datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)
RFC 5753

Document type: RFC - Informational (January 2010)
Obsoletes RFC 3278
Document stream: IETF
Last updated: 2013-03-02
Other versions: plain text, pdf, html

IETF State: (None)
Consensus: Unknown
Document shepherd: No shepherd assigned

IESG State: RFC 5753 (Informational)
Responsible AD: Tim Polk
Send notices to: smime-chairs@tools.ietf.org, draft-ietf-smime-3278bis@tools.ietf.org

Internet Engineering Task Force (IETF)                         S. Turner
Request for Comments: 5753                                          IECA
Obsoletes: 3278                                                 D. Brown
Category: Informational                                         Certicom
ISSN: 2070-1721                                             January 2010

          Use of Elliptic Curve Cryptography (ECC) Algorithms
                 in Cryptographic Message Syntax (CMS)

Abstract

   This document describes how to use Elliptic Curve Cryptography (ECC)
   public key algorithms in the Cryptographic Message Syntax (CMS).  The
   ECC algorithms support the creation of digital signatures and the
   exchange of keys to encrypt or authenticate content.  The definition
   of the algorithm processing is based on the NIST FIPS 186-3 for
   digital signature, NIST SP800-56A and SEC1 for key agreement, RFC
   3370 and RFC 3565 for key wrap and content encryption, NIST FIPS
   180-3 for message digest, SEC1 for key derivation, and RFC 2104 and
   RFC 4231 for message authentication code standards.  This document
   obsoletes RFC 3278.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Not all documents
   approved by the IESG are a candidate for any level of Internet
   Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   http://www.rfc-editor.org/info/rfc5753.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents

Turner & Brown                Informational                     [Page 1]
RFC 5753              Use of ECC Algorithms in CMS          January 2010

   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Table of Contents

   1. Introduction ....................................................3
      1.1. Requirements Terminology ...................................3
   2. SignedData Using ECC ............................................3
      2.1. SignedData Using ECDSA .....................................4
   3. EnvelopedData Using ECC Algorithms ..............................5
      3.1. EnvelopedData Using (ephemeral-static) ECDH ................5
      3.2. EnvelopedData Using 1-Pass ECMQV ...........................8
   4. AuthenticatedData and AuthEnvelopedData Using ECC ..............11
      4.1. AuthenticatedData Using 1-Pass ECMQV ......................11
      4.2. AuthEnvelopedData Using 1-Pass ECMQV ......................12
   5. Certificates Using ECC .........................................13
   6. SMIMECapabilities Attribute and ECC ............................13
   7. ASN.1 Syntax ...................................................21
      7.1. Algorithm Identifiers .....................................21
      7.2. Other Syntax ..............................................24
   8. Recommended Algorithms and Elliptic Curves .....................26
   9. Security Considerations ........................................28
   10. IANA Considerations ...........................................33
   11. References ....................................................33
      11.1. Normative References .....................................33

[include full document text]