draft-ietf-smime-sha2-04.txt   draft-ietf-smime-sha2-05.txt 
S/MIME WG Sean Turner, IECA S/MIME WG Sean Turner, IECA
Intended Status: Standard Track Intended Status: Standard Track
Expires: September 11, 2008 Expires: October 29, 2008
Using SHA2 Algorithms with Cryptographic Message Syntax Using SHA2 Algorithms with Cryptographic Message Syntax
draft-ietf-smime-sha2-04.txt draft-ietf-smime-sha2-05.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 33 skipping to change at page 1, line 33
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on September 11, 2008. This Internet-Draft will expire on October 29, 2008.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2008). Copyright (C) The IETF Trust (2008).
Abstract Abstract
This document describes the conventions for using the Secure Hash This document describes the conventions for using the Secure Hash
Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384,
SHA-512) with the Cryptographic Message Syntax (CMS). It also SHA-512) with the Cryptographic Message Syntax (CMS). It also
skipping to change at page 2, line 34 skipping to change at page 2, line 34
5. IANA Considerations............................................7 5. IANA Considerations............................................7
6. References.....................................................7 6. References.....................................................7
6.1. Normative References......................................7 6.1. Normative References......................................7
6.2. Informative References....................................8 6.2. Informative References....................................8
1. Introduction 1. Introduction
This document specifies the algorithm identifiers and specifies This document specifies the algorithm identifiers and specifies
parameters for the message digest algorithms SHA-224, SHA-256, SHA- parameters for the message digest algorithms SHA-224, SHA-256, SHA-
384, and SHA-512 for use with the Cryptographic Message Syntax (CMS) 384, and SHA-512 for use with the Cryptographic Message Syntax (CMS)
[RFC3852]. The message digest algorithms are defined in [SHS]. [RFC3852]. The message digest algorithms are defined in [SHS] and
reference code is provided in [RFC4634].
This document also specifies the algorithm identifiers and parameters This document also specifies the algorithm identifiers and parameters
for use of SHA-224, SHA-256, SHA-384, and SHA-512 with DSA [DSS], RSA for use of SHA-224, SHA-256, SHA-384, and SHA-512 with DSA [DSS], RSA
[RFC2313], and ECDSA [X9.62]. [RFC2313], and ECDSA [X9.62].
This document does not define new identifiers; they are taken from This document does not define new identifiers; they are taken from
[RFC3874], [RFC4055], [ECCADD], and [RFC3278]. Additionally, the [RFC3874], [RFC4055], [ECCADD], and [RFC3278]. Additionally, the
parameters follow the conventions specified therein. Therefore, parameters follow the conventions specified therein. Therefore,
there is no Abstract Syntax Notation One (ASN.1) module included in there is no Abstract Syntax Notation One (ASN.1) module included in
this document. this document.
skipping to change at page 7, line 49 skipping to change at page 7, line 49
6. References 6. References
6.1. Normative References 6.1. Normative References
[ECCADD] Dang, S., Santesson, S., Moriarty, K., and Brown, [ECCADD] Dang, S., Santesson, S., Moriarty, K., and Brown,
"Internet X.509 Public Key Infrastructure: Additional "Internet X.509 Public Key Infrastructure: Additional
Algorithms and Identifiers for DSA and ECDSA", work-in- Algorithms and Identifiers for DSA and ECDSA", work-in-
progress. progress.
[DSS] Federal Information Processing Standards Publication [DSS] Federal Information Processing Standards Publication
(FIPS PUB) 186-2, Secure Hash Standard (SHS), 2000. (FIPS PUB) 186-2, Digital Signature Standard, January
2000.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119. March 1997. Requirement Levels", BCP 14, RFC 2119. March 1997.
[RFC2313] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", RFC [RFC2313] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", RFC
2313, March 1998. 2313, March 1998.
[RFC3278] Blake-Wilson, S., Brown, D., and P. Lambert, "Use of [RFC3278] Blake-Wilson, S., Brown, D., and P. Lambert, "Use of
Elliptic Curve Cryptography (ECC) Algorithms in Elliptic Curve Cryptography (ECC) Algorithms in
Cryptographic Message Syntax (CMS)", RFC 3278, April Cryptographic Message Syntax (CMS)", RFC 3278, April
2002. 2002.
[RFC3370] Housley, R., "Cryptographic Message Syntax (CMS) [RFC3370] Housley, R., "Cryptographic Message Syntax (CMS)
Algorithms", RFC 3370, August 2002. Algorithms", RFC 3370, August 2002.
[RFC3852] Housley, R., "The Cryptographic Message Syntax (CMS)", [RFC3852] Housley, R., "The Cryptographic Message Syntax (CMS)",
RFC 3852. July 2004. RFC 3852. July 2004.
Housley, R., "Cryptographic Message Syntax (CMS) Multiple
Signer Clarification", RFC 4852, April 2007.
[RFC3874] Housley, R., "A 224-bit One Way Hash Function: SHA-224", [RFC3874] Housley, R., "A 224-bit One Way Hash Function: SHA-224",
RFC 3874. September 2004. RFC 3874. September 2004.
[RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional [RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional
Algorithms and Identifiers for RSA Cryptography for use Algorithms and Identifiers for RSA Cryptography for use
in the Internet Public Key Infrastructure Certificate and in the Internet Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile", RFC 4055. Certificate Revocation List (CRL) Profile", RFC 4055.
June 2005. June 2005.
[SHS] National Institute of Standards and Technology (NIST), [SHS] National Institute of Standards and Technology (NIST),
FIPS Publication 180-2: Secure Hash Standard, 2002. FIPS Publication 180-2: Secure Hash Standard, August
2002.
[X9.62] X9.62-2005, "Public Key Cryptography for the Financial [X9.62] X9.62-2005, "Public Key Cryptography for the Financial
Services Industry: The Elliptic Curve Digital Signature Services Industry: The Elliptic Curve Digital Signature
Standard (ECDSA)", November, 2005. Standard (ECDSA)", November, 2005.
6.2. Informative References 6.2. Informative References
[RFC4231] Nystrom, A. "Identifiers and Test Vectors for HMAC-SHA- [RFC4231] Nystrom, A. "Identifiers and Test Vectors for HMAC-SHA-
224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512", 224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512",
RFC4231. December 2005. RFC4231. December 2005.
[RFC4634] Eastlake, D., and T. Hansen, "US Secure Hash Algorithms
(SHA and HMAC-SHA)", RFC 4634, July 2006.
Author's Addresses Author's Addresses
Sean Turner Sean Turner
IECA, Inc. IECA, Inc.
3057 Nutley Street, Suite 106 3057 Nutley Street, Suite 106
Fairfax, VA 22031 Fairfax, VA 22031
USA USA
EMail: turners@ieca.com EMail: turners@ieca.com
 End of changes. 8 change blocks. 
9 lines changed or deleted 12 lines changed or added

This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/