The content from these tables has been incorporated in JWA -12, in the tables
in Sections 4.1 and 4.2.
-- Mike
From: [email protected]<mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Richard Barnes
Sent: Sunday, June 30, 2013 3:41 PM
To: Jim Schaad
Cc: [email protected]<mailto:[email protected]>
Subject: Re: [jose] Teleconference July 1 Agenda
For my open actions under ISSUE-6:
Create algorithm table reflecting meember requirement levels before 1 June:
alg/enc Required fields
============================================
RSA1_5 encrypted_key
RSA-OAEP encrypted_key
A128KW encrypted_key
A256KW encrypted_key
dir
ECDH-ES epk, apu
ECDH-ES+A128KW encrypted_key, epk, apu
ECDH-ES+A256KW encrypted_key, epk, apu
--------------------------------------------
A128CBC-HS256 iv, tag
A256CBC-HS512 iv, tag
A128GCM iv, tag
A256GCM iv, tag
Add evaluation for protection to table of all fields:
-- There are no parameters where protection is REQUIRED for security purposes.
-- If one of the PSS algorithms is used ("PS256"/"PS512"), then the "alg" field
MUST be protected, in order to protect the hash algorithm used.
On Tue, Jun 25, 2013 at 12:50 PM, Jim Schaad
<[email protected]<mailto:[email protected]>> wrote:
Agenda has been posted
http://www.ietf.org/proceedings/interim/2013/07/01/jose/agenda/agenda-interim-2013-jose-3
_______________________________________________
jose mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose