The structure defined in this document allows the entity that
generates the private and public keys to distribute the key pair and generates the private and public keys to distribute the key pair and
the associated domain parameters. the associated domain parameters.
A scenario in which this syntax is useful distributes EC private keys A scenario in which this syntax is useful distributes EC private keys
using PrivateKeyInfo, as defined in PKCS #8 [RFC5208]. Distributing using PrivateKeyInfo, as defined in PKCS #8 [RFC5208]. Distributing
an EC private key with PKCS#8 [RFC5208] involves including: an EC private key with PKCS#8 [RFC5208] involves including:
a) id-ecPublicKey, id-ecDH, or id-ecMQV (from [RFC5480]) with the a) id-ecPublicKey, id-ecDH, or id-ecMQV (from [RFC5480]) with the
namedCurve as the parameters in the privateKeyAlgorithm field namedCurve as the parameters in the privateKeyAlgorithm field
b) ECPrivateKey in the PrivateKey field, which is an OCTET STRING. b) ECPrivateKey in the PrivateKey field, which is an OCTET STRING.
There are two possible locations to carry a public key. When one is When a public key is included, the publicKey field in ECPrivateKey is
included, the publicKey field in the ECPrivateKey is used. The used.
publicKey field in PKCS#8 is not used.
2. Terminology 2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
3. Elliptic Curve Private Key Format 3. Elliptic Curve Private Key Format
This section gives the syntax for an EC private key. Computationally This section gives the syntax for an EC private key. Computationally
 End of changes. 4 change blocks. 
7 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/