Protocol Action: 'Elliptic Curve Cryptography Subject Public Key Information' to Proposed Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The IESG has approved the following document:

- 'Elliptic Curve Cryptography Subject Public Key Information '
   <draft-ietf-pkix-ecc-subpubkeyinfo-11.txt> as a Proposed Standard

This document is the product of the Public-Key Infrastructure (X.509) 
Working Group. 

The IESG contact persons are Pasi Eronen and Tim Polk.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-pkix-ecc-subpubkeyinfo-11.txt

Technical Summary

   The subjectPublicKeyInfo field of an X.509 certificate carries
   three data items: an algorithm identifier, optional parameters, and
   a bit string that represents the public key.  The parameters are
   specific to the algorithm and this field usually contains simple
   values needed to characterize the public key algorithm, e.g., the
   generator and modulus for Diffie-Hellman. However, X.509 does not
   constrain the scope of this parameters field. The ANSI X9.62
   standards allow parameters to name the curve via an object
   identifier, inherit the curve from an issuer, or fully specify the
   curve.  To fully specify the curve a complex structure is required.
   Further, the ANSI X9.62 standards committee elected to use this
   field to express potentially complex limitations on how the public
   key in the certificate can be used, e.g., which key derivation
   functions can be applied to the bit string that results from a
   Diffie-Hellman key exchange.

   After considerable debate the PKIX WG decided to limit the number
   of parameter choices to one: the name the curve with an object
   identifier (namedCurve).  This decision was based on implementers
   desire to use well known curves from NIST and the complexity of the
   specifiedCurve field (not to mention the 20+ pages it saved).

   The WG also decided to restrict the number of algorithm identifiers
   to three: id-ecPublicKey, id-ecDH, and id-ECMQV.  The
   id-ecPublicKey object identifier is when a CA does not want to
   limit the key for use with a particular ECC algorithm.  ECDSA will
   use this object identifier, as it is already widely implemented.
   The id-ecDH and id-ecMQV object identifiers are used to restrict
   the key for use with ECDH and ECMQV, respectively.

   The SHA-224, SHA-256, SHA-384, and SHA-512 algorithms and the NIST
   curves were added to the ASN.1 modules.

Working Group Summary

   This ID was discussed extensively on the PKIX WG mailing list.  A
   poll was taken to remove the specifiedCurve option.  The WG was in
   favor of the change.  The other comments were about document
   quality.

Document Quality

   This document is a fairly length update of three sections of RFC
   3279 (Sections 2.3.5, 3, and 5) and includes a long ASN.1 module.  
   The quality of the draft is comparable in quality to its predecessor

Personnel

   The document shepherd is Stefan Santesson. The responsible
   area director is Pasi Eronen.

_______________________________________________

IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce

[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux