Additional XML Security Uniform Resource Identifiers (URIs)
draft-eastlake-additional-xmlsec-uris-09

The information below is for an old version of the document
Document Type Active Internet-Draft (individual)
Last updated 2013-02-28 (latest revision 2013-02-09)
Stream IETF
Intended RFC status Proposed Standard
Formats plain text pdf html bibtex
Stream WG state (None)
Document shepherd None
IESG IESG state Approved-announcement to be sent::Point Raised - writeup needed
Consensus Boilerplate Unknown
Telechat date
Responsible AD Sean Turner
IESG note Charlie Kaufman is the document shepherd (charliek@microsoft.com).
Send notices to d3e3e3@gmail.com, draft-eastlake-additional-xmlsec-uris@tools.ietf.org, charliek@microsoft.com
IANA IANA review state IANA - Review Needed
IANA action state None
INTERNET-DRAFT                                           Donald Eastlake
Obsoletes: 4051                                                   Huawei
Intended Status: Proposed Standard
Expires: August 8, 2013                                 February 9, 2013

      Additional XML Security Uniform Resource Identifiers (URIs)
             <draft-eastlake-additional-xmlsec-uris-09.txt>

Abstract

   This document obsoletes RFC 4051, expanding and updating the list of
   URIs intended for use with XML Digital Signatures, Encryption,
   Canonicalization, and Key Management. These URIs identify algorithms
   and types of information.

Status of This Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Distribution of this document is unlimited. Comments should be sent
   to the author.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
   Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

D. Eastlake 3rd                                                 [Page 1]
INTERNET-DRAFT                              Additional XML Security URIs

Table of Contents

      Acknowledgements...........................................4

      1. Introduction............................................5
       1.1 Terminology...........................................5
       1.2 Acronyms..............................................6

      2. Algorithms..............................................7
       2.1 DigestMethod (Hash) Algorithms........................7
       2.1.1 MD5.................................................7
       2.1.2 SHA-224.............................................8
       2.1.3 SHA-384.............................................8
       2.1.4 Whirlpool...........................................8
       2.1.5 SHA-3...............................................9
       2.2 SignatureMethod MAC Algorithms........................9
       2.2.1 HMAC-MD5............................................9
       2.2.2 HMAC SHA Variations................................10
       2.2.3 HMAC-RIPEMD160.....................................10
       2.3 SignatureMethod Public Key Signature Algorithms......11
       2.3.1 RSA-MD5............................................11
       2.3.2 RSA-SHA256.........................................12
       2.3.3 RSA-SHA384.........................................12
       2.3.4 RSA-SHA512.........................................12
       2.3.5 RSA-RIPEMD160......................................13
       2.3.6 ECDSA-SHA*, ECDSA-RIPEMD160, ECDSA-Whirlpool.......13
       2.3.7 ESIGN-SHA1.........................................14
       2.3.8 RSA-Whirlpool......................................14
       2.3.9 RSASSA-PSS With Parameters.........................14
       2.3.10 RSASSA-PSS Without Parameters.....................16
       2.3.11 RSA-SHA224........................................16
       2.4 Minimal Canonicalization.............................17
       2.5 Transform Algorithms.................................17
       2.5.1 XPointer...........................................17
       2.6 EncryptionMethod Algorithms..........................18
       2.6.1 ARCFOUR Encryption Algorithm.......................18
       2.6.2 Camellia Block Encryption..........................18
       2.6.3 Camellia Key Wrap..................................19
       2.6.4 PSEC-KEM...........................................19
       2.6.5 SEED Block Encryption..............................20
       2.6.6 SEED Key Wrap......................................20

      3. KeyInfo................................................22
       3.1 PKCS #7 Bag of Certificates and CRLs.................22
       3.2 Additional RetrievalMethod Type Values...............22

      4. Indexes................................................23
       4.1 Fragment Index.......................................23
       4.2 URI Index............................................26

D. Eastlake 3rd                                                 [Page 2]
INTERNET-DRAFT                              Additional XML Security URIs

Table of Contents (continued)

      5. Allocation Considerations..............................30
       5.1 W3C Allocation Considerations........................30
       5.1 IANA Considerations..................................30
Show full document text