Protocol Action: 'Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types' to Proposed Standard (draft-turner-cms-symmetrickeypackage-algs-00.txt)

The IESG <iesg-secretary@ietf.org> Tue, 15 February 2011 15:47 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@core3.amsl.com
Delivered-To: ietf-announce@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 09B973A6C38; Tue, 15 Feb 2011 07:47:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.549
X-Spam-Level:
X-Spam-Status: No, score=-102.549 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0GH5EmWdrRW3; Tue, 15 Feb 2011 07:47:56 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 76DE93A6C64; Tue, 15 Feb 2011 07:47:55 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Protocol Action: 'Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types' to Proposed Standard (draft-turner-cms-symmetrickeypackage-algs-00.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.12
Message-ID: <20110215154755.17377.58471.idtracker@localhost>
Date: Tue, 15 Feb 2011 07:47:55 -0800
Cc: Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Feb 2011 15:47:57 -0000

The IESG has approved the following document:
- 'Algorithms for Cryptographic Message Syntax (CMS)   Protection of
   Symmetric Key Package Content Types'
  (draft-turner-cms-symmetrickeypackage-algs-00.txt) as a Proposed
Standard

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Tim Polk.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-turner-cms-symmetrickeypackage-algs/




Technical Summary

   This document describes the conventions for using several cryptographic
   algorithms with the Cryptographic Message Syntax (CMS) to protect the
   symmetric key package content type (RFC 6031).  Specifically, it
   includes conventions necessary to implement SignedData, EnvelopedData,
   EncryptedData, and AuthEnvelopedData.

Working Group Summary

   As noted earlier, this draft is not the product of a WG, but it was
   forwarded to both the KEYPROV WG for review and comment.  No comments
   were received.  This can be attributed to the fact that it is almost
   identical to RFC 5959.  The exceptions are that a) it's for the
   Symmetric Key Package Content Type as Asymmetric Key Package, and b) it
   adds ECC algs as a MAYs.

Document Quality

    There are no known implementations of this document.

Personnel

    Sean Turner <turners@ieca.com> is the document Shepherd.
    Tim Polk <tim.polk@nist.gov> is the responsible Area Director.

RFC Editor Note

#1) In section 3 please replace:

OLD:

When key agreement is used, a key wrap algorithm is also specified to
wrap the content encryption key.

NEW:

When key agreement is used, the same key wrap algorithm MUST be used for
both key and content encryption.

#2)  Please perform the following substitutions throughout the document:

s/key encryption key/key-encryption key/
s/key encryption algorithm/key-encryption algorithm/
s/content encryption key/content-encryption key/
s/content encryption algorithm/content-encryption algorithm/