draft-ietf-smime-3278bis-06.txt   draft-ietf-smime-3278bis-07.txt 
S/MIME WG Sean Turner, IECA S/MIME WG Sean Turner, IECA
Internet Draft Dan Brown, Certicom Internet Draft Dan Brown, Certicom
Intended Status: Informational April 14, 2009 Intended Status: Informational May 5, 2009
Obsoletes: 3278 (once approved) Obsoletes: 3278 (once approved)
Expires: October 14, 2009 Expires: November 5, 2009
Use of Elliptic Curve Cryptography (ECC) Algorithms Use of Elliptic Curve Cryptography (ECC) Algorithms
in Cryptographic Message Syntax (CMS) in Cryptographic Message Syntax (CMS)
draft-ietf-smime-3278bis-06.txt draft-ietf-smime-3278bis-07.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. This document may contain material provisions of BCP 78 and BCP 79. This document may contain material
from IETF Documents or IETF Contributions published or made publicly from IETF Documents or IETF Contributions published or made publicly
available before November 10, 2008. The person(s) controlling the available before November 10, 2008. The person(s) controlling the
copyright in some of this material may not have granted the IETF copyright in some of this material may not have granted the IETF
Trust the right to allow modifications of such material outside the Trust the right to allow modifications of such material outside the
IETF Standards Process. Without obtaining an adequate license from IETF Standards Process. Without obtaining an adequate license from
skipping to change at page 1, line 43 skipping to change at page 1, line 43
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on October 14, 2009. This Internet-Draft will expire on November 5, 2009.
Copyright Notice Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info). publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 3, line 16 skipping to change at page 3, line 16
9. Security Considerations.......................................28 9. Security Considerations.......................................28
10. IANA Considerations..........................................33 10. IANA Considerations..........................................33
11. References...................................................33 11. References...................................................33
11.1. Normative...............................................33 11.1. Normative...............................................33
11.2. Informative.............................................35 11.2. Informative.............................................35
Appendix A ASN.1 Modules.........................................36 Appendix A ASN.1 Modules.........................................36
Appendix A.1 1988 ASN.1 Module................................36 Appendix A.1 1988 ASN.1 Module................................36
Appendix A.2 2004 ASN.1 Module................................43 Appendix A.2 2004 ASN.1 Module................................43
Appendix B Changes since RFC 3278................................53 Appendix B Changes since RFC 3278................................53
Acknowledgements.................................................56 Acknowledgements.................................................56
Authors' Addresses...............................................56 Author's Addresses...............................................56
1. Introduction 1. Introduction
The Cryptographic Message Syntax (CMS) is cryptographic algorithm The Cryptographic Message Syntax (CMS) is cryptographic algorithm
independent. This specification defines a profile for the use of independent. This specification defines a profile for the use of
Elliptic Curve Cryptography (ECC) public key algorithms in the CMS. Elliptic Curve Cryptography (ECC) public key algorithms in the CMS.
The ECC algorithms are incorporated into the following CMS content The ECC algorithms are incorporated into the following CMS content
types: types:
- 'SignedData' to support ECC-based digital signature methods - 'SignedData' to support ECC-based digital signature methods
skipping to change at page 14, line 32 skipping to change at page 14, line 32
key agreement, KDF is key derivation function, and Wrap is key wrap key agreement, KDF is key derivation function, and Wrap is key wrap
algorithm): algorithm):
KA=ECDH standard KDF=SHA-1 Wrap=Triple-DES KA=ECDH standard KDF=SHA-1 Wrap=Triple-DES
30 1c 06 09 2b 81 05 10 86 48 3f 00 02 30 0f 06 0b 2a 86 48 86 30 1c 06 09 2b 81 05 10 86 48 3f 00 02 30 0f 06 0b 2a 86 48 86
f7 0d 01 09 10 03 06 05 00 f7 0d 01 09 10 03 06 05 00
KA=ECDH standard KDF=SHA-224 Wrap=Triple-DES KA=ECDH standard KDF=SHA-224 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0B 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0B 00 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH standard KDF=SHA-256 Wrap=Triple-DES KA=ECDH standard KDF=SHA-256 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0B 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0B 01 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH standard KDF=SHA-384 Wrap=Triple-DES KA=ECDH standard KDF=SHA-384 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0B 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0B 02 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH standard KDF=SHA-512 Wrap=Triple-DES KA=ECDH standard KDF=SHA-512 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0B 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0B 03 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH standard KDF=SHA-1 Wrap=AES-128 KA=ECDH standard KDF=SHA-1 Wrap=AES-128
30 18 06 09 2b 81 05 10 86 48 3f 00 02 30 0b 06 09 60 86 48 01 30 18 06 09 2b 81 05 10 86 48 3f 00 02 30 0b 06 09 60 86 48 01
65 03 04 01 05 65 03 04 01 05
KA=ECDH standard KDF=SHA-224 Wrap=AES-128 KA=ECDH standard KDF=SHA-224 Wrap=AES-128
30 15 06 06 2b 81 04 01 0B 00 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0B 00 30 0b 06 09 60 86 48 01 65 03 04
01 05 01 05
skipping to change at page 16, line 41 skipping to change at page 16, line 41
30 15 06 06 2b 81 04 01 0B 03 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0B 03 30 0b 06 09 60 86 48 01 65 03 04
01 2D 01 2D
KA=ECDH cofactor KDF=SHA-1 Wrap=Triple-DES KA=ECDH cofactor KDF=SHA-1 Wrap=Triple-DES
30 1c 06 09 2b 81 05 10 86 48 3f 00 03 30 0f 06 0b 2a 86 48 86 30 1c 06 09 2b 81 05 10 86 48 3f 00 03 30 0f 06 0b 2a 86 48 86
f7 0d 01 09 10 03 06 05 00 f7 0d 01 09 10 03 06 05 00
KA=ECDH cofactor KDF=SHA-224 Wrap=Triple-DES KA=ECDH cofactor KDF=SHA-224 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0E 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0E 00 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH cofactor KDF=SHA-256 Wrap=Triple-DES KA=ECDH cofactor KDF=SHA-256 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0E 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0E 01 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH cofactor KDF=SHA-384 Wrap=Triple-DES KA=ECDH cofactor KDF=SHA-384 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0E 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0E 02 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH cofactor KDF=SHA-512 Wrap=Triple-DES KA=ECDH cofactor KDF=SHA-512 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0E 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0E 03 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECDH cofactor KDF=SHA-1 Wrap=AES-128 KA=ECDH cofactor KDF=SHA-1 Wrap=AES-128
30 18 06 09 2b 81 05 10 86 48 3f 00 03 30 0b 06 09 60 86 48 01 30 18 06 09 2b 81 05 10 86 48 3f 00 03 30 0b 06 09 60 86 48 01
65 03 04 01 05 65 03 04 01 05
KA=ECDH cofactor KDF=SHA-224 Wrap=AES-128 KA=ECDH cofactor KDF=SHA-224 Wrap=AES-128
30 15 06 06 2b 81 04 01 0E 00 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0E 00 30 0b 06 09 60 86 48 01 65 03 04
01 05 01 05
skipping to change at page 19, line 6 skipping to change at page 19, line 6
30 15 06 06 2b 81 04 01 0E 03 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0E 03 30 0b 06 09 60 86 48 01 65 03 04
01 2D 01 2D
KA=ECMQV 1-Pass KDF=SHA-1 Wrap=Triple-DES KA=ECMQV 1-Pass KDF=SHA-1 Wrap=Triple-DES
30 1c 06 09 2b 81 05 10 86 48 3f 00 10 30 0f 06 0b 2a 86 48 86 30 1c 06 09 2b 81 05 10 86 48 3f 00 10 30 0f 06 0b 2a 86 48 86
f7 0d 01 09 10 03 06 05 00 f7 0d 01 09 10 03 06 05 00
KA=ECMQV 1-Pass KDF=SHA-224 Wrap=Triple-DES KA=ECMQV 1-Pass KDF=SHA-224 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0F 00 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0F 00 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECMQV 1-Pass KDF=SHA-256 Wrap=Triple-DES KA=ECMQV 1-Pass KDF=SHA-256 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0F 01 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0F 01 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECMQV 1-Pass KDF=SHA-384 Wrap=Triple-DES KA=ECMQV 1-Pass KDF=SHA-384 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0F 02 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0F 02 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECMQV 1-Pass KDF=SHA-512 Wrap=Triple-DES KA=ECMQV 1-Pass KDF=SHA-512 Wrap=Triple-DES
30 19 06 06 2b 81 04 01 0F 03 30 0f 06 0b 2a 86 48 86 f7 0d 01 30 17 06 06 2b 81 04 01 0F 03 30 0d 06 0b 2a 86 48 86 f7 0d 01
09 10 03 06 05 00 09 10 03 06
KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-128 KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-128
30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01
65 03 04 01 05 65 03 04 01 05
KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-128 KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-128
30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04
01 05 01 05
KA=ECMQV 1-Pass KDF=SHA-256 Wrap=AES-128 KA=ECMQV 1-Pass KDF=SHA-256 Wrap=AES-128
30 15 06 06 2b 81 04 01 0F 01 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0F 01 30 0b 06 09 60 86 48 01 65 03 04
01 05 01 05
KA=ECMQV 1-Pass KDF=SHA-384 Wrap=AES-128 KA=ECMQV 1-Pass KDF=SHA-384 Wrap=AES-128
30 15 06 06 2b 81 04 01 0F 02 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0F 02 30 0b 06 09 60 86 48 01 65 03 04
01 05 05 00 01 05
KA=ECMQV 1-Pass KDF=SHA-512 Wrap=AES-128 KA=ECMQV 1-Pass KDF=SHA-512 Wrap=AES-128
30 15 06 06 2b 81 04 01 0F 03 30 0d 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0F 03 30 0d 06 09 60 86 48 01 65 03 04
01 05 05 00 01 05
KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-192 KA=ECMQV 1-Pass KDF=SHA-1 Wrap=AES-192
30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01 30 18 06 09 2b 81 05 10 86 48 3f 00 10 30 0b 06 09 60 86 48 01
65 03 04 01 19 65 03 04 01 19
KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-192 KA=ECMQV 1-Pass KDF=SHA-224 Wrap=AES-192
30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04 30 15 06 06 2b 81 04 01 0F 00 30 0b 06 09 60 86 48 01 65 03 04
01 19 01 19
 End of changes. 19 change blocks. 
31 lines changed or deleted 31 lines changed or added

This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/