Skip to main content

CBOR Object Signing and Encryption (COSE): Hash Algorithms

Document Type Replaced Internet-Draft (individual)
Expired & archived
Author Jim Schaad
Last updated 2019-02-25
Replaced by draft-ietf-cose-hash-algs
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-cose-hash-algs
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


The CBOR Object Signing and Encryption (COSE) syntax [I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods for using hash algorithms. There are however circumstances where hash algorithms are used: Indirect signatures where the hash of one or more contents are signed. X.509 certificate or other object identification by the use of a thumbprint. This document defines a set of hash algorithms that are identified by COSE Algorithm Identifiers.


Jim Schaad

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)