CBOR Object Signing and Encryption (COSE): Hash Algorithms

Document Type Replaced Internet-Draft (individual)
Last updated 2019-02-25
Replaced by draft-ietf-cose-hash-algs
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-cose-hash-algs
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


The CBOR Object Signing and Encryption (COSE) syntax [I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods for using hash algorithms. There are however circumstances where hash algorithms are used: Indirect signatures where the hash of one or more contents are signed. X.509 certificate or other object identification by the use of a thumbprint. This document defines a set of hash algorithms that are identified by COSE Algorithm Identifiers.


Jim Schaad (ietf@augustcellars.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)