draft-ietf-smime-sha2-06.txt | draft-ietf-smime-sha2-07.txt | |||
---|---|---|---|---|

S/MIME WG Sean Turner, IECA | S/MIME WG Sean Turner, IECA | |||

Intended Status: Standard Track | Intended Status: Standard Track | |||

Expires: March 10, 2009 | Expires: March 18, 2009 | |||

Using SHA2 Algorithms with Cryptographic Message Syntax | Using SHA2 Algorithms with Cryptographic Message Syntax | |||

draft-ietf-smime-sha2-06.txt | draft-ietf-smime-sha2-07.txt | |||

Status of this Memo | Status of this Memo | |||

By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||

applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||

have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||

aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||

Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||

Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||

skipping to change at page 1, line 33 | skipping to change at page 1, line 33 | |||

and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||

time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||

material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||

The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||

http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||

The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||

http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||

This Internet-Draft will expire on March 10, 2008. | This Internet-Draft will expire on March 18, 2008. | |||

Copyright Notice | Copyright Notice | |||

Copyright (C) The IETF Trust (2008). | Copyright (C) The IETF Trust (2008). | |||

Abstract | Abstract | |||

This document describes the conventions for using the Secure Hash | This document describes the conventions for using the Secure Hash | |||

Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, | Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, | |||

SHA-512) with the Cryptographic Message Syntax (CMS). It also | SHA-512) with the Cryptographic Message Syntax (CMS). It also | |||

skipping to change at page 2, line 13 | skipping to change at page 2, line 13 | |||

Elliptic Curve DSA (ECDSA) signature algorithms. | Elliptic Curve DSA (ECDSA) signature algorithms. | |||

Conventions used in this document | Conventions used in this document | |||

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||

"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||

document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||

Table of Contents | Table of Contents | |||

1. Introduction...................................................2 | 1. Introduction......................................... 2 | |||

2. Message Digest Algorithms......................................3 | 2. Message Digest Algorithms.............................. 3 | |||

2.1. SHA-224...................................................4 | 2.1. SHA-224......................................... 4 | |||

2.2. SHA-256...................................................4 | 2.2. SHA-256......................................... 4 | |||

2.3. SHA-384...................................................4 | 2.3. SHA-384......................................... 4 | |||

2.4. SHA-512...................................................4 | 2.4. SHA-512......................................... 4 | |||

3. Signature Algorithms...........................................5 | 3. Signature Algorithms.................................. 5 | |||

3.1. DSA.......................................................5 | 3.1. DSA............................................ 5 | |||

3.2. RSA.......................................................6 | 3.2. RSA............................................ 6 | |||

3.3. ECDSA.....................................................6 | 3.3. ECDSA.......................................... 6 | |||

4. Security Considerations........................................7 | 4. Security Considerations................................ 7 | |||

5. IANA Considerations............................................7 | 5. IANA Considerations................................... 7 | |||

6. References.....................................................7 | 6. References.......................................... 7 | |||

6.1. Normative References......................................7 | 6.1. Normative References.............................. 7 | |||

6.2. Informative References....................................8 | 6.2. Informative References............................ 8 | |||

1. Introduction | 1. Introduction | |||

This document specifies the algorithm identifiers and specifies | This document specifies the algorithm identifiers and specifies | |||

parameters for the message digest algorithms SHA-224, SHA-256, SHA- | parameters for the message digest algorithms SHA-224, SHA-256, SHA- | |||

384, and SHA-512 for use with the Cryptographic Message Syntax (CMS) | 384, and SHA-512 for use with the Cryptographic Message Syntax (CMS) | |||

[RFC3852]. The message digest algorithms are defined in [SHS] and | [RFC3852]. The message digest algorithms are defined in [SHS] and | |||

reference code is provided in [RFC4634]. | reference code is provided in [RFC4634]. | |||

This document also specifies the algorithm identifiers and parameters | This document also specifies the algorithm identifiers and parameters | |||

skipping to change at page 5, line 31 | skipping to change at page 5, line 31 | |||

[RFC3370] section 3.1 specifies the conventions for DSA with SHA1 | [RFC3370] section 3.1 specifies the conventions for DSA with SHA1 | |||

public key algorithm identifiers, parameters, public keys, and | public key algorithm identifiers, parameters, public keys, and | |||

signature values. DSA with SHA2 algorithms uses the same conventions | signature values. DSA with SHA2 algorithms uses the same conventions | |||

for these public key algorithm identifiers, parameters, public keys, | for these public key algorithm identifiers, parameters, public keys, | |||

and signature values. DSA MAY be used with SHA-224 and SHA-256. | and signature values. DSA MAY be used with SHA-224 and SHA-256. | |||

DSA has not been specified with SHA-384 and SHA-512. SHA-384 and | DSA has not been specified with SHA-384 and SHA-512. SHA-384 and | |||

SHA-512 are not supported because the maximum bit length of p | SHA-512 are not supported because the maximum bit length of p | |||

(specified as L) is 3072 for DSA. For consistent cryptographic | (specified as L) is 3072 for DSA. For consistent cryptographic | |||

strength, SHA-384 would be used with DSA where L is 7068, and SHA-512 | strength, SHA-384 would be used with DSA where L is 7608, and SHA-512 | |||

would be used with DSA where L is 15360. | would be used with DSA where L is 15360. | |||

The algorithm identifier for DSA with SHA-224 signature values is: | The algorithm identifier for DSA with SHA-224 signature values is: | |||

id-dsa-with-sha224 OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) | id-dsa-with-sha224 OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) | |||

country(16) us(840) organization(1) gov(101) csor(3) | country(16) us(840) organization(1) gov(101) csor(3) | |||

algorithms(4) id-dsa-with-sha2(3) 1 } | algorithms(4) id-dsa-with-sha2(3) 1 } | |||

The algorithm identifier for DSA with SHA-256 signature values is: | The algorithm identifier for DSA with SHA-256 signature values is: | |||

skipping to change at page 8, line 6 | skipping to change at page 8, line 6 | |||

6. References | 6. References | |||

6.1. Normative References | 6.1. Normative References | |||

[ECCADD] Dang, S., Santesson, S., Moriarty, K., and Brown, | [ECCADD] Dang, S., Santesson, S., Moriarty, K., and Brown, | |||

"Internet X.509 Public Key Infrastructure: Additional | "Internet X.509 Public Key Infrastructure: Additional | |||

Algorithms and Identifiers for DSA and ECDSA", work-in- | Algorithms and Identifiers for DSA and ECDSA", work-in- | |||

progress. | progress. | |||

[DSS] National Institute of Standards and Technology (NIST), | [DSS] National Institute of Standards and Technology (NIST), | |||

FIPS Publication 186-2: Digital Signature Standard, | FIPS Publication 186-3: Digital Signature Standard, March | |||

January 2000. | 2006. | |||

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||

Requirement Levels", BCP 14, RFC 2119. March 1997. | Requirement Levels", BCP 14, RFC 2119. March 1997. | |||

[RFC2313] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", RFC | [RFC2313] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", RFC | |||

2313, March 1998. | 2313, March 1998. | |||

[RFC3278] Blake-Wilson, S., Brown, D., and P. Lambert, "Use of | [RFC3278] Blake-Wilson, S., Brown, D., and P. Lambert, "Use of | |||

Elliptic Curve Cryptography (ECC) Algorithms in | Elliptic Curve Cryptography (ECC) Algorithms in | |||

Cryptographic Message Syntax (CMS)", RFC 3278, April | Cryptographic Message Syntax (CMS)", RFC 3278, April | |||

skipping to change at page 8, line 36 | skipping to change at page 8, line 36 | |||

[RFC3874] Housley, R., "A 224-bit One Way Hash Function: SHA-224", | [RFC3874] Housley, R., "A 224-bit One Way Hash Function: SHA-224", | |||

RFC 3874. September 2004. | RFC 3874. September 2004. | |||

[RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional | [RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional | |||

Algorithms and Identifiers for RSA Cryptography for use | Algorithms and Identifiers for RSA Cryptography for use | |||

in the Internet Public Key Infrastructure Certificate and | in the Internet Public Key Infrastructure Certificate and | |||

Certificate Revocation List (CRL) Profile", RFC 4055. | Certificate Revocation List (CRL) Profile", RFC 4055. | |||

June 2005. | June 2005. | |||

[SHS] National Institute of Standards and Technology (NIST), | [SHS] National Institute of Standards and Technology (NIST), | |||

FIPS Publication 180-2: Secure Hash Standard, August | FIPS Publication 180-3: Secure Hash Standard, June 2003. | |||

2002. | ||||

[X9.62] X9.62-2005, "Public Key Cryptography for the Financial | [X9.62] X9.62-2005, "Public Key Cryptography for the Financial | |||

Services Industry: The Elliptic Curve Digital Signature | Services Industry: The Elliptic Curve Digital Signature | |||

Standard (ECDSA)", November, 2005. | Standard (ECDSA)", November, 2005. | |||

6.2. Informative References | 6.2. Informative References | |||

[RFC4231] Nystrom, A. "Identifiers and Test Vectors for HMAC-SHA- | [RFC4231] Nystrom, A. "Identifiers and Test Vectors for HMAC-SHA- | |||

224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512", | 224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512", | |||

RFC4231. December 2005. | RFC4231. December 2005. | |||

End of changes. 7 change blocks. | ||||

23 lines changed or deleted | | 22 lines changed or added | ||

This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |