Internet Engineering Task Force                                J. Jansen
Internet-Draft                                                      SIDN
Intended status: Experimental                               M. Sivaraman
Expires: October 10, 2017                    Internet Systems Consortium
                                                           April 8, 2017


             Use of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC
                    draft-muks-dnsop-dnssec-sha3-01

Abstract

   This document specifies the use of SHA-3 (Keccak) hash functions in
   DNSSEC.  It also specifies the use of the RSASSA-PSS signature scheme
   for RSA keys.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on October 10, 2017.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.




Jansen & Sivaraman      Expires October 10, 2017                [Page 1]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Implementations (Editor: to be removed before
           publication)  . . . . . . . . . . . . . . . . . . . . . .   4
   2.  DNSKEY Resource Records . . . . . . . . . . . . . . . . . . .   4
     2.1.  RSASSA-PSS/SHA-2 and RSASSA-PSS/SHA-3 signing keys  . . .   5
     2.2.  ECDSA/SHA-3 signing keys  . . . . . . . . . . . . . . . .   5
   3.  RRSIG Resource Records  . . . . . . . . . . . . . . . . . . .   5
     3.1.  RSASSA-PSS/SHA-2 and RSASSA-PSS/SHA-3 signatures  . . . .   5
     3.2.  ECDSA/SHA-3 signatures  . . . . . . . . . . . . . . . . .   6
   4.  DS Resource Records . . . . . . . . . . . . . . . . . . . . .   6
     4.1.  SHA3-256 digest type DS Resource Records  . . . . . . . .   6
     4.2.  SHA3-384 digest type DS Resource Records  . . . . . . . .   7
   5.  Deployment Considerations . . . . . . . . . . . . . . . . . .   7
     5.1.  Key Sizes . . . . . . . . . . . . . . . . . . . . . . . .   7
     5.2.  Signature Sizes . . . . . . . . . . . . . . . . . . . . .   7
     5.3.  DS Sigest Sizes . . . . . . . . . . . . . . . . . . . . .   7
   6.  Implementation Considerations . . . . . . . . . . . . . . . .   7
     6.1.  Support for SHA-3 Signatures  . . . . . . . . . . . . . .   7
     6.2.  Support for SHA-3 DS Digest Types . . . . . . . . . . . .   7
     6.3.  Support for NSEC3 Denial of Existence . . . . . . . . . .   8
   7.  Examples  . . . . . . . . . . . . . . . . . . . . . . . . . .   8
     7.1.  RSA/SHA2-256 (RSASSA-PSS) Key and Signature . . . . . . .   8
     7.2.  RSA/SHA2-512 (RSASSA-PSS) Key and Signature . . . . . . .  10
     7.3.  RSA/SHA3-256 (RSASSA-PSS) Key and Signature . . . . . . .  12
     7.4.  RSA/SHA3-384 (RSASSA-PSS) Key and Signature . . . . . . .  14
     7.5.  RSA/SHA3-512 (RSASSA-PSS) Key and Signature . . . . . . .  16
     7.6.  ECDSA Curve P-256 with SHA3-256 Key and Signature . . . .  18
     7.7.  ECDSA Curve P-384 with SHA3-384 Key and Signature . . . .  20
     7.8.  SHA3-256 as DS Digest Type  . . . . . . . . . . . . . . .  21
     7.9.  SHA3-384 as DS Digest Type  . . . . . . . . . . . . . . .  21
   8.  Security considerations . . . . . . . . . . . . . . . . . . .  22
     8.1.  Considerations for RRSIG Resource Records . . . . . . . .  22
     8.2.  Signature Type Downgrade Attacks  . . . . . . . . . . . .  22
   9.  IANA considerations . . . . . . . . . . . . . . . . . . . . .  22
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  23
   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  23
     11.1.  Normative references . . . . . . . . . . . . . . . . . .  23
     11.2.  Informative references . . . . . . . . . . . . . . . . .  25
   Appendix A.  Change history (Editor: to be removed before
                publication) . . . . . . . . . . . . . . . . . . . .  25
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  25








Jansen & Sivaraman      Expires October 10, 2017                [Page 2]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


1.  Introduction

   The Domain Name System (DNS) is the global, hierarchical distributed
   database for Internet Naming.  The DNS has been extended to use
   cryptographic keys and digital signatures for the verification of the
   authenticity and integrity of its data.  [RFC4033], [RFC4034], and
   [RFC4035] describe these DNS Security Extensions, called DNSSEC.

   [RFC4033] described how to store DNSKEY and RRSIG resource records,
   and specified a list of cryptographic algorithms to use.  It was
   updated by [RFC5702] to add the SHA-2 family of hash algorithms using
   the RSASSA-PKCS1-v1_5 signature scheme [RFC3447].

   PKCS #1 v2.1 [RFC3447] introduced RSASSA-PSS which is a much better
   signature scheme than RSASSA-PKCS1-v1_5.  The main advantage of
   RSASSA-PSS over RSASSA-PKCS1-v1_5 is that analysis can relate its
   security to that of the RSA problem (Section 8.1 of [RFC8017]),
   whereas the connection of RSASSA-PKCS1-v1_5 to the RSA problem has
   not been proved.  With RSASSA-PSS, an attacker also does not know in
   advance what the encoded message EM will be due to the use of random
   salt that makes fault analysis attacks more difficult to mount.
   Although no attacks are known against RSASSA-PKCS1-v1_5, in the
   interest of increased robustness, RSASSA-PSS is REQUIRED in new
   applications (Section 8 of [RFC8017]).

   SHA-3 is a family of hash functions based on the cryptographic
   primitive family Keccak.  [FIPS.202.2015] states: "The four SHA-3
   hash functions in this Standard supplement the hash functions that
   are specified in [FIPS.180-4.2015]: SHA-1 and the SHA-2 family.
   Together, both Standards provide resilience against future advances
   in hash function analysis, because they rely on fundamentally
   different design principles."  Now that SHA-1's security is known to
   be weakened and the SHA-2 hash algorithms are currently the last line
   of defence for use with RSA in DNSKEYs, and in DS records, it is
   sensible to introduce the SHA-3 hash function family to DNSSEC now to
   prepare for any eventuality.  The SHA-3 hash function family uses a
   sponge construction algorithm that is different from the SHA-2 hash
   function family which uses a Merkle-Damgaerd construction, so the
   possibility that an attack on SHA-2 will affect SHA-3 or vice versa
   is unlikely.

   This document extends the list of DNSKEY algorithms with the RSASSA-
   PSS signature scheme [RFC8017] using the SHA-2 and SHA-3 family of
   hash functions.  It also adds DNSKEY algorithms for ECDSA using the
   SHA-3 family of hash functions.

   [RFC3658] first described the use of DS resource records.  It was
   updated by [RFC4509] and [RFC6605] to add SHA-256 and SHA-384 digest



Jansen & Sivaraman      Expires October 10, 2017                [Page 3]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   types respectively.  This document extends that list with the SHA-3
   algorithms SHA3-256 and SHA3-384.

   Familiarity with DNSSEC, RSA, ECDSA, and the SHA-2 [FIPS.180-4.2015]
   and SHA-3 [FIPS.202.2015] hash function families is assumed in this
   document.

   To refer to SHA2-256 and SHA2-512, this document will use the name
   SHA-2.  Similarly, to refer to SHA3-256, SHA3-384, and SHA3-512, this
   document will use the name SHA-3.  This is done to improve
   readability.  When a part of text is specific for a particular SHA-2
   or SHA-3 hash function, their specific names are used.  The same goes
   for RSA/SHA3-256 and RSA/SHA3-512 which will be grouped using the
   name RSA/SHA-2, and RSA/SHA3-256, RSA/SHA3-384, and RSA/SHA3-512,
   which will be grouped using the name RSA/SHA-3.

   The SHA2-224, SHA2-384, and SHA3-224 algorithms are not used in
   RSASSA-PSS DNSKEYs and RRSIGs.  The SHA3-512 algorithm is not used in
   ECDSA with SHA-3.  The SHA3-224 and SHA3-512 algorithms are not used
   as DS digest types.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

1.1.  Implementations (Editor: to be removed before publication)

   An experimental BIND implementation of this draft can be found in the
   "sha3" branch in the git repository at: https://github.com/muks/bind9

   There is also an experimental implementation based on the ldns
   library, which can be found in the "sha3_and_pss" branch in the git
   repository at https://github.com/tjeb/ldns.

   These can be used to check for interoperability by other DNSSEC
   implementations.

2.  DNSKEY Resource Records

   The format of the DNSKEY RR can be found in [RFC4034].  [RFC3110] and
   [RFC5702] describe the use of RSASSA-PKCS1-v1_5 signature scheme with
   SHA-1 and SHA-2 hash functions for DNSSEC signatures respectively.
   [RFC6605] describes the use of ECDSA with SHA-2 in DNSSEC.








Jansen & Sivaraman      Expires October 10, 2017                [Page 4]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


2.1.  RSASSA-PSS/SHA-2 and RSASSA-PSS/SHA-3 signing keys

   RSA public keys for use with RSASSA-PSS signature scheme using SHA-2
   and SHA-3 hash functions are stored in DNSKEY resource records (RRs)
   with the algorithm numbers as specified in Section 9.

   The key size of RSA/SHA2-256 and RSA/SHA3-256 keys MUST NOT be less
   than 1024 bits and MUST NOT be more than 4096 bits.  This also
   satisfies a requirement of the RSASSA-PSS signature scheme that for a
   hash function that outputs a 256-bit value, the RSA modulus be at
   least 522 bits long.

   The key size of RSA/SHA3-384 keys MUST NOT be less than 1024 bits and
   MUST NOT be more than 4096 bits.  This also satisfies a requirement
   of the RSASSA-PSS signature scheme that for a hash function that
   outputs a 384-bit value, the RSA modulus be at least 778 bits long.

   The key size of RSA/SHA2-512 and RSA/SHA3-512 keys MUST NOT be less
   than 1280 bits and MUST NOT be more than 4096 bits.  This also
   satisfies a requirement of the RSASSA-PSS signature scheme that for a
   hash function that outputs a 512-bit value, the RSA modulus be at
   least 1034 bits long.

2.2.  ECDSA/SHA-3 signing keys

   P-256 and P-384 ECDSA public keys for use with SHA3-256 and SHA3-384
   hash functions are stored in DNSKEY resource records (RRs) with the
   algorithm numbers as specified in Section 9.

   The generation of P-256 and P-384 ECDSA keys follows the same method
   as for [RFC6605].

3.  RRSIG Resource Records

3.1.  RSASSA-PSS/SHA-2 and RSASSA-PSS/SHA-3 signatures

   For signature calculation, this section uses the specifications of
   RSASSA-PSS in PKCS #1 v2.2 (Section 8.1 of [RFC8017]) incorporating
   EMSA-PSS encoding (Section 9.1 of [RFC8017]).

   The values for the RRSIG RDATA fields that precede the signature data
   are specified in [RFC4034].  The value of the signature field in the
   RRSIG RDATA follows the RSASSA-PSS signature scheme and is calculated
   as described in Section 8.1.1 of [RFC8017].  The message M used in
   signature calculation is the argument to the sign() function as
   specified in Section 3.1.8.1 of [RFC4034].





Jansen & Sivaraman      Expires October 10, 2017                [Page 5]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   Within EMSA-PSS-ENCODE, the hash function "Hash" used is one among
   SHA2-256, SHA2-512, SHA3-256, SHA3-384, and SHA3-512 for RSA/
   SHA2-256, RSA/SHA2-512, RSA/SHA3-256, RSA/SHA3-384, and RSA/SHA3-512
   respectively.

   The mask generation function is MGF1 (Section B.2.1. of [RFC8017])
   and the hash function used within the mask generation function is
   also "Hash".

   The length of salt in octets MUST be equal to the length of the
   output of the hash function "Hash" in octets.  The value of salt
   SHOULD be random per signature computation.  A random salt value
   enhances the security of the scheme by affording a "tighter" security
   proof.  However, the randomness is not critical to security.  See
   Section 8.1 of [RFC8017] for the tradeoffs in security due to a non-
   random salt.

   These RSASSA-PSS signatures are stored in the DNS using RRSIG
   resource records (RRs) with algorithm number as specified in
   Section 9.

3.2.  ECDSA/SHA-3 signatures

   P-256 and P-384 ECDSA signatures using SHA3-256 and SHA3-384 hash
   functions are stored in the DNS using RRSIG resource records (RRs)
   with algorithm number as specified in Section 9.

   The generation of P-256 and P-384 ECDSA/SHA-3 signatures follows the
   same method as for [RFC6605], except the collision-resistant hash
   function "H" (see Section 10.4 of [RFC6090]) for P-256 and P-384
   ECDSA/SHA-3 signatures are SHA3-256 and SHA3-384 respectively.

4.  DS Resource Records

   The format of the DS RR can be found in [RFC4034].  [RFC3658],
   [RFC4509], and [RFC6605] describe the use of SHA-1, SHA-256, and
   SHA-384 for the DS digest type respectively.

4.1.  SHA3-256 digest type DS Resource Records

   The implementation of SHA3-256 in DS RRs follows the implementation
   of SHA-256 as specified in [RFC4509] except that the underlying
   algorithm is SHA3-256, the digest value is 32 bytes long, and the
   digest type code is specified in Section 9.







Jansen & Sivaraman      Expires October 10, 2017                [Page 6]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


4.2.  SHA3-384 digest type DS Resource Records

   The implementation of SHA3-384 in DS RRs follows the implementation
   of SHA-256 as specified in [RFC4509] except that the underlying
   algorithm is SHA3-384, the digest value is 48 bytes long, and the
   digest type code is specified in Section 9.

5.  Deployment Considerations

5.1.  Key Sizes

   Apart from the restrictions in Section 2, this document will not
   specify what size of keys to use.  That is an operational issue and
   depends largely on the environment and intended use.  A good starting
   point for more information would be [NIST800-57].

5.2.  Signature Sizes

   In this family of signing algorithms, the size of signatures is
   related to the size of the key and not to the hashing algorithm used
   in the signing process.  Therefore, RRSIG resource records produced
   with RSA/SHA2-256, RSA/SHA2-512, RSA/SHA3-256, RSA/SHA3-384, or RSA/
   SHA3-512 will have the same size as those produced with RSA/SHA-1 and
   RSA/SHA-2 hash algorithms, if the keys have the same length.

5.3.  DS Sigest Sizes

   DS RDATA with digest type SHA3-256 has the same size as DS RDATA with
   digest type SHA-256 (32 bytes).  DS RDATA with digest type SHA3-384
   has the same size as DS RDATA with digest type SHA-384 (48 bytes).
   Corresponding to these existing digest types, it should be possible
   to understand the impact of the size of DS RDATA when using the new
   SHA-3 digest types.

6.  Implementation Considerations

6.1.  Support for SHA-3 Signatures

   DNSSEC-aware implementations SHOULD be able to support RRSIG and
   DNSKEY resource records created with the RSA/SHA-2, RSA/SHA-3, and
   ECDSA/SHA-3 algorithms defined in this document.

6.2.  Support for SHA-3 DS Digest Types

   DNSSEC-aware implementations SHOULD be able to support DS resource
   records created with the SHA3-256 and SHA3-384 algorithms defined in
   this document.




Jansen & Sivaraman      Expires October 10, 2017                [Page 7]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


6.3.  Support for NSEC3 Denial of Existence

   [RFC5155] defines new algorithm identifiers for existing signing
   algorithms, to indicate that zones signed with these algorithm
   identifiers can use NSEC3 as well as NSEC records to provide denial
   of existence.  That mechanism was chosen to protect implementations
   predating [RFC5155] from encountering resource records about which
   they could not know.  This document does not define such algorithm
   aliases.

   A DNSSEC validator that implements RSA/SHA-2 and/or RSA/SHA-3 MUST be
   able to validate negative answers in the form of both NSEC and NSEC3
   with hash algorithm 1, as defined in [RFC5155].  An authoritative
   server that does not implement NSEC3 MAY still serve zones that use
   RSA/SHA-2 or RSA/SHA-3 with NSEC denial of existence.

7.  Examples

7.1.  RSA/SHA2-256 (RSASSA-PSS) Key and Signature

   Given a 1024-bit private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 247 (RSASHA2-256)
Modulus: 0xP+0iFPdhzUUmeYeZZZvddMG1lkpbvbcjSH/mLf/XksiFHq/legqzLQd5QajI3Tc7bIcRuuHPtib2nKm7k4R1SduNxzUyv5z/T9MDOqlQrUOsBveuC5Wf1b+36PLjWJNqnzFkZ9wuQIDF0uDZwGnebWZDJavq306j/XTA/iZtc=
PublicExponent: AQAB
PrivateExponent: uVnMoR7JFTG5rGb1+IbzZQYC+d0kyXhN+lpwtQyEHqPiXA57KT8vgkYL04WFTrlX3ju6hcBFw4Nn6+fdF6Os6zXGgexNh2PqDG+BSSO8P+dH7hNiuV2qSONgkKrJco0aX0q0sAyo7RzRHkAtUUFum//2qMQ7wGZRaVk3FPsFmQE=
Prime1: 8BHCdC21Zfw8cs4IUKSDqg6JZh6GkdHIHyRpgtPQ7pSx99QtIbU9+VoTcJHw09TId7MOm3fZ4nrALYQHFow7gQ==
Prime2: 4RW9O6uh52sNxjpYVqheZj+6Z2LvkIPsbgJQYsqhNLr/vf5apact+WXz5pWMlHOguiXu8qiZa86B1dxmHAkuVw==
Exponent1: t1p5D86RSxE5Ad4GT8E2pj1wB0StNtXoaJCg3UD1xCJhQo0U4zfP25BGZKWyL7fGXFWvhGInUWi7Oogp+bilAQ==
Exponent2: u5c+q2iT+ydBx6AA19hjNJyQYnIWbz9D4TuUe4GdcTEYy+Qc8EqxClZqPBcPnvnvTrUmvJ6/nxXxJ6gUgfE06Q==
Coefficient: m9t6RWOcmP1MLC8YiaxLvsJ1MLe+JTiu+Tzx7plz7bVd9cw0SCbD/X+VXBiDheu2ZyaZ8tuprEX7FdjiTU1Hdg==

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 247 AwEAAdMT/tIhT3Yc1FJnmHmWWb3XTBtZZKW723I0h/5i3/15LIhR6v5X oKsy0HeUGoyN03O2yHEbrhz7Ym9pypu5OEdUnbjcc1Mr+c/0/TAzqpUK 1DrAb3rguVn9W/t+jy41iTap8xZGfcLkCAxdLg2cBp3m1mQyWr6t9Oo/ 10wP4mbX

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (42 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   Using RSASSA-PSS salt filled entirely with 0 valued octets, if the
   inception date is set at 00:00 hours on January 1st, 2000, and the
   expiration date at 00:00 hours on January 1st, 2030, the following
   signed zone (with DNSKEY) should be created:



Jansen & Sivaraman      Expires October 10, 2017                [Page 8]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        42         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)
                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 247 2 3600 (
                                        20300101000000 20000101000000 30005 example.org.
                                        C9c2AuyA6rB3XL08i3PgDtMZC2+sNiY/B94+
                                        flfdxYz1OVmm7+byEVVxmAqw7nEn3MfUGpwj
                                        2E1Thin2pYZ4jF4ep2kz1kDxXWTFnKwwxgAl
                                        nFGeZihBJUUpfXpzIWVOGwkIJIWL+aB3mS3M
                                        Z1EJ2Iok1n37ZO9Uf6tLcZDYLck= )
                        3600    NS      invalid.
                        3600    RRSIG   NS 247 2 3600 (
                                        20300101000000 20000101000000 30005 example.org.
                                        y/qVMuKsW5dqkXBLQmTj+RJ1UCe8JUpLw7/x
                                        yjlwH8qtUxJ3YxkfeDbx7Lah4+mZtYebib2Q
                                        gSedJE/ZERTwsB7njLio/hoMTUIXD/BBGbd3
                                        LyNHj7v6ujZO6HJ2ai46+qtYAXo2PHDV7i4I
                                        AtOJQR1+Lz5Q/Bd6zJKuHiHft6E= )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 247 2 3600 (
                                        20300101000000 20000101000000 30005 example.org.
                                        SjJvbsHI77EZFZnNFYGoFXhKPe8yJy7Jb4Td
                                        mHFabTlpaqjByYlgQUyvB165KrvUBfSm/qMS
                                        NqBJF7t8TmmsMkVpaL90GLYMvkKQexv4qI/X
                                        PKZ++nynOa9HObcjUfgR0x3jLc5K+sRfnYwW
                                        oJqjh+1z0Kb3hq3wawGVmRgZZwA= )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 247 2 3600 (
                                        20300101000000 20000101000000 30005 example.org.
                                        Tkleo5JjLcMDz+JzfG1Pfan4YNVrsLn0z8jJ
                                        RME2LEionhZqLLAScmHy4yBg3RQQI/Ak+516
                                        nBLwr1F23Kh5dkO9ApefKryn1SZP6LndOcBu
                                        tdlq6MzNkqwgpXwFYwTsQtxG0SJPZxA7x5du
                                        0F4QoBe/bC9vK69gra0Zkc0IPos= )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 247 2 7200 (
                                        20300101000000 20000101000000 30005 example.org.
                                        CNggBNHd8AmjG3TGV34Mb6oMycx1OXLU645d
                                        aDvA/LGZ5qBF8Oz5W56rYzpbcUS11rZBBBAb
                                        nscR73oqF89BaHEMzQCpsVkoA8ao/xRAkMl1
                                        N49iKGB5vCR2XnVkhH5b9JVDSK2Td+cWzDN3
                                        O/0Fjg9cviMI/rEt1w29YFkYZxU= )
                        3600    DNSKEY  256 3 247 (
                                        AwEAAdMT/tIhT3Yc1FJnmHmWWb3XTBtZZKW7



Jansen & Sivaraman      Expires October 10, 2017                [Page 9]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        23I0h/5i3/15LIhR6v5XoKsy0HeUGoyN03O2
                                        yHEbrhz7Ym9pypu5OEdUnbjcc1Mr+c/0/TAz
                                        qpUK1DrAb3rguVn9W/t+jy41iTap8xZGfcLk
                                        CAxdLg2cBp3m1mQyWr6t9Oo/10wP4mbX
                                        ) ; ZSK; alg = RSASHA2-256 ; key id = 30005
                        3600    RRSIG   DNSKEY 247 2 3600 (
                                        20300101000000 20000101000000 30005 example.org.
                                        RHImUBMtz6LOEkEZLeeUKY30z1LgknkyawpZ
                                        GLRLiE84UkBAjF559Yk8O6Dm9qTPa7jpu0ja
                                        HAl1WGAHQU45w7t17/onSLJfE+6C9kS6F3N+
                                        qhWu+WWMz6/fvbaoe5EG5v/AkXA/iF3sEPIt
                                        Y5bA3d1IR9bs36fyk3c5c0vb170= )

7.2.  RSA/SHA2-512 (RSASSA-PSS) Key and Signature

   Given a 1280-bit private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 248 (RSASHA2-512)
Modulus: v4LMvpU2sPxQHPOos4PFROf1U02gmzkOdeBjWiY1iEsyDgaGEJ/3x1D4oIVHI9pMVS47JoQvvhnnOnJv5/tslA5ivWsTp0i6rFzY3+F+zDUCA1AcD/rcECgfizC/VZSHvH3aThpjqiwCN6HtC9ofPNqxAikdwMeJP3oUSl3Pg/Y3S8pX2ykHNoq2+tROcypY4VUmbFqJa6SAxBT8EeWgTw==
PublicExponent: AQAB
PrivateExponent: uIbklwIZN4F2A992/rmJ23IRPNoAVXAtkcDKmjNUw2WI7mC0ztIEIgXP+oNQ36fYgv7PubYGdopo9TUMxJ7KqQIPe+nvfvEiBTBVO6r/zOveAJXvq3RuNJ0DCBnhvMhWMha7rRcqp3FixJ9J7cBEwRmJQn+KjrrOZJ9zCFJZ+CQZ5yTTFAdrkjDtpFrg8XUSuDqo85/RFtFUQiMHNzLZsQ==
Prime1: 8ji5lppCo7FCVENMf+a9u5EpXNwH8P+VFHaw99NAKqEV+pWBS24Op8yoRxt6f7mmRe4FTNyTfkkdSpMo5aN6oa1h/vFo14ifFTMU46Vm8ec=
Prime2: ymed+9gYJ/z4ulOPOBrJV6BSVIZgE1hxSkyR68h8fzGvc6iPCf7+JsM7XrIK3Z5dxFQ8WBg7YgbKn05mD1dqU3sJJpIstvKdhvUmaJyVYVk=
Exponent1: J/A+eZyZ3E+/9hDarkQniKPYxBzrmksqE6O2bkaA0AabjyPTm9JbzEMsg/z9581+ow0qBpBgKXR4xfEZzzNzZvEltVmsxc0bHe28RgThwoU=
Exponent2: jWsESRhdGGN57cXARXUBxIWxwHj628lprn39Xn5/7ebrLaZR+qv9K1wxOSKw0NN7tFceqnaT1xPjspb2XDW5hoZqiFaNg23Ufpz+rwzomlE=
Coefficient: 2hX/dV/0jj0IUyAbx5N1I2kIsjf9FJmQHQjktr63YG0CMMBMRNUWF2Y4B3Z3RJHHdeBRvD4r3q7JlkhXvuOWn1EyLFx8ZGOZVboKIcePgUU=

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 248 AwEAAb+CzL6VNrD8UBzzqLODxUTn9VNNoJs5DnXgY1omNYhLMg4GhhCf 98dQ+KCFRyPaTFUuOyaEL74Z5zpyb+f7bJQOYr1rE6dIuqxc2N/hfsw1 AgNQHA/63BAoH4swv1WUh7x92k4aY6osAjeh7QvaHzzasQIpHcDHiT96 FEpdz4P2N0vKV9spBzaKtvrUTnMqWOFVJmxaiWukgMQU/BHloE8=

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (43 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   Using RSASSA-PSS salt filled entirely with 0 valued octets, if the
   inception date is set at 00:00 hours on January 1st, 2000, and the
   expiration date at 00:00 hours on January 1st, 2030, the following
   signed zone (with DNSKEY) should be created:

example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        43         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)



Jansen & Sivaraman      Expires October 10, 2017               [Page 10]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 248 2 3600 (
                                        20300101000000 20000101000000 50019 example.org.
                                        LIqNhZMZthJKDab51kfzn9TtMyWSZ+Z+yOZU
                                        Ukg9j6gAzcezPNiPer9A0FtgDsXFU2ICRDOx
                                        kGeWjhgEN1JGOxA7robpGjOTLWAAYbzSihBE
                                        ehqkpDTJHsmTv3lnjioAFaalFKwisClR1GH9
                                        t7T9sZMEc1G25a4izULX6PiKAjBBegbJ6sGK
                                        6OgCbuxE3yTwJTiPb3/W5IfPbv/bRnETWA== )
                        3600    NS      invalid.
                        3600    RRSIG   NS 248 2 3600 (
                                        20300101000000 20000101000000 50019 example.org.
                                        Sj3JxLM0kH9UDcyO09Zhrupw+0iafH8Yk20I
                                        a2m1S8jnjWrwCQplg/RRcM+9B5rz9AoNZJg7
                                        iHWEwmP9jLK5umbQXP/zCt/5UffdiPSNpGb7
                                        epJ5aNVVfvS00QeqL/yOhwkZcpVd9YszYq+V
                                        Sx6hMHJ9SSqx/CBZZzwjJopOPP4zabha41RY
                                        J/3PG3ohQh7hAigUcNgO4AwxAoV+D/3yQQ== )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 248 2 3600 (
                                        20300101000000 20000101000000 50019 example.org.
                                        GZY8uKkZ2pKhtL9Dh6NKq8GES4WUn9AFOtNc
                                        PHvXVANuMadMh8LwgmtKe7H6HujPW8Ghj0wJ
                                        XRkGJ8kinCRp51eSF0gsr6vIsLiYCx/2XJW5
                                        4dCufvxbbZe3e1yHOOSExLDICT6SQ775CavX
                                        cjnFsI4NAzPO5S+55nq2EvUug7stYeS89mUQ
                                        Wq24FZOnONIY1dbRfpzCkBSs09wXSBtqPQ== )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 248 2 3600 (
                                        20300101000000 20000101000000 50019 example.org.
                                        MY2ha2+UIdeHSEeBLqlb6Ls9gTCO7yUQkz3c
                                        yM3A3Als78y/nz9GsEUjpQ6JGmt3c0Gs64mx
                                        WFl15oo/LWrum/HLwvoXciwZOueCSzIpwjQY
                                        zlqUNNbtKLYLChzMdq07x1Cak/kjF8ROsSpz
                                        rQ5MbQDnLN25IOLy3JodvcZFnzsoxmx2LAJ1
                                        g80Ps4+p5QbTEoASNGGPUR84LPrZ7j4Nrw== )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 248 2 7200 (
                                        20300101000000 20000101000000 50019 example.org.
                                        l2RkbZqizyfnWMThvlt/F2zltQ/DVOmSCQve
                                        JsIe++bJgbyloiLhDnia9ZqwT/apob6VHAgg
                                        KXEII+R6WGuPCBHe3Px2xVFWgh1EU3GnoTWv
                                        JCS1cQ98PpzBiLxIwMAQCp0ItUFj2M2LmZc9
                                        JzvSFW2UCtUK64BCS5aj0qWPPfWuWjM1bJ1d
                                        weyYT+oCKY/GurJbRcjOs4r4Jmsq1PctDA== )
                        3600    DNSKEY  256 3 248 (



Jansen & Sivaraman      Expires October 10, 2017               [Page 11]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        AwEAAb+CzL6VNrD8UBzzqLODxUTn9VNNoJs5
                                        DnXgY1omNYhLMg4GhhCf98dQ+KCFRyPaTFUu
                                        OyaEL74Z5zpyb+f7bJQOYr1rE6dIuqxc2N/h
                                        fsw1AgNQHA/63BAoH4swv1WUh7x92k4aY6os
                                        Ajeh7QvaHzzasQIpHcDHiT96FEpdz4P2N0vK
                                        V9spBzaKtvrUTnMqWOFVJmxaiWukgMQU/BHl
                                        oE8=
                                        ) ; ZSK; alg = RSASHA2-512 ; key id = 50019
                        3600    RRSIG   DNSKEY 248 2 3600 (
                                        20300101000000 20000101000000 50019 example.org.
                                        gGFb305M15oFs/+Mc4r9II2nmqARCt52Rj2y
                                        7aQNKIk7PXqxfdsnRpswmvRL/J0zUsoP/Ecj
                                        E+yLZQpJz0Chycs5UszXCeHxGqx1GandpQaw
                                        LOu02AFI2rdpamD242i3RUSfxjKUpo2MFuS7
                                        c92xUOOkjwn1MAZruUKWPbVzCm3pvqIHTytL
                                        JyGDHI8LqCbhbnf3hP2G45BCzh1cp41EYA== )

7.3.  RSA/SHA3-256 (RSASSA-PSS) Key and Signature

   Given a 1024-bit private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 249 (RSASHA3-256)
Modulus: uI99tnWEAZ5j8hnh29acjTWKUncLZpGWYCWjmz7KB7q8NCiGdA7dgkIBpGrsry0jF8PVGP8jm2omdMaPDX2N0UcEVKrUSKczNQb3Kdiihl1J8/IC9KZuHqQJHr8E4Gu/S4P1EbpaM00F1YPCkldl7yTyXEA6waP2Qs6lfRETffU=
PublicExponent: AQAB
PrivateExponent: ceGgqZBzxufsNfxAgH05lmx+EIqCT2TwTB2NiYLB+OkBrpF+/WgayIBgMQsFRsZsTAK7oDP2zbQ/THkk1ict9PHByDAAedOo+sjYqja7/NMqHZV2y5nfOV2gr/Qkx8Ns/JhcZ6bD0TtS+mTTGZPKxHZYoZKp/EYaRpY/FH/tgBU=
Prime1: 8a4Tyux12glzCP4cLndnDi2MT9M4WRR0B+8SjU1zoZVgOiF7WnCD6go3LAGl8SbiMzX491cJFKuK7/0qY4wTcw==
Prime2: w37/PBybwbTCtWJeGQo5sZUmAfcB4G9KPb0Xx7attTlVcvS3BsNxQ6u5CJS6PkxrRLJhObY0co97esbRlfXe9w==
Exponent1: X5pyH/LcR+03AVasRUFclgI0oBs5DhwGLmFHYHhEBqZ1k2lNR6B8vmdeHd1lDHlKP+HY49cdM30MkBUA4LI3uw==
Exponent2: P7FYptULSgkChuYNkkrqkRju0SUQz3Zy0bqRzNePsMOFO3bPSrzSYiHInysVosZzDGaxloPugoSMzmuITTtV8Q==
Coefficient: NdPPfYznkez2NNKsVydeZleq+jOBaQ3O98YZteXreOrH8L+pqKxkymKIvqjiTzWdA+fDV7KfFrbv0ZFwGymsNQ==

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 249 AwEAAbiPfbZ1hAGeY/IZ4dvWnI01ilJ3C2aRlmAlo5s+yge6vDQohnQO 3YJCAaRq7K8tIxfD1Rj/I5tqJnTGjw19jdFHBFSq1EinMzUG9ynYooZd SfPyAvSmbh6kCR6/BOBrv0uD9RG6WjNNBdWDwpJXZe8k8lxAOsGj9kLO pX0RE331

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (44 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   Using RSASSA-PSS salt filled entirely with 0 valued octets, if the
   inception date is set at 00:00 hours on January 1st, 2000, and the
   expiration date at 00:00 hours on January 1st, 2030, the following
   signed zone (with DNSKEY) should be created:




Jansen & Sivaraman      Expires October 10, 2017               [Page 12]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        44         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)
                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 249 2 3600 (
                                        20300101000000 20000101000000 23809 example.org.
                                        Uwq4O7WnX3WgD4gqrE931DqCByyWgf6+YfZe
                                        vRCTzMe+/q/36pWhYhej6wI3Fo2JRImMeL85
                                        IEdQNEUOcZ4SyfbnC/x44Tj3xlF1imf40dWy
                                        /HDLAdAlCfL1bZVxd6KNPBoGsZmWqqdePguC
                                        Kvv6KpZB5bmQhlPJHmcevUajG80= )
                        3600    NS      invalid.
                        3600    RRSIG   NS 249 2 3600 (
                                        20300101000000 20000101000000 23809 example.org.
                                        WXtpjYg9ZGDYBn01HBZwrHiJ8pccXicaLt6e
                                        ck1lYFER1/Gw3oroFvHeI7l8WuyGyjm7QnXP
                                        /avYGX7tAmObgKRh08gk2tDj8Ku6aKYRunVh
                                        jobJi2WEsKBMCScwhjK64WJV90pOrWiU7/j6
                                        D8fwTySTSmQJXn7mG/0ynIiwruw= )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 249 2 3600 (
                                        20300101000000 20000101000000 23809 example.org.
                                        K718CGTXBAKJ3ug5YsHGtr4tPvHrrPFw0YCN
                                        v97mU25mhBerDNLyNISCsMQPw0NVnXyV7BR0
                                        8dpwnmZqGIhId4ojaSKCZtQkUkNiqrF77sZe
                                        2jryHi8VvuT9JqFa+JI3vUHLavnGabc40qEC
                                        zTtP8g1I3CEopnp6QDkLxyjwVhQ= )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 249 2 3600 (
                                        20300101000000 20000101000000 23809 example.org.
                                        e8EgXwu/7VvU83ZW8gEiS+51HUfgkowoichs
                                        9L7U5eX1axrynM7c3r7WvFy1hNGLxrzZOU7e
                                        r8R+0QG989x1lwPSHeETryQ/5sUApOeoaFYj
                                        3D+IZEzI0gGfHIXP+zZ2kRW3tQx0Bn1JHPWx
                                        1+JOwFdfJB4jczG6YwydRVaWd3M= )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 249 2 7200 (
                                        20300101000000 20000101000000 23809 example.org.
                                        rfCOWKNWnlLoXuLPqE5fhq7yN10BZbZ0cCj7
                                        8c4DROMIXistBFRoNhYngTDratXojbJGCO4F
                                        nbA3kSOh91RaSevASHDF9SvAysKUqWIYw4Mx
                                        hLROhu9TjE7i3VgYt6rEHoQIMroOry3dao48
                                        12mcadWl4MgoDyJAxTbUGZyTeFY= )
                        3600    DNSKEY  256 3 249 (
                                        AwEAAbiPfbZ1hAGeY/IZ4dvWnI01ilJ3C2aR



Jansen & Sivaraman      Expires October 10, 2017               [Page 13]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        lmAlo5s+yge6vDQohnQO3YJCAaRq7K8tIxfD
                                        1Rj/I5tqJnTGjw19jdFHBFSq1EinMzUG9ynY
                                        ooZdSfPyAvSmbh6kCR6/BOBrv0uD9RG6WjNN
                                        BdWDwpJXZe8k8lxAOsGj9kLOpX0RE331
                                        ) ; ZSK; alg = RSASHA3-256 ; key id = 23809
                        3600    RRSIG   DNSKEY 249 2 3600 (
                                        20300101000000 20000101000000 23809 example.org.
                                        hgKUSu/6JOKBEA9LavThiPFsDk0JOK4fsCiJ
                                        cR8Y/uAKyTlZ77m7olSWnbhSmAkzM2dST4eb
                                        KfCKgz+v6B0H+TGuuVZ9nriFggRsUu0uddsD
                                        sgOVuWB2XC0e0lJMxpYht/DQd6ZLc++XhWyK
                                        a9a0Iw9/bcIFaKY+bhn0zWp3y9k= )

7.4.  RSA/SHA3-384 (RSASSA-PSS) Key and Signature

   Given a 1024-bit private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 250 (RSASHA3-384)
Modulus: xHuxiHax4XcfW9yCIdCVdrqs+L1lfTZKdOK7C+J8yDptcyS7DC8Su0X4hqJxA3M0gZFfpwSpuc1/XSwm0pDCqByy1qehIZgJMQ9dm6whqokGgqcpOxEbLhKDHoUl6dq6MVZAoys2wYgpEwK9E0GPx1OT80EeO/8txqyIx1b3X1s=
PublicExponent: AQAB
PrivateExponent: vFr/xBxVRhkWPM/VCGmW/uzR6NpXsoMbOZYpTalfietJBTrO/U0bHeBj8V1EDdShHxynn8r+khoH4N/0j6MqlqEnKmL7lTDeGV5ezKLu3uLFa6RISolasqpQBqptImJ+hbXtozDKPhfjI/+d9FZBB6J1g2RlwujGX6VJMbSefvE=
Prime1: /fmeKF6OHGM9aWJq4j2/tNgbdTdy9tP2pi7VG4w7MZcXtt5jRuwDt9RfBb0i01+KOROWyIklTeHC3OIdU6otLw==
Prime2: xgy6/HX5aChVos1eunk1ZezvweGNfBuZr4TcpcTShzLs8ftGs/fAZ6Ea44p7EZizB1yaEspfcvTMHFnC709dlQ==
Exponent1: 3UV/P9ixo5XqyUgPqzD1NxAZTBSVOusNN1gSH0AbymbDKHW0tPOngZ+rcgqIrvPML1IbyneCYspQxbTSrDPVzQ==
Exponent2: BOFlbjk+ByoPSi7Dadb40OUw11dGlEtd0yxz/4XFJl3D5wapLGArlqIqtnbAJ6ParZDDnzjrdzq/GOfBXQJYrQ==
Coefficient: NPxHl0td8V/7Sk7dnGfF6Fbde3Kwt8PUUsVulh3rsr1wjmWeW6JFBxd8R104k+HicCXrLj+YthGmLS3jCwnidQ==

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 250 AwEAAcR7sYh2seF3H1vcgiHQlXa6rPi9ZX02SnTiuwvifMg6bXMkuwwv ErtF+IaicQNzNIGRX6cEqbnNf10sJtKQwqgcstanoSGYCTEPXZusIaqJ BoKnKTsRGy4Sgx6FJenaujFWQKMrNsGIKRMCvRNBj8dTk/NBHjv/Lcas iMdW919b

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (45 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   Using RSASSA-PSS salt filled entirely with 0 valued octets, if the
   inception date is set at 00:00 hours on January 1st, 2000, and the
   expiration date at 00:00 hours on January 1st, 2030, the following
   signed zone (with DNSKEY) should be created:

example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        45         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)



Jansen & Sivaraman      Expires October 10, 2017               [Page 14]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 250 2 3600 (
                                        20300101000000 20000101000000 54407 example.org.
                                        i7x4t2CwGks6qLxRxbdp+pakfK27TzN91vug
                                        UPyU+TmOzPYqQoS2MOjJn8TVuje9vZ4EnuzZ
                                        cTZCkO44r9XIgqth4tY5aJfK8otr30DYYwYd
                                        GOv719RBypf11JOk9FW4+rcgsSfTu3z3+a78
                                        PuGh5oR7fUGlg/d0//WraW+Zg+E= )
                        3600    NS      invalid.
                        3600    RRSIG   NS 250 2 3600 (
                                        20300101000000 20000101000000 54407 example.org.
                                        c1o2/g51y3eo3E3+28Ot1k4vg4sE8MEIHdel
                                        rD35/XAOzDZ8PH0HmrBzYEGUTk7Dxv8ts0Yj
                                        M9xtoF9HIxlmOF19yjKrT7LNpXmbcbxA/NNH
                                        kNOqX3EzsLZFD1t7btDqKtj+CaslkxMe6JnH
                                        m03CtRj6b2YF4TROa8swzElwMSc= )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 250 2 3600 (
                                        20300101000000 20000101000000 54407 example.org.
                                        UXoGfLBwSu4b0bMrUvf6QC4Yn/WspMpv5ARf
                                        Z2aZPZABB5ZTdmSLXuvRP4XG9OZNiQhBKCVs
                                        4gLi2MutsVD8AB6N3inJcvNefty8l7+wdnUk
                                        HKuLk8O+/GCB0394nIJTKnazGPhUJtlZucZV
                                        jSNlo+OVLqCqcKtUjG+YB63J5V0= )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 250 2 3600 (
                                        20300101000000 20000101000000 54407 example.org.
                                        hMN/J/JZEyMhC9RqJpowhidhSRQCOeiTWyhX
                                        i7+prwrtJ0CccOmakac2QjuKBOEkeXOzUpLL
                                        nXY83uObZCvWg3HouhZX+y9CgLueqRjfK2Sr
                                        KrBLM1zXceqg2zjjxr7UjYn9ty6sJeOJbQLk
                                        LDEOW7fPPSLPELa0S8kS6Z5X/6E= )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 250 2 7200 (
                                        20300101000000 20000101000000 54407 example.org.
                                        ZTSVWOyH0HY6OYKDhjAqDlhdPjgzSx6ihA5/
                                        Nu1tOJgtxXR+/55PGdplIfS3Q4vujqbbwjD1
                                        EcSGUgVP9lnL4wqq2YwSALj3e5K216wRhBKz
                                        G5YwFrduYZAP57nGdykzeNQZRB1bEpLUEzrP
                                        /u+TQCTrLDSTMv4s61gN9d02gl0= )
                        3600    DNSKEY  256 3 250 (
                                        AwEAAcR7sYh2seF3H1vcgiHQlXa6rPi9ZX02
                                        SnTiuwvifMg6bXMkuwwvErtF+IaicQNzNIGR
                                        X6cEqbnNf10sJtKQwqgcstanoSGYCTEPXZus
                                        IaqJBoKnKTsRGy4Sgx6FJenaujFWQKMrNsGI
                                        KRMCvRNBj8dTk/NBHjv/LcasiMdW919b



Jansen & Sivaraman      Expires October 10, 2017               [Page 15]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        ) ; ZSK; alg = RSASHA3-384 ; key id = 54407
                        3600    RRSIG   DNSKEY 250 2 3600 (
                                        20300101000000 20000101000000 54407 example.org.
                                        iFy/6jk0In+egxxxOGzvknZ2gufOFAlrvZ4Q
                                        2Ufa2hLKvJOhsQrpcEfHtB5vGivZJ9WwShjw
                                        5n5YlBE/VKyy/IpycgJwybrBBPimNViwfn8y
                                        BunXT7x/OJ0tSeDxr1ab/CwPBl+0uq3RsDqs
                                        5qJTL5pmN5JD6kR2tRVvy3MicTM= )

7.5.  RSA/SHA3-512 (RSASSA-PSS) Key and Signature

   Given a 1280-bit private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 251 (RSASHA3-512)
Modulus: o+YkFXrbuWtwzgjWTMxKWL/mxKmZiIEwZQocnh0XN8ON6AIFc+aECjkxwO5pWG171NCXt2acYWnKakpCmpiSHh9ggj8hL5O67Zs409xo0vqRpXzxY27IvBtKNurtD48RiPknLh3fEhuRnHEj8X2fpuOUx0yN5wOZx3PRjNxMeLnTglxHfRqah/tApQnCTvBAWX5vSYmPP1u/4I/UR1Zpyw==
PublicExponent: AQAB
PrivateExponent: TJqZTOzSW7SK0dGxj82ABkETM+HtH676Fo+GVqRUIL0my0R+lfAs0LZwubL0y97IHOytrIuqFaGjeNBilu0uhiO2MMoe0aTjnoCJLAR9ffXdqZb1FGMn8kWkmmtZJbm3LzFYHMs4B0exGq4vI2DfX5UF0LZV1YN4WIk2jgMPgRdJRZOOr0ZyJs8dz4VwhuVZx6SRa4ADB22QIRUdCCEESQ==
Prime1: 0fpRrO03qcRgQpwNiiw0sjBguAClUVMY9H+ZLwUrAsiP65/ikHOOXTve7aAW/OMnAmKdmpaA0jeMiYdwidMcdwVJbZM0qHsqkxrVZmtgFy8=
Prime2: x9Jgn/DLIVzcPl8VazyWcn51hbM2xd8J5fZYp/ZPVJBDlfvlICT6YbpYg8CyPjUpoDM4JnAH9v0sICO7GgrvQIY5XEYnLmUttdBj8+D58CU=
Exponent1: lXLZcQABrzYS4TXauS5Pb0fZfv0OrPw89cBfkcTW4QtIzAanJfLpL9iuCWj5E5LFMABqdh2KoJRi1XvtkFsOlnPP2Ep+ny/SlJLzsgrYgIc=
Exponent2: fsVfe9keZhotuHxGcHRN1nGYSax7MWnhM73oXRcNGU81MbBPmuca2mmIwn28F29O603Tb79frjjMh89jYpBRXZRKS9pN/Uc/iruczhqLNuk=
Coefficient: JF5wby8oSnh2Hqff02l7tA80wNf99YWUPSn3yHfuoQKgn274V2N/QE4XgcpJd+ioSkKNX+GV6RpG+b8gUiR1hCxHBPpmeb/QcA9ivnrW0L0=

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 251 AwEAAaPmJBV627lrcM4I1kzMSli/5sSpmYiBMGUKHJ4dFzfDjegCBXPm hAo5McDuaVhte9TQl7dmnGFpympKQpqYkh4fYII/IS+Tuu2bONPcaNL6 kaV88WNuyLwbSjbq7Q+PEYj5Jy4d3xIbkZxxI/F9n6bjlMdMjecDmcdz 0YzcTHi504JcR30amof7QKUJwk7wQFl+b0mJjz9bv+CP1EdWacs=

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (46 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   Using RSASSA-PSS salt filled entirely with 0 valued octets, if the
   inception date is set at 00:00 hours on January 1st, 2000, and the
   expiration date at 00:00 hours on January 1st, 2030, the following
   signed zone (with DNSKEY) should be created:

example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        46         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)
                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 251 2 3600 (



Jansen & Sivaraman      Expires October 10, 2017               [Page 16]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        20300101000000 20000101000000 23118 example.org.
                                        OLszLePpxC9kXYEHP+xnQ/5VVGUuIECXHzEG
                                        ksSPKttAmztjP3GVZpNCqYsahV7yKKkkd6TX
                                        h45w9pho8ZWDabPdCjzCiwl5aL+OvzUWXeGJ
                                        chObfU1AFsW3I03V5/8KUzH6o1CCTDbYbLeP
                                        saI/HH+G4k6mbLU1vNBCKjT8U2wY2T3mtCry
                                        a9heSY0UbORoQpilzljhtmyU86LfItD7tg== )
                        3600    NS      invalid.
                        3600    RRSIG   NS 251 2 3600 (
                                        20300101000000 20000101000000 23118 example.org.
                                        LtjteiIhqrJWOJDvVHB2YBdpOPtc62N40uGe
                                        GoSj9S9pU8UEte8K4T+TQGefc89SQQMBKMl+
                                        LtdKY4G9pTLBSVzpUw1ht4hZvwU5mKURWDJ7
                                        +ZR14ic4Sh91R79U4BZCxe7DbQa+3JWhBLVo
                                        KFsmsFwlStpWSe97xoQNiyC33Y0TRl2S/7TF
                                        p3ewL2owYRraSZZqj+UAM3oLXPyYJoD71A== )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 251 2 3600 (
                                        20300101000000 20000101000000 23118 example.org.
                                        HcOfonaxmSgcjmoRCkrf0mm3K/6zbQQyseI5
                                        u/dmqN04jGjO8OfinRX6wWe2uaQUCTSITyD+
                                        BONJa9BotX36uDJgtm+UYqz+xFSrF/Wolb9X
                                        GrKBzRJXwKGL8z/gcIJMn1VchSwcFIhh+w4K
                                        QAxWmpm2mNdbL83D1Ep+dRgLgsawubhwc2t0
                                        UM6kLJgsx8qYEDDVk6f0UKFWBobseyP5pQ== )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 251 2 3600 (
                                        20300101000000 20000101000000 23118 example.org.
                                        AvBYmq6oMCOAQi4DpSpo5+cRUX+vZQgvaNH8
                                        JnT68vibTlyxlUOa5BlxQv7IrrjrM7af73Ny
                                        6tdZfUoQouSpThCs22cPC4T5RPZvSvWzejGc
                                        Fc8ElNOFmftx4d3ag6cIn9Wj74gEAgmqmp+j
                                        uB7/hYK12A2/shgDr0S1UEax2YehBNXdViHZ
                                        aSwSQoLrW25zN4ENgnVkMKUQ/2OIOhyKrg== )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 251 2 7200 (
                                        20300101000000 20000101000000 23118 example.org.
                                        MeDqwUq8KuJiSLZBefoJqgvuQ6Nlm+IPDFMA
                                        jZUkov419KPqItr29YIG+7lL8Ow/PRVbb0mM
                                        VfVUTIKWC1bfAhO2FBAQJTIzAeFELnUSsTaa
                                        jcNdRSen8VosEh3822rwjqcQD5hhm52v7ZCT
                                        QgrRrgoZBuCHU9dDHNfauUie0mrnCqiuFRjR
                                        DafCZeqYzzIpZVDIjyFDwu2LRzkyKduHug== )
                        3600    DNSKEY  256 3 251 (
                                        AwEAAaPmJBV627lrcM4I1kzMSli/5sSpmYiB
                                        MGUKHJ4dFzfDjegCBXPmhAo5McDuaVhte9TQ
                                        l7dmnGFpympKQpqYkh4fYII/IS+Tuu2bONPc
                                        aNL6kaV88WNuyLwbSjbq7Q+PEYj5Jy4d3xIb



Jansen & Sivaraman      Expires October 10, 2017               [Page 17]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        kZxxI/F9n6bjlMdMjecDmcdz0YzcTHi504Jc
                                        R30amof7QKUJwk7wQFl+b0mJjz9bv+CP1EdW
                                        acs=
                                        ) ; ZSK; alg = RSASHA3-512 ; key id = 23118
                        3600    RRSIG   DNSKEY 251 2 3600 (
                                        20300101000000 20000101000000 23118 example.org.
                                        SUr4RUGNadiJ7pJe8X2bnnUuHbNY3yq1S+/W
                                        NRpfXT5RReL8Ag5QuBQAnKwkqbV0UFeM3D0S
                                        xX46BY/75LerOIqy8FHaXbk9qiLBaX9E7/cV
                                        vUhkf9Dbp26Irc59AQCAB0OQ/e55onU3NRsY
                                        TWrujs0cyOo2B8eSHPcd8M2Yvwyh/ZEQNfUj
                                        YXKwAO6a+DZeId9BwU0KiEcrLs/KP2gzEQ== )

7.6.  ECDSA Curve P-256 with SHA3-256 Key and Signature

   Given a private key with the following values (in Base64):

   Private-key-format: v1.2
   Algorithm: 245 (ECDSAP256SHA3-256)
   PrivateKey: FHj8A/R6a/L9gP0cEyi/2ILg8d7ooxrS332FZNuED2c=

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 245 5DuYfUIL3CQAibLVRZkHNX8RsmMgXYMVwSWsWvSFqhULW6UhzF0NV4wT Vw6eFTWrJMH421Uk+SI1YFxSL5a77g==

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (40 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   If the inception date is set at 00:00 hours on January 1st, 2000, and
   the expiration date at 00:00 hours on January 1st, 2030, the
   following signed zone (with DNSKEY) should be created:
















Jansen & Sivaraman      Expires October 10, 2017               [Page 18]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        40         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)
                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 245 2 3600 (
                                        20300101000000 20000101000000 43839 example.org.
                                        Lwigfv/bGllB3Oy8VwxiocNv9Gzcmkm3I90x
                                        dRR2EE8m7mAB6STKrCAWb/W6FS0idcQPiSgL
                                        8uCb0yepcmbtFw== )
                        3600    NS      invalid.
                        3600    RRSIG   NS 245 2 3600 (
                                        20300101000000 20000101000000 43839 example.org.
                                        I/z7I5Q7L6Gec/NynbXGg5gtbVh9DBMFuvX2
                                        6eD6OOeORC7As6/oQmb1kXaHPpLj4amg+f/n
                                        HnJHUfYweLuq+Q== )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 245 2 3600 (
                                        20300101000000 20000101000000 43839 example.org.
                                        PuehYLyx2uSSTe1lsmCmu0fe9Lty4IMB7BMY
                                        q106Q95EmDU9NE93aNn/N3jY3aXSrr2Omumg
                                        UDixTS/b3WTI7A== )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 245 2 3600 (
                                        20300101000000 20000101000000 43839 example.org.
                                        jmQwgJCvCC1JLGLpOTUYq8p4w3x3RQ4U1Qaj
                                        Wg1w/PZUX2L931+UScQCgxEeUMEsPBQfDRD2
                                        ngjaSy3EPacAmg== )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 245 2 7200 (
                                        20300101000000 20000101000000 43839 example.org.
                                        7TtsB8CoVLjTGx3yDVDwOcGsG3+1FdC4S9zl
                                        jSOPIYfRD3KnlBPE+9fyl/5YIz9JDLu+AiJI
                                        49gk+PHBru63EA== )
                        3600    DNSKEY  256 3 245 (
                                        5DuYfUIL3CQAibLVRZkHNX8RsmMgXYMVwSWs
                                        WvSFqhULW6UhzF0NV4wTVw6eFTWrJMH421Uk
                                        +SI1YFxSL5a77g==
                                        ) ; ZSK; alg = ECDSAP256SHA3-256 ; key id = 43839
                        3600    RRSIG   DNSKEY 245 2 3600 (
                                        20300101000000 20000101000000 43839 example.org.
                                        oRrJQrqVwC+fAtXzUQELelLopUXZEcOLkGiP
                                        kyOtu5/K9/PlTPibU9szJeVJwS1L8FBHetsq
                                        NWw6YKBpRzZQGw== )





Jansen & Sivaraman      Expires October 10, 2017               [Page 19]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


7.7.  ECDSA Curve P-384 with SHA3-384 Key and Signature

   Given a private key with the following values (in Base64):

Private-key-format: v1.2
Algorithm: 246 (ECDSAP384SHA3-384)
PrivateKey: FaHBWT7qWcJF2J4ExUPgBZ1poxJ/Cwvzv6+BF5rGT3KuIs83ABt51ITt4hVwaGfc

   The DNSKEY record for this key would be:

example.org. IN DNSKEY 256 3 246 KQdbXXFXMQBV7lAOrRwFYRitDHNxZEXbVYz7FxAkwlGNYdkEePKE7Wfz AgatdexHHeKTG61+3bkW5tf+pSanH8pV6y9fhZQt6gf6v2XD8jPI3rMa 9ucGNf8PThBzVAVT

   With this key, sign the following zone consisting of 4 RRs:

example.org. 3600 IN SOA invalid. hostmaster.example.org. (41 43200 900 1814400 7200)
example.org. 3600 IN NS invalid.
example.org. 3600 IN A 192.0.2.1
example.org. 3600 IN AAAA 2:2001:db8::1

   If the inception date is set at 00:00 hours on January 1st, 2000, and
   the expiration date at 00:00 hours on January 1st, 2030, the
   following signed zone (with DNSKEY) should be created:

example.org.            3600    IN SOA  invalid. hostmaster.example.org. (
                                        41         ; serial
                                        43200      ; refresh (12 hours)
                                        900        ; retry (15 minutes)
                                        1814400    ; expire (3 weeks)
                                        7200       ; minimum (2 hours)
                                        )
                        3600    RRSIG   SOA 246 2 3600 (
                                        20300101000000 20000101000000 34779 example.org.
                                        ZPWX28z79mJc3UbHfubZOdEKPg1BiKy9vdLV
                                        GiGIDU6QDFSci3NmGdjFKfuS31EEjmehVu1M
                                        CaJRFmbl/q1HhoFzuRVnGLkdHr+krBCon9Uo
                                        3l5EEyorRFCOg5Ro5i/z )
                        3600    NS      invalid.
                        3600    RRSIG   NS 246 2 3600 (
                                        20300101000000 20000101000000 34779 example.org.
                                        nAwt7QstHenYC2h9eX7J0p33QRE3S+C7+Wz/
                                        LTOEWqtm0AfU10hnFmnw6OGmxkp2ll2d2qh1
                                        JjrkEPDwg0jlM12SFDTQmwW5TnRQV89N16R2
                                        0KKnoxrdnMSO8WhhnaYG )
                        3600    A       192.0.2.1
                        3600    RRSIG   A 246 2 3600 (
                                        20300101000000 20000101000000 34779 example.org.
                                        ATgXx7BFVUQYFBXx/xiTq2T1CWUAuFmNpqF/
                                        JYVXi0elgImh3a+q6ZCUATUmSvlmDMW6KEhY



Jansen & Sivaraman      Expires October 10, 2017               [Page 20]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


                                        ggr2MdJnT4nm0Qo3ellq8mUAvY2X9/yON9Eh
                                        D+Ist8SZ7WDe7UX8Pe9H )
                        3600    AAAA    2:2001:db8::1
                        3600    RRSIG   AAAA 246 2 3600 (
                                        20300101000000 20000101000000 34779 example.org.
                                        T7DAgHgxAFNXp5I/alyc5Vp4jsE/L/C9v6NY
                                        6j+I3RyiCCGY0PY8JY4R4iEd2QB9GPl0zByF
                                        bGVz3MfxiyF/r/BB1zdzgqCcsZ7O932sOuRj
                                        PQFHV7TuKabl0INvnjAs )
                        7200    NSEC    example.org. A NS SOA AAAA RRSIG NSEC DNSKEY
                        7200    RRSIG   NSEC 246 2 7200 (
                                        20300101000000 20000101000000 34779 example.org.
                                        Tc7HYK4o1ZYYdkSbykdG1aR3dgK/Ah8evaKp
                                        4hfBm9R9GiWlusEhD6OWPGKjw2Y8zC/yb9h0
                                        S4lj5TvbzRFY8xfvoys6w9x4KSo89bAAIIkQ
                                        ojBivLF8GlXOhDApeqr3 )
                        3600    DNSKEY  256 3 246 (
                                        KQdbXXFXMQBV7lAOrRwFYRitDHNxZEXbVYz7
                                        FxAkwlGNYdkEePKE7WfzAgatdexHHeKTG61+
                                        3bkW5tf+pSanH8pV6y9fhZQt6gf6v2XD8jPI
                                        3rMa9ucGNf8PThBzVAVT
                                        ) ; ZSK; alg = ECDSAP384SHA3-384 ; key id = 34779
                        3600    RRSIG   DNSKEY 246 2 3600 (
                                        20300101000000 20000101000000 34779 example.org.
                                        WpuLvqdHWbmggF7tTgXkFuoHFgPgY7Tl35zg
                                        jLEEgZJJUXDEDOC2pFpYVJljVPGptUW4EWOM
                                        CoCu70UTPpTJUnXWQgYH/2lW2SjWk7KM36rH
                                        nWkRklSxtL8y00IV1/Nt )

7.8.  SHA3-256 as DS Digest Type

   Given a 1024-bit RSA/SHA-256 DNSKEY with the following contents:

      example.org. IN DNSKEY 256 3 8 AwEAAbljrZZb1Qyq8ui+vnYL5exWSrQYFkCFD6VvJoJr5ADo7CxZiyxu sJM6oVHF7pA22rKJqjgIR9lksZ1+nT2WcwdXQuAFLrLFAI5L42mQKOHS hx1S3vHosO0iSIX47IyyR2O+J9qLhy7B+T4cJzAq2dOtSziqL1l5BCtw 5ZNYJX8N

   The DS record for this key with digest type SHA3-256 would be:

      example.org. IN DS 25803 8 252 AE03EA9388D4BA12725999B8E2C4ED14E06EAE8B78229B81154F61FE8EDBAA5F

7.9.  SHA3-384 as DS Digest Type

   Given a 1024-bit RSA/SHA-256 DNSKEY with the following contents:

      example.org. IN DNSKEY 256 3 8 AwEAAbljrZZb1Qyq8ui+vnYL5exWSrQYFkCFD6VvJoJr5ADo7CxZiyxu sJM6oVHF7pA22rKJqjgIR9lksZ1+nT2WcwdXQuAFLrLFAI5L42mQKOHS hx1S3vHosO0iSIX47IyyR2O+J9qLhy7B+T4cJzAq2dOtSziqL1l5BCtw 5ZNYJX8N

   The DS record for this key with digest type SHA3-384 would be:

      example.org. IN DS 25803 8 253 BA8A4350F844CCCB8308694B3ADD478FC7EFBAC936D82D482D88F792FAB0766567E1F58F3A1075708CCC0457C9435ECA



Jansen & Sivaraman      Expires October 10, 2017               [Page 21]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


8.  Security considerations

8.1.  Considerations for RRSIG Resource Records

   DNSSEC implementations are encouraged to implement the new algorithms
   in this document as soon as possible now that SHA-1's security is
   known to be degraded and the SHA-2 hash algorithms are currently the
   last line of defence for use with RSA in DNSSEC.

   Users of DNS software are encouraged to deploy these new algorithms
   with DNSSEC when software implementations allow for it.  Users are
   encouraged to run DNSSEC validator implementations that support these
   new algorithms when they are available.

   The RSASSA-PSS signature scheme and the SHA-3 hash function family
   are considered sufficiently strong for the immediate future, but
   predictions about future development in cryptography and
   cryptanalysis are beyond the scope of this document.

8.2.  Signature Type Downgrade Attacks

   Since each RRSet MUST be signed with each algorithm present in the
   DNSKEY RRSet at the zone apex (see Section 2.2 of [RFC4035]), a
   malicious party cannot filter out the RSASSA-PSS RRSIG and force the
   validator to use a RSA/SHA-1 signature if both are present in the
   zone.  This should provide resilience against algorithm downgrade
   attacks, if the validator supports RSASSA-PSS.

9.  IANA considerations

   This document updates the IANA registry "Domain Name System Security
   (DNSSEC) Algorithm Numbers" (http://www.iana.org/protocols).  The
   following entries are added to the registry:


















Jansen & Sivaraman      Expires October 10, 2017               [Page 22]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   +-------+-----------------+-------------------+------+------+-------+
   | No.   | Description     | Mnemonic          | Z.S. | T.S. | Ref.  |
   +-------+-----------------+-------------------+------+------+-------+
   | 245   | ECDSA Curve     | ECDSAP256SHA3-256 | Y    | *    | [TBD] |
   | [TBD] | P-256 with      |                   |      |      |       |
   |       | SHA3-256        |                   |      |      |       |
   | 256   | ECDSA Curve     | ECDSAP256SHA3-384 | Y    | *    | [TBD] |
   | [TBD] | P-384 with      |                   |      |      |       |
   |       | SHA3-384        |                   |      |      |       |
   | 247   | RSA/SHA2-256    | RSASHA2-256       | Y    | *    | [TBD] |
   | [TBD] | with RSASSA-PSS |                   |      |      |       |
   | 248   | RSA/SHA2-512    | RSASHA2-512       | Y    | *    | [TBD] |
   | [TBD] | with RSASSA-PSS |                   |      |      |       |
   | 249   | RSA/SHA3-256    | RSASHA3-256       | Y    | *    | [TBD] |
   | [TBD] | with RSASSA-PSS |                   |      |      |       |
   | 250   | RSA/SHA3-384    | RSASHA3-384       | Y    | *    | [TBD] |
   | [TBD] | with RSASSA-PSS |                   |      |      |       |
   | 251   | RSA/SHA3-512    | RSASHA3-512       | Y    | *    | [TBD] |
   | [TBD] | with RSASSA-PSS |                   |      |      |       |
   +-------+-----------------+-------------------+------+------+-------+

   This document updates the IANA registry "Delegation Signer (DS)
   Resource Record (RR) Type Digest Algorithms" (http://www.iana.org/
   protocols).  The following entries are added to the registry:

            +-----------+-------------+----------+------------+
            | Value     | Description | Status   | References |
            +-----------+-------------+----------+------------+
            | 252 [TBD] | SHA3-256    | OPTIONAL | [TBD]      |
            | 253 [TBD] | SHA3-384    | OPTIONAL | [TBD]      |
            +-----------+-------------+----------+------------+

10.  Acknowledgements

   Thanks to Francis Dupont and Paul Hoffman for review and suggestions.

11.  References

11.1.  Normative references

   [FIPS.180-4.2015]
              National Institute of Standards and Technology, "Secure
              Hash Standard", FIPS PUB 180-4, August 2015,
              <http://csrc.nist.gov/publications/fips/fips180-4/
              fips-180-4.pdf>.






Jansen & Sivaraman      Expires October 10, 2017               [Page 23]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   [FIPS.202.2015]
              National Institute of Standards and Technology, "SHA-3
              Standard: Permutation-Based Hash and Extendable-Output
              Functions", FIPS PUB 202, August 2015,
              <http://dx.doi.org/10.6028/NIST.FIPS.202>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC3110]  Eastlake 3rd, D., "RSA/SHA-1 SIGs and RSA KEYs in the
              Domain Name System (DNS)", RFC 3110, DOI 10.17487/RFC3110,
              May 2001, <http://www.rfc-editor.org/info/rfc3110>.

   [RFC3447]  Jonsson, J. and B. Kaliski, "Public-Key Cryptography
              Standards (PKCS) #1: RSA Cryptography Specifications
              Version 2.1", RFC 3447, DOI 10.17487/RFC3447, February
              2003, <http://www.rfc-editor.org/info/rfc3447>.

   [RFC3658]  Gudmundsson, O., "Delegation Signer (DS) Resource Record
              (RR)", RFC 3658, DOI 10.17487/RFC3658, December 2003,
              <http://www.rfc-editor.org/info/rfc3658>.

   [RFC4033]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "DNS Security Introduction and Requirements",
              RFC 4033, DOI 10.17487/RFC4033, March 2005,
              <http://www.rfc-editor.org/info/rfc4033>.

   [RFC4034]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "Resource Records for the DNS Security Extensions",
              RFC 4034, DOI 10.17487/RFC4034, March 2005,
              <http://www.rfc-editor.org/info/rfc4034>.

   [RFC4035]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "Protocol Modifications for the DNS Security
              Extensions", RFC 4035, DOI 10.17487/RFC4035, March 2005,
              <http://www.rfc-editor.org/info/rfc4035>.

   [RFC4509]  Hardaker, W., "Use of SHA-256 in DNSSEC Delegation Signer
              (DS) Resource Records (RRs)", RFC 4509,
              DOI 10.17487/RFC4509, May 2006,
              <http://www.rfc-editor.org/info/rfc4509>.

   [RFC5155]  Laurie, B., Sisson, G., Arends, R., and D. Blacka, "DNS
              Security (DNSSEC) Hashed Authenticated Denial of
              Existence", RFC 5155, DOI 10.17487/RFC5155, March 2008,
              <http://www.rfc-editor.org/info/rfc5155>.



Jansen & Sivaraman      Expires October 10, 2017               [Page 24]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   [RFC5702]  Jansen, J., "Use of SHA-2 Algorithms with RSA in DNSKEY
              and RRSIG Resource Records for DNSSEC", RFC 5702,
              DOI 10.17487/RFC5702, October 2009,
              <http://www.rfc-editor.org/info/rfc5702>.

   [RFC6090]  McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic
              Curve Cryptography Algorithms", RFC 6090,
              DOI 10.17487/RFC6090, February 2011,
              <http://www.rfc-editor.org/info/rfc6090>.

   [RFC6605]  Hoffman, P. and W. Wijngaards, "Elliptic Curve Digital
              Signature Algorithm (DSA) for DNSSEC", RFC 6605,
              DOI 10.17487/RFC6605, April 2012,
              <http://www.rfc-editor.org/info/rfc6605>.

   [RFC8017]  Moriarty, K., Ed., Kaliski, B., Jonsson, J., and A. Rusch,
              "PKCS #1: RSA Cryptography Specifications Version 2.2",
              RFC 8017, DOI 10.17487/RFC8017, November 2016,
              <http://www.rfc-editor.org/info/rfc8017>.

11.2.  Informative references

   [NIST800-57]
              Barker, E., Barker, W., Burr, W., Polk, W., and M. Smid,
              "Recommendation for Key Management", NIST SP 800-57, March
              2007.

Appendix A.  Change history (Editor: to be removed before publication)

   o  draft-muks-dnsop-dnssec-sha3-01
      Use RSASSA-PSS instead of RSASSA-PKCS1-v1_5.  Specify DNSSEC
      algorithms using RSASSA-PSS for SHA-2 hash functions too.  Specify
      algorithms for ECDSA with SHA-3.  Update all examples.  Other
      fixes.

   o  draft-muks-dnsop-dnssec-sha3-00
      Initial draft.

Authors' Addresses

   Jelte Jansen
   SIDN
   Meander 501
   Arnhem  6825 MD
   The Netherlands

   Email: jelte.jansen@sidn.nl
   URI:   https://www.sidn.nl/



Jansen & Sivaraman      Expires October 10, 2017               [Page 25]


Internet-DrafUse of SHA-3 (Keccak) and RSASSA-PSS in DNSSEC   April 2017


   Mukund Sivaraman
   Internet Systems Consortium
   950 Charter Street
   Redwood City, CA  94063
   US

   Email: muks@mukund.org
   URI:   https://www.isc.org/











































Jansen & Sivaraman      Expires October 10, 2017               [Page 26]