Pk-init-21.txt Brian Tung Issues Believed Closed 499 (007): Refs1510bis  Clarifications 513 (021): Context tag inconsistency in TrustedCAs.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

GASS™-2040 Gas Analysis Sampling Systems
Slide 1Fig. 17.1, p.513 Active Figure Slide 2Table 17.1, p.514.
Labour quality and ICT capital skill complementarity: International comparisons Mary OMahony NIESR.
A Profile for Trust Anchor Material for the Resource Certificate PKI Geoff Huston SIDR WG IETF 74.
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Dynamic Symmetric Key Provisioning Protocol (DSKPP)
MIKEY Capability Discovery Seokung Yoon (Korea Information Security Agency) draft-seokung-msec-mikey-capability-discovery-00.txt.
1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt.
Brian Theaker RCWG Chair
1 National Pollutant Discharge Elimination System Permit United States Steel Gary Works NPDES Permit IN
The Returns to Academic and Vocational Qualifications Steven McIntosh Department of Economics University of Sheffield.
CHAPTER 19 An Introduction to Data Structures. CHAPTER GOALS To learn how to use linked lists provided in the standard library To be able to use iterators.
Dictionaries and Hash Tables
11-1 ©2007 Raj JainCSE571SWashington University in St. Louis Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130
RSA and Public Key Cryptography Oct Nathanael Paul.
Key Establishment Schemes Workshop Document October 2001.
Ideal for radio journalists and pro audio applications Hi-MD format records 2 ch. compressed or Linear PCM Affordable 1 GB Hi-MD recording media ($7.00.
Lecture 14 Curves and Surfaces II
Biodiversity indicators: Review of the EEA Set of Indicators Sophie Condé ETC/BD MNHN Based on: Katarzyna Biała, European Environment Agency Any impact.
© Institute for Fiscal Studies Household responses to complex tax incentives HMRC/HMT/ESRC Project: Code: RES Project duration: Jan 1, 2011.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Wireless Network Security Issues By Advait Kothare SJSU CS265 Fall 2004.
Public Key Cryptography
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CA Key 1 Created OCSP Cert 1 Client Cert 1 Client Cert 2 OCSP Cert 2 CA Key 2 Created CA Key 1 Expiration OCSP Cert 3 Client Cert.
SEED Updates March 2, 2004 Jongwook Park, KISA - SEED Encryption Algorithm - Use of the SEED Encryption Algorithm in CMS.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Encryption Methods By: Michael A. Scott
Computer Science Public Key Management Lecture 5.
CMS Interoperability Matrix Jim Schaad Soaring Hawk Security.
COSE Overview Jim Schaad August Cellars. Willing Changes No crypto compatibility Use of CBOR idioms Partial change of naming schemes.
Michael Myers VeriSign, Inc.
GSSAPI-CFX Larry Zhu Microsoft Corporation IETF 58.
Clarifications to KMIP v1.1 for Asymmetric Crypto and Certificates J. Furlong 29 September 2010.
3280bis David Cooper. Changes Since Draft 02 ● Section 1 (Introduction): Replaced text highlighting changes between RFC 2459 and 3280 with text highlighting.
Encryption Protocols used in Wireless Networks Derrick Grooms.
IETF-59, Seoul, S. Korea OpenPGP, March 2, 2004 OpenPGP Working Group IETF-59, Seoul, S. Korea March 2, 2004 Chair: Derek Atkins List:
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
29 October 2001Terena TF-LSD1 Certificate Retrieval With OpenLDAP David Chadwick.
Doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.
LTANS WG: ERS November 7, 2005 Tobias Gondrom. LTANS WG (ltans): ERS Draft straightened up Corrected ERS (feedback from Peter and Carl) Prepared for WG.
DIGITAL SIGNATURE IMPLEMENTATION
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Application support functions Chapter Introduction ASN.1 Security Data encryption Nonrepudiation Authentication Public key certification authorities.
Brian Tung Issues List by Jeff Hutzelman
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
Keyprov PSKC spec Philip Hoyer 71-st IETF, Philadelphia.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
SEED Overview ‘Use of the SEED Encryption Algorithm in CMS’ November 11, 2003 Jongwook Park, KISA
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
BER ENCODING Basic Encoding Rules. Basic Encoding Rules What is it?  BER is the original rules laid out by the ASN.1 standard for encoding information.
SCVP 18 Tim Polk. Mea Culpa ● Draft -19 omits some promised changes from the March IETF meeting – Document management problems compounded by ID submission.
Authenticated Identity
ASN.1: Introduction Zdeněk Říha.
Review Video Dina Dwi Maharani 3 D3 IT A
IPsec Working Group Draft Status
LTANS WG: ERS Status July 10, 2006 Tobias Gondrom.
بسم الله الرحمن الرحیم روش تحقیق و مقاله نویسی موضوع:
Key Descriptor Version in EAPOL Key Frames
Resource Certificate Profile
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Amendment text] Date Submitted:
Zero Touch Provisioning for NETCONF/RESTCONF Call Home draft-ietf-netconf-zerotouch-19 NETCONF WG IETF 100 (Singapore)
The devil is in the details
Presentation transcript:

pk-init-21.txt Brian Tung

Issues Believed Closed 499 (007): Refs1510bis  Clarifications 513 (021): Context tag inconsistency in TrustedCAs 518 (026): Unconstrained integers 523 (031): DER vs BER 527 (035): Wrap CMS objects in OCTET STRINGs

Issues Believed Closed (cont) 529 (037): ASN.1 inconsistency (*) 530 (038): Diffie-Hellman group selection (*) 531 (039): Don’t include root CA cert 612: AES algorithm OID (*) 666: Remove encryption cert text 667: Add RFC 2119 reference

Issues Believed Open 507 (015): PKINIT support 512 (020): Unauthenticated plaintext 516 (024): Mapping of cname 522 (030): Text for key to use in encKey case 526 (034): SubjectAltName/OtherName

Issues Believed in Limbo 501 (009): PA types Awaiting completion of draft 509 (017): Diffie-Hellman key derivation Extraneous text to be removed Sam’s comment later retracted? 611: Checksum issues Ken’s draft referenced in pk-init-21.txt Review Ken and Sam’s proposed approach