--- 1/draft-ietf-cose-hash-algs-06.txt 2020-07-29 12:13:11.618320147 -0700 +++ 2/draft-ietf-cose-hash-algs-07.txt 2020-07-29 12:13:11.646320855 -0700 @@ -1,18 +1,18 @@ Network Working Group J. Schaad Internet-Draft August Cellars -Intended status: Informational 6 July 2020 -Expires: 7 January 2021 +Intended status: Informational 29 July 2020 +Expires: 30 January 2021 CBOR Object Signing and Encryption (COSE): Hash Algorithms - draft-ietf-cose-hash-algs-06 + draft-ietf-cose-hash-algs-07 Abstract The CBOR Object Signing and Encryption (COSE) syntax [I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures where the hash of one or more contents are signed, and X.509 certificate or other object identification by the use of a fingerprint. This document defines a set of hash algorithms that are identified by COSE @@ -35,21 +35,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on 7 January 2021. + This Internet-Draft will expire on 30 January 2021. Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights @@ -425,23 +425,23 @@ DOI 10.17487/RFC2119, March 1997, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [I-D.ietf-cose-rfc8152bis-struct] Schaad, J., "CBOR Object Signing and Encryption (COSE): Structures and Process", Work in Progress, Internet-Draft, - draft-ietf-cose-rfc8152bis-struct-10, 2 June 2020, + draft-ietf-cose-rfc8152bis-struct-11, 1 July 2020, . + struct-11>. [FIPS-180-4] National Institute of Standards and Technology, "Secure Hash Standard", FIPS PUB 180-4, August 2015. [FIPS-202] National Institute of Standards and Technology, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions", FIPS PUB 202, August 2015. [RFC3174] Eastlake 3rd, D. and P. Jones, "US Secure Hash Algorithm 1 @@ -466,31 +466,31 @@ . [RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011, . [I-D.ietf-cose-rfc8152bis-algs] Schaad, J., "CBOR Object Signing and Encryption (COSE): Initial Algorithms", Work in Progress, Internet-Draft, - draft-ietf-cose-rfc8152bis-algs-10, 26 June 2020, + draft-ietf-cose-rfc8152bis-algs-11, 1 July 2020, . + algs-11>. [I-D.ietf-suit-manifest] Moran, B., Tschofenig, H., Birkholz, H., and K. Zandberg, "A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest", Work in Progress, Internet- - Draft, draft-ietf-suit-manifest-07, 9 June 2020, - . + Draft, draft-ietf-suit-manifest-09, 13 July 2020, + . [BCP201] Housley, R., "Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms", BCP 201, RFC 7696, November 2015. [SHA-1-collision] Stevens, M., Bursztein, E., Karpman, P., Albertini, A., and Y. Markov, "The first collision for full SHA-1",