draft-ietf-smime-cmsalg-05.txt   draft-ietf-smime-cmsalg-06.txt 
S/MIME Working Group R. Housley S/MIME Working Group R. Housley
Internet Draft RSA Laboratories Internet Draft RSA Laboratories
expires in six months September 2001 expires in six months September 2001
Cryptographic Message Syntax (CMS) Algorithms Cryptographic Message Syntax (CMS) Algorithms
<draft-ietf-smime-cmsalg-05.txt> <draft-ietf-smime-cmsalg-06.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. Internet-Drafts are working all provisions of Section 10 of RFC2026. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts. working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html
To view the entire list of current Internet-Drafts, please check the To view the entire list of current Internet-Drafts, please check the
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern
Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific
Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast). Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast).
Abstract Abstract
This document describes several cryptographic algorithms for use with This document describes several cryptographic algorithms for use with
skipping to change at page 2, line 17 skipping to change at page 2, line 17
Status of this Memo .............................................. 1 Status of this Memo .............................................. 1
Abstract ......................................................... 1 Abstract ......................................................... 1
Table of Contents ................................................ 2 Table of Contents ................................................ 2
1 Introduction ................................................. 3 1 Introduction ................................................. 3
2 Message Digest Algorithms .................................... 3 2 Message Digest Algorithms .................................... 3
2.1 SHA-1 ................................................. 3 2.1 SHA-1 ................................................. 3
2.2 MD5 ................................................... 4 2.2 MD5 ................................................... 4
3 Signature Algorithms ......................................... 4 3 Signature Algorithms ......................................... 4
3.1 DSA ................................................... 4 3.1 DSA ................................................... 4
3.2 RSA ................................................... 5 3.2 RSA ................................................... 5
4 Key Management Algorithms .................................... 6 4 Key Management Algorithms .................................... 7
4.1 Key Agreement Algorithms .............................. 7 4.1 Key Agreement Algorithms .............................. 7
4.1.1 X9.42 Ephemeral-Static Diffie-Hellman ........ 7 4.1.1 X9.42 Ephemeral-Static Diffie-Hellman ........ 7
4.1.2 X9.42 Static-Static Diffie-Hellman ........... 8 4.1.2 X9.42 Static-Static Diffie-Hellman ........... 9
4.2 Key Transport Algorithms .............................. 9 4.2 Key Transport Algorithms .............................. 10
4.2.1 RSA (PKCS #1 v1.5) ........................... 10 4.2.1 RSA (PKCS #1 v1.5) ........................... 10
4.3 Symmetric Key-Encryption Key Algorithms ............... 10 4.3 Symmetric Key-Encryption Key Algorithms ............... 11
4.3.1 Triple-DES Key Wrap .......................... 11 4.3.1 Triple-DES Key Wrap .......................... 11
4.3.2 RC2 Key Wrap ................................. 12 4.3.2 RC2 Key Wrap ................................. 12
4.4 Key Derivation Algorithms ............................. 12 4.4 Key Derivation Algorithms ............................. 13
4.4.1 PBKDF2 ....................................... 13 4.4.1 PBKDF2 ....................................... 13
5 Content Encryption Algorithms ................................ 13 5 Content Encryption Algorithms ................................ 14
5.1 Triple-DES CBC ........................................ 14 5.1 Triple-DES CBC ........................................ 14
5.2 RC2 CBC ............................................... 14 5.2 RC2 CBC ............................................... 14
6 Message Authentication Code (MAC) Algorithms ................. 15 6 Message Authentication Code (MAC) Algorithms ................. 15
6.1 HMAC with SHA-1 ....................................... 15 6.1 HMAC with SHA-1 ....................................... 15
Appendix A: ASN.1 Module ........................................ 16 Appendix A: ASN.1 Module ........................................ 16
References ....................................................... 19 References ....................................................... 19
Security Considerations .......................................... 20 Security Considerations .......................................... 20
Acknowledgments .................................................. 23 Acknowledgments .................................................. 23
Author's Address ................................................. 23 Author's Address ................................................. 23
Full Copyright Statement ......................................... 23 Full Copyright Statement ......................................... 23
skipping to change at page 8, line 48 skipping to change at page 8, line 48
recipientEncryptedKeys contains an identifier and an encrypted key recipientEncryptedKeys contains an identifier and an encrypted key
for each recipient. The RecipientEncryptedKey for each recipient. The RecipientEncryptedKey
KeyAgreeRecipientIdentifier MUST contain either the KeyAgreeRecipientIdentifier MUST contain either the
issuerAndSerialNumber identifying the recipient's certificate or issuerAndSerialNumber identifying the recipient's certificate or
the RecipientKeyIdentifier containing the subject key identifier the RecipientKeyIdentifier containing the subject key identifier
from the recipient's certificate. In both cases, the recipient's from the recipient's certificate. In both cases, the recipient's
certificate contains the recipient's static public key. certificate contains the recipient's static public key.
RecipientEncryptedKey EncryptedKey MUST contain the content- RecipientEncryptedKey EncryptedKey MUST contain the content-
encryption key encrypted with the X9.42 Ephemeral-Static Diffie- encryption key encrypted with the X9.42 Ephemeral-Static Diffie-
Hellman generated pairwise key-encryption key using the algorithm Hellman generated pairwise key-encryption key using the algorithm
specified by the KeyWrapAlgortihm. specified by the KeyWrapAlgorithm.
4.1.2 X9.42 Static-Static Diffie-Hellman 4.1.2 X9.42 Static-Static Diffie-Hellman
Static-Static Diffie-Hellman key agreement is defined in RFC 2631 Static-Static Diffie-Hellman key agreement is defined in RFC 2631
[DH-X9.42]. When using Static-Static Diffie-Hellman, the [DH-X9.42]. When using Static-Static Diffie-Hellman, the
EnvelopedData RecipientInfos KeyAgreeRecipientInfo and EnvelopedData RecipientInfos KeyAgreeRecipientInfo and
AuthenticatedData RecipientInfos KeyAgreeRecipientInfo fields are AuthenticatedData RecipientInfos KeyAgreeRecipientInfo fields are
used as follows: used as follows:
version MUST be 3. version MUST be 3.
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/