We could examine a mechansim for keystore applications to override the default 
PBE algorithm for protecting keys and certs.
Maybe extend KeyStore.LoadStoreParameter?


On 1 Oct 2012, at 18:50, Michael StJohns wrote:

> My main reason for suggesting this is that the all but one of the algorithm 
> suites defined in PKCS12 are either deprecated or prohibited by NIST 
> guidance.  The undeprecated suite appears to be the default one used by the 
> java implementation.  It would be nice to have a choice.
> 
> See below.
> 
> At 12:51 PM 10/1/2012, Vincent Ryan wrote:
>> Hello Mike,
>> 
>> The new PBE algorithms in JEP-121, such as PBEWithHmacSHA256AndAES_128, 
>> could certainly be used
>> for PKCS12 keystores within Java environments - the problem is maintaining 
>> interoperability with existing
>> crypto toolkits and web browsers.
> 
> Yup - but someone has to be first....   :-)
> 
> Mike
> 
> 
>> Is there any interest among those on this list in promoting wider support 
>> for these PBE algorithms?
>> 
>> Thanks.
>> 
>> 
>> On 1 Oct 2012, at 17:06, Michael StJohns wrote:
>> 
>>> At 08:27 PM 9/28/2012, mark.reinh...@oracle.com wrote:
>>>> Posted: http://openjdk.java.net/jeps/166
>>>> 
>>>> - Mark
>>> 
>>> This seems at least partially related to JEP 121 and maybe even dependent 
>>> on it.  Might be useful to have a cross reference.  Also, probably useful 
>>> to decide/state a new default PKCS12 algorithm?  E.g. maybe 
>>> PBEwithSHA256andAES-128?
>>> 
>>> Mike
>>> 
>>> 
> 
> 

Reply via email to