A set-key attribute for symmetric-key packages
draft-herzog-setkey-05
The information below is for an old version of the document |
Document |
Type |
|
Active Internet-Draft (individual in sec area)
|
|
Last updated |
|
2012-03-02
|
|
Stream |
|
IETF
|
|
Intended RFC status |
|
Informational
|
|
Formats |
|
plain text
pdf
html
bibtex
|
Stream |
WG state
|
|
(None)
|
|
Document shepherd |
|
None
|
IESG |
IESG state |
|
AD is watching
|
|
Consensus Boilerplate |
|
Unknown
|
|
Telechat date |
|
|
|
Responsible AD |
|
Stephen Farrell
|
|
IESG note |
|
Jonathan Herzog (jherzog@ll.mit.edu) is the document Shepherd.
|
|
Send notices to |
|
jherzog@ll.mit.edu, rkh@ll.mit.edu, draft-herzog-setkey@tools.ietf.org
|
Network Working Group J. Herzog
Internet-Draft R. Khazan
Intended status: Experimental MIT Lincoln Laboratory
Expires: August 31, 2012 February 28, 2012
A set-key attribute for symmetric-key packages
draft-herzog-setkey-05
Abstract
A set-key is a symmetric key (or set of keys) associated with an
immutable set of participants. This document defines a set-key
attribute for use in the CMS-based symmetric-key package structure
[RFC6031].
Disclaimer
This work is sponsored by the United States Air Force under Air Force
Contract FA8721-05-C-0002. Opinions, interpretations, conclusions
and recommendations are those of the authors and are not necessarily
endorsed by the United States Government.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 31, 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Herzog & Khazan Expires August 31, 2012 [Page 1]
Internet-Draft A set-key attribute February 2012
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Set-keys . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2. Symmetric key packages . . . . . . . . . . . . . . . . . . 4
1.3. Intended Usage . . . . . . . . . . . . . . . . . . . . . . 5
1.4. Requirements Terminology . . . . . . . . . . . . . . . . . 5
2. The set-key attribute . . . . . . . . . . . . . . . . . . . . 5
3. Attribute generation . . . . . . . . . . . . . . . . . . . . . 9
4. Attribute processing . . . . . . . . . . . . . . . . . . . . . 12
5. Security Considerations . . . . . . . . . . . . . . . . . . . 16
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16
7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
8.1. Normative References . . . . . . . . . . . . . . . . . . . 17
8.2. Informative References . . . . . . . . . . . . . . . . . . 18
Appendix A. ASN.1 Module . . . . . . . . . . . . . . . . . . . . 18
Appendix B. ASN.1 structures for Attributes . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 20
Herzog & Khazan Expires August 31, 2012 [Page 2]
Internet-Draft A set-key attribute February 2012
1. Introduction
This document defines a new set-key attribute for use in the
symmetric-key package structure defined in [RFC6031].
1.1. Set-keys
A 'set-key' is a symmetric key associated with (and to be limited to)
a specific set of participants (entities). The exact definition of
'participant', in the context of a particular key, will depend on the
key's intended application. Roughly speaking, however, the set of
participants corresponds to the collection of individual agents which
must possess and use the key for the key's intended purpose. In
practice, a 'participant' will often be an entity with a certified
public key, but other definitions of 'participant' are possible.
A set-key can be used in many ways, including:
o To secure broadcast or multicasts of e.g., pay-per-view movies,
o To secure group-communication such as chat rooms, or
o To secure data-at-rest which belongs to a group (such as on an
encrypted file-system or on a server).
The only requirement of a set-key is that it be associated with a
Show full document text