Additional XML Security Uniform Resource Identifiers (URIs)
draft-eastlake-rfc6931bis-xmlsec-uris-13
|
Document |
Type |
|
Active Internet-Draft (individual)
|
|
Author |
|
Donald Eastlake
|
|
Last updated |
|
2020-12-27
|
|
Stream |
|
(None)
|
|
Intended RFC status |
|
(None)
|
|
Formats |
|
plain text
pdf
htmlized (tools)
htmlized
bibtex
|
Stream |
Stream state |
|
(No stream defined) |
|
Consensus Boilerplate |
|
Unknown
|
|
RFC Editor Note |
|
(None)
|
IESG |
IESG state |
|
I-D Exists
|
|
Telechat date |
|
|
|
Responsible AD |
|
(None)
|
|
Send notices to |
|
(None)
|
INTERNET-DRAFT D. Eastlake
Obsoletes: 6931 Futurewei Technologies
Intended Status: Proposed Standard
Expires: June 26, 2021 December 27, 2020
Additional XML Security Uniform Resource Identifiers (URIs)
<draft-eastlake-rfc6931bis-xmlsec-uris-13.txt>
Abstract
This document updates and corrects the IANA registry for the list of
URIs intended for use with XML digital signatures, encryption,
canonicalization, and key management. These URIs identify algorithms
and types of information. This document corrects three errata
against and obsoletes RFC 6931.
The intent is to keep this draft alive while it accumulates updates
until it seems reasonable to publish the next version.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Distribution of this document is unlimited. Comments should be sent
to the author.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
D. Eastlake 3rd [Page 1]
INTERNET-DRAFT Additional XML Security URIs
Table of Contents
1. Introduction............................................4
1.1 Terminology...........................................5
1.2 Acronyms..............................................5
2. Algorithms..............................................7
2.1 DigestMethod (Hash) Algorithms........................7
2.1.1 MD5.................................................7
2.1.2 SHA-224.............................................8
2.1.3 SHA-384.............................................8
2.1.4 Whirlpool...........................................8
2.1.5 New SHA Functions...................................9
2.2 SignatureMethod MAC Algorithms........................9
2.2.1 HMAC-MD5............................................9
2.2.2 HMAC SHA Variations................................10
2.2.3 HMAC-RIPEMD160.....................................10
2.3 SignatureMethod Public Key Signature Algorithms......11
2.3.1 RSA-MD5............................................11
2.3.2 RSA-SHA256.........................................12
2.3.3 RSA-SHA384.........................................12
2.3.4 RSA-SHA512.........................................12
2.3.5 RSA-RIPEMD160......................................12
2.3.6 ECDSA-SHA*, ECDSA-RIPEMD160, ECDSA-Whirlpool.......13
2.3.7 ESIGN-SHA*.........................................14
2.3.8 RSA-Whirlpool......................................14
2.3.9 RSASSA-PSS with Parameters.........................14
2.3.10 RSASSA-PSS without Parameters.....................16
2.3.11 RSA-SHA224........................................16
2.4 Minimal Canonicalization.............................17
2.5 Transform Algorithms.................................17
2.5.1 XPointer...........................................17
2.6 EncryptionMethod Algorithms..........................18
2.6.1 ARCFOUR Encryption Algorithm.......................18
2.6.2 Camellia Block Encryption..........................19
2.6.3 Camellia Key Wrap..................................19
2.6.4 PSEC-KEM...........................................20
2.6.5 SEED Block Encryption..............................20
2.6.6 SEED Key Wrap......................................20
3. KeyInfo................................................22
3.1 PKCS #7 Bag of Certificates and CRLs.................22
3.2 Additional RetrievalMethod Type Values...............22
4. Indexes................................................23
4.1 Fragment Index.......................................23
4.2 URI Index............................................26
5. Allocation Considerations..............................31
5.1 W3C Allocation Considerations........................31
5.2 IANA Considerations..................................31
D. Eastlake 3rd [Page 2]
Show full document text