Additional XML Security Uniform Resource Identifiers (URIs)
draft-eastlake-additional-xmlsec-uris-04
The information below is for an old version of the document |
Document |
Type |
|
Active Internet-Draft (individual)
|
|
Last updated |
|
2012-12-10
|
|
Stream |
|
(None)
|
|
Intended RFC status |
|
(None)
|
|
Formats |
|
plain text
pdf
html
bibtex
|
Stream |
Stream state |
|
(No stream defined) |
|
Consensus Boilerplate |
|
Unknown
|
|
RFC Editor Note |
|
(None)
|
IESG |
IESG state |
|
I-D Exists
|
|
Telechat date |
|
|
|
Responsible AD |
|
(None)
|
|
Send notices to |
|
(None)
|
INTERNET-DRAFT Donald Eastlake
Obsoletes: 4051 Huawei
Intended Status: Proposed Standard
Expires: June 6, 2013 December 7, 2012
Additional XML Security Uniform Resource Identifiers (URIs)
<draft-eastlake-additional-xmlsec-uris-04.txt>
Abstract
This document expands and updates the list of URIs intended for use
with XML Digital Signatures, Encryption, Canonicalization, and Key
Management specified in RFC 4051. These URIs identify algorithms and
types of information. This document obsoletes RFC 4051.
Status of This Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Distribution of this document is unlimited. Comments should be sent
to the author.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
D. Eastlake 3rd [Page 1]
INTERNET-DRAFT Additional XML Security URIs
Acknowledgements
The contributions of the following to this document, listed in
alphabetic order, are gratefully acknowledged: Ernst Giessmann,
Frederick Hirsch, Konrad Lanz, Peter Lipp, HwanJin Lee, Thomas
Roessler, Hanseong Ryu, Peter Saint-Andre.
The following contributors to [RFC4051], on which this document is
based, are gratefully acknowledged: Glenn Adams, Merlin Hughs, Gregor
Karlinger, Brian LaMachia, Shiho Moriai, Joseph Reagle, Russ Housley,
and Joel Halpern.
The document was prepared in raw nroff. All macros used were defined
within the source file.
D. Eastlake 3rd [Page 2]
INTERNET-DRAFT Additional XML Security URIs
Table of Contents
1. Introduction............................................4
1.1 Terminology............................................4
1.2 Acronyms...............................................4
2. Algorithms..............................................6
2.1 DigestMethod (Hash) Algorithms.........................6
2.1.1 MD5..................................................6
2.1.2 SHA-224..............................................7
2.1.3 SHA-384..............................................7
2.1.4 Whirlpool............................................7
2.1.5 SHA-3................................................8
2.2 SignatureMethod Message Authentication Code Algorithms.8
2.2.1 HMAC-MD5.............................................8
2.2.2 HMAC SHA Variations..................................9
2.2.3 HMAC-RIPEMD160.......................................9
2.3 SignatureMethod Public Key Signature Algorithms........9
2.3.1 RSA-MD5.............................................10
2.3.2 RSA-SHA256..........................................10
2.3.3 RSA-SHA384..........................................11
2.3.4 RSA-SHA512..........................................11
2.3.5 RSA-RIPEMD160.......................................11
2.3.6 ECDSA-SHA*, ECDSA-RIPEMD160, ECDSA-Whirlpool........12
2.3.7 ESIGN-SHA1..........................................12
2.3.8 RSA-Whirlpool.......................................13
2.3.9 RSASSA-PSS With Parameters..........................13
2.3.10 RSASSA-PSS Without Parameters......................14
2.4 Minimal Canonicalization..............................15
2.5 Transform Algorithms..................................15
2.5.1 XPointer............................................16
2.6 EncryptionMethod Algorithms...........................16
2.6.1 ARCFOUR Encryption Algorithm........................16
2.6.2 Camellia Block Encryption...........................17
2.6.3 Camellia Key Wrap...................................17
2.6.4 PSEC-KEM............................................18
2.6.5 SEED Block Encryption...............................18
2.6.6 SEED Key Wrap.......................................19
3. KeyInfo................................................20
3.1 PKCS #7 Bag of Certificates and CRLs..................20
Show full document text