The following errata report has been submitted for RFC7518,
"JSON Web Algorithms (JWA)".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8568

--------------------------------------
Type: Editorial
Reported by: Sören Sprößig <[email protected]>

Section: 3.2

Original Text
-------------
(This requirement is based on Section 5.3.4 (Security Effect of the HMAC Key) 
of NIST SP 800-117 [NIST.800-107], which states that the effective security 
strength is the minimum of the security strength of the key and two times the 
size of the internal hash value.)

Corrected Text
--------------
(This requirement is based on Section 5.3.4 (Security Effect of the HMAC Key) 
of NIST SP 800-107 [NIST.800-107], which states that the effective security 
strength is the minimum of the security strength of the key and two times the 
size of the internal hash value.)

Notes
-----
NIST SP 800-117 wasSCAP, 800-107 is the correct one (as linked)

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC7518 (draft-ietf-jose-json-web-algorithms-40)
--------------------------------------
Title               : JSON Web Algorithms (JWA)
Publication Date    : May 2015
Author(s)           : M. Jones
Category            : PROPOSED STANDARD
Source              : Javascript Object Signing and Encryption
Stream              : IETF
Verifying Party     : IESG

_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to