The content from these tables has been incorporated in JWA -12, in the tables 
in Sections 4.1 and 4.2.

                                                            -- Mike

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Richard Barnes
Sent: Sunday, June 30, 2013 3:41 PM
To: Jim Schaad
Cc: [email protected]<mailto:[email protected]>
Subject: Re: [jose] Teleconference July 1 Agenda

For my open actions under ISSUE-6:

Create algorithm table reflecting meember requirement levels before 1 June:

alg/enc         Required fields
============================================
RSA1_5          encrypted_key
RSA-OAEP        encrypted_key
A128KW          encrypted_key
A256KW          encrypted_key
dir
ECDH-ES         epk, apu
ECDH-ES+A128KW  encrypted_key, epk, apu
ECDH-ES+A256KW  encrypted_key, epk, apu
--------------------------------------------
A128CBC-HS256   iv, tag
A256CBC-HS512   iv, tag
A128GCM         iv, tag
A256GCM         iv, tag


Add evaluation for protection to table of all fields:
-- There are no parameters where protection is REQUIRED for security purposes.
-- If one of the PSS algorithms is used ("PS256"/"PS512"), then the "alg" field 
MUST be protected, in order to protect the hash algorithm used.



On Tue, Jun 25, 2013 at 12:50 PM, Jim Schaad 
<[email protected]<mailto:[email protected]>> wrote:
Agenda has been posted 
http://www.ietf.org/proceedings/interim/2013/07/01/jose/agenda/agenda-interim-2013-jose-3


_______________________________________________
jose mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to