-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 7/30/14, 2:21 PM, Brian Campbell wrote: > My understanding is that RSAES-PKCS1-v1_5 pads with random bytes > so shouldn't ยง4.1 "Key Encryption using RSA v1.5 and AES-HMAC-SHA2" > have a note similar to what's been added in other sections that > states that it "might not be possible to exactly replicate the > results in this section..."? My experience with RSA v1.5 has been > that each invocation of it will produce a different the encrypted > key value even for the same CEK (short of doing something funky > with the source of randomness but even then there's not enough info > in the draft to recreate the exact same results). >
Good catch; I'll add it to my working copy. - -- - - m&m Matt Miller < [email protected] > Cisco Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - https://gpgtools.org Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBCgAGBQJT38KIAAoJEDWi+S0W7cO1A/cIALNboGQDsposQ0dpiG6oM/rA ZUJRYZsYx23nFT+sFVduAeU8r0G2XGjRCz7oJ7XVRALoOV97IKoY2LldkF3x6Yzd rGB7u/QnGT0DS2DkWYbttm9HSOeGZaSFNkvFjrnanHfHaofUNygjnz3GkP7zv8Iv JE9ObW3CfyOhp1Q4CCjeDyaVyFwktzIyJ7kGhbL8gYy/63IgAsLrUE20FuMx+GiL ZxE8gFIuKz6nj3woPsGtKZoozMkY92He+iUjQ45SkOfbXpNNNHXQBu3duvuZyojC qS6EtA1zdAXQjmW0PA48LOvjjYcjn7VyOTkxs/n9AoRlxxLM6cG7SUQXA7yodqg= =Co2x -----END PGP SIGNATURE----- _______________________________________________ jose mailing list [email protected] https://www.ietf.org/mailman/listinfo/jose
