draft-ietf-cose-hash-algs-05.txt   draft-ietf-cose-hash-algs-06.txt 
Network Working Group J. Schaad Network Working Group J. Schaad
Internet-Draft August Cellars Internet-Draft August Cellars
Intended status: Informational 6 July 2020 Intended status: Informational 6 July 2020
Expires: 7 January 2021 Expires: 7 January 2021
CBOR Object Signing and Encryption (COSE): Hash Algorithms CBOR Object Signing and Encryption (COSE): Hash Algorithms
draft-ietf-cose-hash-algs-05 draft-ietf-cose-hash-algs-06
Abstract Abstract
The CBOR Object Signing and Encryption (COSE) syntax The CBOR Object Signing and Encryption (COSE) syntax
[I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods [I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods
for using hash algorithms. There are, however, circumstances where for using hash algorithms. There are, however, circumstances where
hash algorithms are used, such as indirect signatures where the hash hash algorithms are used, such as indirect signatures where the hash
of one or more contents are signed, and X.509 certificate or other of one or more contents are signed, and X.509 certificate or other
object identification by the use of a fingerprint. This document object identification by the use of a fingerprint. This document
defines a set of hash algorithms that are identified by COSE defines a set of hash algorithms that are identified by COSE
skipping to change at page 9, line 8 skipping to change at page 9, line 8
Unlike the SHA-2 hash functions, no algorithm identifier is created Unlike the SHA-2 hash functions, no algorithm identifier is created
for shorter lengths. The length of the hash value stored is 128-bits for shorter lengths. The length of the hash value stored is 128-bits
for SHAKE-128 and 256-bits for SHAKE-256. for SHAKE-128 and 256-bits for SHAKE-256.
The COSE capabilities array for these algorithms is empty. The COSE capabilities array for these algorithms is empty.
+========+=====+=============+==============+=========+=============+ +========+=====+=============+==============+=========+=============+
| Name |Value| Description | Capabilities |Reference| Recommended | | Name |Value| Description | Capabilities |Reference| Recommended |
+========+=====+=============+==============+=========+=============+ +========+=====+=============+==============+=========+=============+
|SHAKE128|TBD10| 128-bit | [] | [This | Yes | |SHAKE128|TBD10| SHAKE-128 | [] | [This | Yes |
| | | SHAKE-128 | |Document]| | | | |256-bit Hash | |Document]| |
| | | Value | | | |
+--------+-----+-------------+--------------+---------+-------------+ +--------+-----+-------------+--------------+---------+-------------+
|SHAKE256|TBD11| 256-bit | [] | [This | Yes | |SHAKE256|TBD11| SHAKE-256 | [] | [This | Yes |
| | | SHAKE-256 | |Document]| | | | |512-bit Hash | |Document]| |
| | | Value | | | |
+--------+-----+-------------+--------------+---------+-------------+ +--------+-----+-------------+--------------+---------+-------------+
Table 3: SHAKE Hash Functions Table 3: SHAKE Hash Functions
4. IANA Considerations 4. IANA Considerations
The IANA actions in [I-D.ietf-cose-rfc8152bis-struct] and The IANA actions in [I-D.ietf-cose-rfc8152bis-struct] and
[I-D.ietf-cose-rfc8152bis-algs] need to be executed before the [I-D.ietf-cose-rfc8152bis-algs] need to be executed before the
actions in this document. Where early allocation of codepoints has actions in this document. Where early allocation of codepoints has
been made, these should be preserved. been made, these should be preserved.
 End of changes. 3 change blocks. 
5 lines changed or deleted 7 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/