-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 7/30/14, 2:21 PM, Brian Campbell wrote:
> My understanding is that RSAES-PKCS1-v1_5 pads with random bytes
> so shouldn't ยง4.1 "Key Encryption using RSA v1.5 and AES-HMAC-SHA2"
> have a note similar to what's been added in other sections that
> states that it "might not be possible to exactly replicate the
> results in this section..."? My experience with RSA v1.5 has been
> that each invocation of it will produce a different the encrypted
> key value even for the same CEK (short of doing something funky
> with the source of randomness but even then there's not enough info
> in the draft to recreate the exact same results).
> 

Good catch; I'll add it to my working copy.


- -- 
- - m&m

Matt Miller < [email protected] >
Cisco Systems, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBCgAGBQJT38KIAAoJEDWi+S0W7cO1A/cIALNboGQDsposQ0dpiG6oM/rA
ZUJRYZsYx23nFT+sFVduAeU8r0G2XGjRCz7oJ7XVRALoOV97IKoY2LldkF3x6Yzd
rGB7u/QnGT0DS2DkWYbttm9HSOeGZaSFNkvFjrnanHfHaofUNygjnz3GkP7zv8Iv
JE9ObW3CfyOhp1Q4CCjeDyaVyFwktzIyJ7kGhbL8gYy/63IgAsLrUE20FuMx+GiL
ZxE8gFIuKz6nj3woPsGtKZoozMkY92He+iUjQ45SkOfbXpNNNHXQBu3duvuZyojC
qS6EtA1zdAXQjmW0PA48LOvjjYcjn7VyOTkxs/n9AoRlxxLM6cG7SUQXA7yodqg=
=Co2x
-----END PGP SIGNATURE-----

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to