ACTION-227: Draft text encryption algorithms regarding ECC algorithms and what curves should be used
Draft text encryption algorithms regarding ECC algorithms and what curves should be used
- State:
- closed
- Person:
- Brian LaMacchia
- Due on:
- March 10, 2009
- Created on:
- March 3, 2009
- Related emails:
- 2009-03-31 Minutes for Approval (from edsimon@xmlsec.com on 2009-04-03)
- Agenda: Distributed Meeting 2009-03-31 (from frederick.hirsch@nokia.com on 2009-03-30)
- Agenda: Distributed Meeting 2009-03-24 v2 (resend) (from frederick.hirsch@nokia.com on 2009-03-23)
- Agenda: Distributed Meeting 2009-03-24 v2 (from Frederick.Hirsch@nokia.com on 2009-03-23)
- Agenda: Distributed Meeting 2009-03-24 (resend) (from Frederick.Hirsch@nokia.com on 2009-03-22)
- Agenda: Distributed Meeting 2009-03-24 (from Frederick.Hirsch@nokia.com on 2009-03-22)
- ACTION-227: text specifying ECC curves in XMLENC (from bal@exchange.microsoft.com on 2009-03-17)
- Agenda: Distributed Meeting 2009-03-17 (resend) (from frederick.hirsch@nokia.com on 2009-03-11)
- Agenda: Distributed meeting 2009-03-17 (from Frederick.Hirsch@nokia.com on 2009-03-11)
- Updated minutes for 3 March 2009 (from frederick.hirsch@nokia.com on 2009-03-06)
Related notes:
OK, I think all this needs is for the following paragraph to be added as the second paragraph of Section 5.5.4 in XMLENC:
Compliant implementations are REQUIRED to support ECDH-ES key
agreement using the P-256 prime curve specified in Section D.2.3 of
FIPS 186-3 [FIPS186-3]. (This is the same curve that is REQUIRED in
XMLDSIG 1.1 to be supported for the ECDSAwithSHA256 algorithm.) It is
further RECOMMENDED that implementations also support the P-384 and
P-521 prime curves for ECDH-ES; these curves are defined in Sections
D.2.4 and D.2.5 of FIPS 186-3, respectively.
And we'll also have to add a reference to FIPS 186-3 when it's finalized.
Display change log.