draft-ietf-openpgp-rfc2440bis-13.txt   draft-ietf-openpgp-rfc2440bis-14.txt 
Network Working Group Jon Callas Network Working Group Jon Callas
Category: INTERNET-DRAFT PGP Corporation Category: INTERNET-DRAFT PGP Corporation
draft-ietf-openpgp-rfc2440bis-13.txt draft-ietf-openpgp-rfc2440bis-14.txt
Expires November 2005 Lutz Donnerhacke Expires January 2006 Lutz Donnerhacke
May 2005 July 2005
Obsoletes: 1991, 2440 Hal Finney Obsoletes: 1991, 2440 Hal Finney
Network Associates PGP Corporation
Rodney Thayer Rodney Thayer
OpenPGP Message Format OpenPGP Message Format
draft-ietf-openpgp-rfc2440bis-13.txt draft-ietf-openpgp-rfc2440bis-14.txt
Copyright (C) The Internet Society (2005). Copyright (C) The Internet Society (2005).
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC 2026. all provisions of Section 10 of RFC 2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 52, line 30 skipping to change at page 52, line 30
4 E 21 V 38 m 55 3 4 E 21 V 38 m 55 3
5 F 22 W 39 n 56 4 5 F 22 W 39 n 56 4
6 G 23 X 40 o 57 5 6 G 23 X 40 o 57 5
7 H 24 Y 41 p 58 6 7 H 24 Y 41 p 58 6
8 I 25 Z 42 q 59 7 8 I 25 Z 42 q 59 7
9 J 26 a 43 r 60 8 9 J 26 a 43 r 60 8
10 K 27 b 44 s 61 9 10 K 27 b 44 s 61 9
11 L 28 c 45 t 62 + 11 L 28 c 45 t 62 +
12 M 29 d 46 u 63 / 12 M 29 d 46 u 63 /
13 N 30 e 47 v 13 N 30 e 47 v
14 O 31 f 48 w (pad) 15 P 32 g 49 x 14 O 31 f 48 w (pad) =
15 P 32 g 49 x
16 Q 33 h 50 y 16 Q 33 h 50 y
The encoded output stream must be represented in lines of no more The encoded output stream must be represented in lines of no more
than 76 characters each. than 76 characters each.
Special processing is performed if fewer than 24 bits are available Special processing is performed if fewer than 24 bits are available
at the end of the data being encoded. There are three possibilities: at the end of the data being encoded. There are three possibilities:
1. The last data group has 24 bits (3 octets). No special 1. The last data group has 24 bits (3 octets). No special
processing is needed. processing is needed.
skipping to change at page 53, line 35 skipping to change at page 53, line 35
111110 111110
Decimal: 5 15 46 28 0 61 37 62 Decimal: 5 15 46 28 0 61 37 62
Output: F P u c A 9 l + Output: F P u c A 9 l +
Input data: 0x14fb9c03d9 Input data: 0x14fb9c03d9
Hex: 1 4 f b 9 c | 0 3 d 9 Hex: 1 4 f b 9 c | 0 3 d 9
8-bit: 00010100 11111011 10011100 | 00000011 11011001 8-bit: 00010100 11111011 10011100 | 00000011 11011001
pad with 00 pad with 00
6-bit: 000101 001111 101110 011100 | 000000 111101 100100 6-bit: 000101 001111 101110 011100 | 000000 111101 100100
Decimal: 5 15 46 28 0 61 36 Decimal: 5 15 46 28 0 61 36
pad with Output: F P u c A 9 k pad with =
Output: F P u c A 9 k =
Input data: 0x14fb9c03 Input data: 0x14fb9c03
Hex: 1 4 f b 9 c | 0 3 Hex: 1 4 f b 9 c | 0 3
8-bit: 00010100 11111011 10011100 | 00000011 8-bit: 00010100 11111011 10011100 | 00000011
pad with 0000 pad with 0000
6-bit: 000101 001111 101110 011100 | 000000 110000 6-bit: 000101 001111 101110 011100 | 000000 110000
Decimal: 5 15 46 28 0 48 Decimal: 5 15 46 28 0 48
pad with = Output: F P u c A w = pad with = =
Output: F P u c A w = =
6.6. Example of an ASCII Armored Message 6.6. Example of an ASCII Armored Message
-----BEGIN PGP MESSAGE----- -----BEGIN PGP MESSAGE-----
Version: OpenPrivacy 0.99 Version: OpenPrivacy 0.99
yDgBO22WxBHv7O8X7O/jygAEzol56iUKiXmV+XmpCtmpqQUKiQrFqclFqUDBovzS yDgBO22WxBHv7O8X7O/jygAEzol56iUKiXmV+XmpCtmpqQUKiQrFqclFqUDBovzS
vBSFjNSiVHsuAA= =njUN vBSFjNSiVHsuAA==
=njUN
-----END PGP MESSAGE----- -----END PGP MESSAGE-----
Note that this example is indented by two spaces. Note that this example is indented by two spaces.
7. Cleartext signature framework 7. Cleartext signature framework
It is desirable to sign a textual octet stream without ASCII It is desirable to sign a textual octet stream without ASCII
armoring the stream itself, so the signed text is still readable armoring the stream itself, so the signed text is still readable
without special software. In order to bind a signature to such a without special software. In order to bind a signature to such a
cleartext, this framework is used. (Note that RFC 3156 defines cleartext, this framework is used. (Note that RFC 3156 defines
another way to sign cleartext messages for environments that support another way to sign cleartext messages for environments that support
skipping to change at page 70, line 40 skipping to change at page 70, line 40
home page" home page"
<http://sources.redhat.com/bzip2/> <http://sources.redhat.com/bzip2/>
[ELGAMAL] T. Elgamal, "A Public-Key Cryptosystem and a [ELGAMAL] T. Elgamal, "A Public-Key Cryptosystem and a
Signature Scheme Based on Discrete Logarithms," Signature Scheme Based on Discrete Logarithms,"
IEEE Transactions on Information Theory, v. IT-31, IEEE Transactions on Information Theory, v. IT-31,
n. 4, 1985, pp. 469-472. n. 4, 1985, pp. 469-472.
[FIPS180] Secure Hash Signature Standard (SHS) (FIPS PUB [FIPS180] Secure Hash Signature Standard (SHS) (FIPS PUB
180-2). 180-2).
<http://csrc.nist.gov/publications/fips/ <http://csrc.nist.gov/publications/fips/
fips180-2/fips180-2.pdf> fips180-2/fips180-2withchangenotice.pdf>
[FIPS186] Digital Signature Standard (DSS) (FIPS PUB 186-2). [FIPS186] Digital Signature Standard (DSS) (FIPS PUB 186-2).
<http://csrc.nist.gov/publications/fips/ <http://csrc.nist.gov/publications/fips/fips186-2/
fips186-2/fips186-2.pdf> fips186-2-change1.pdf>
[HAC] Alfred Menezes, Paul van Oorschot, and Scott [HAC] Alfred Menezes, Paul van Oorschot, and Scott
Vanstone, "Handbook of Applied Cryptography," CRC Vanstone, "Handbook of Applied Cryptography," CRC
Press, 1996. Press, 1996.
<http://www.cacr.math.uwaterloo.ca/hac/> <http://www.cacr.math.uwaterloo.ca/hac/>
[IDEA] Lai, X, "On the design and security of block [IDEA] Lai, X, "On the design and security of block
ciphers", ETH Series in Information Processing, ciphers", ETH Series in Information Processing,
J.L. Massey (editor), Vol. 1, Hartung-Gorre Verlag J.L. Massey (editor), Vol. 1, Hartung-Gorre Verlag
Knostanz, Technische Hochschule (Zurich), 1992 Knostanz, Technische Hochschule (Zurich), 1992
[ISO10646] ISO/IEC 10646-1:1993. International Standard -- [ISO10646] ISO/IEC 10646-1:1993. International Standard --
 End of changes. 

This html diff was produced by rfcdiff 1.24, available from http://www.levkowetz.com/ietf/tools/rfcdiff/