Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) (RFC3278)

IP.com Disclosure Number: IPCOM000007990D
Original Publication Date: 2002-Apr-01
Included in the Prior Art Database: 2002-May-10
Document File: 17 page(s) / 34K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

S. Blake-Wilson: AUTHOR [+3]

Abstract

This document describes how to use Elliptic Curve Cryptography (ECC) public-key algorithms in the Cryptographic Message Syntax (CMS). The ECC algorithms support the creation of digital signatures and the exchange of keys to encrypt or authenticate content. The definition of the algorithm processing is based on the ANSI X9.62 standard, developed by the ANSI X9F1 working group, the IEEE 1363 standard, and the SEC 1 standard.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 10% of the total text.

Network Working Group                                    S. Blake-Wilson

Request for Comments: 3278                                      D. Brown

Category: Informational                                    Certicom Corp

                                                              P. Lambert

                                                   Cosine Communications

                                                              April 2002

          Use of Elliptic Curve Cryptography (ECC) Algorithms

                 in Cryptographic Message Syntax (CMS)

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   This document describes how to use Elliptic Curve Cryptography (ECC)

   public-key algorithms in the Cryptographic Message Syntax (CMS).  The

   ECC algorithms support the creation of digital signatures and the

   exchange of keys to encrypt or authenticate content.  The definition

   of the algorithm processing is based on the ANSI X9.62 standard,

   developed by the ANSI X9F1 working group, the IEEE 1363 standard, and

   the SEC 1 standard.

   The readers attention is called to the Intellectual Property Rights

   section at the end of this document.

Blake-Wilson, et al.         Informational                      [Page 1]

RFC 3278              Use of ECC Algorithms in CMS            April 2002

Table of Contents

   1  Introduction ................................................... 2

      1.1  Requirements terminology .................................. 3

   2  SignedData using ECC ..........................................  3

      2.1  SignedData using ECDSA ...................................  3

           2.1.1  Fields of the SignedData ..........................  3

           2.1.2  Actions of the sending agent ......................  4

           2.1.3  Actions of the receiving agent ....................  4

   3  EnvelopedData using ECC .......................................  4

      3.1  EnvelopedData using ECDH .................................  5

           3.1.1  Fields of KeyAgreeRecipientInfo ...................  5

           3.1.2  Actions of the sending agent ......................  5

           3.1.3  Actions of the receiving agent ....................  6

      3.2  EnvelopedData using 1-Pass ECMQV .........................  6

           3.2.1  Fields of KeyAgreeRecipientInfo ...................  6

           3.2.2  Actions of the sending agent ......................  7

           3.2.3  Actions of the receiving agent ....................  7

   4  AuthenticatedData using ECC ............ ......................  8

      4.1  AuthenticatedData using 1-pass ECMQV .....................  8

           4.1.1  Fields of KeyAgreeRecipientInfo ...................  8

           4.1.2  Actions of the sending agent ......................  8

           4.1.3  Actions of the receiving agent ....................  8

   5  Recommended Algorithms and Elliptic Curves ....................  9

   6  Certificates using ECC ........................................  9

   7  SMIMECapabilities Attribute and ECC ...........................  9

   8  ASN.1 Syntax .................................................. 10

      8.1  Algorithm identifiers .................................... 10

      8.2  Other syntax ............................................. 11

   9  Summary ....................................................... 12

   References ...........................................