References: [kmip-spec]




Дата канвертавання25.04.2016
Памер62.38 Kb.
KMIP v.1.2: (Specification) Reference List Updates

Version 0.1

4 September 2013

Judy Furlong, EMC Corporation

References:

[KMIP-Spec] Key Management Interoperability Protocol Specification Version 1.2.Working Draft 08. 21 August 2013.

https://www.oasis-open.org/committees/document.php?document_id=50393&wg_abbrev=kmip
Introduction

A review of the reference list contained in the KMIP 1.2 Specification (working draft 8) has been conducted to determine if references were up-to-date and complete. This document captures the results of that review in three sections:



  • Editorial Changes to the Reference List: This section includes a copy of the reference list with editorial changes highlighted. The changes include removal of references no longer appearing in the Specification. References that are not at the latest version are highlighted for easy identification.

  • Recommended Additions to the Reference List: This section includes a list of additional references that should be added to the Reference List. None of these additions should impact the content of the KMIP Specification.

  • Recommended Updates to the Reference List: This section includes the list of references that have a later version beyond the one referenced in the KMIP 1.2 Specification. This list needs to be reviewed by the KMIP TC to ensure there are no implications to the KMIP Specification content if a newer reference is cited. For example, updating the FIPS 180 Secure Hash Standard to the latest revision (FIPS 180-4) implies we should add support for the two new hash functions, SHA-512/224 and SHA-512/256, to the KMIP 1.2 Specification.

Note: The reference lists within the KMIP 1.2 Usage Guide and Profiles documents were also reviewed. These documents generally include a subset of the references included in the KMIP Specification. No major issues with the references, beyond those highlighted in the Specification, were found in these documents and minor updates to the references will be handled by the document editors of these documents in the next update.

Editorial Changes to the Reference List

This section contained the edits to the Reference List from the KMIP 1.2 Specification Working Draft 08


    1. Normative References


[FIPS180-x] Secure Hash Standard (SHS)

[FIPS186-3] Digital Signature Standard (DSS), FIPS PUB 186-3, Jun 2009, http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf.

[FIPS197] Advanced Encryption Standard, FIPS PUB 197, Nov 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.



[FIPS198-1] The Keyed-Hash Message Authentication Code (HMAC), FIPS PUB 198-1, Jul 2008, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf.

[IEEE1003-1] IEEE Std 1003.1, Standard for information technology - portable operating system interface (POSIX). Shell and utilities, 2004.



[ISO16609] ISO, Banking -- Requirements for message authentication using symmetric techniques, ISO 16609, 1991.

[ISO9797-1] ISO/IEC, Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher, ISO/IEC 9797-1, 1999.

[KMIP-Prof] Key Management Interoperability Protocol Profiles Version 1.2 wd02, Jun 27, 2013, https://www.oasis-open.org/apps/org/workgroup/kmip/download.php/49689/kmip-profiles-v1.2-wd02.doc.

[PKCS#1] RSA Laboratories, PKCS #1 v2.1: RSA Cryptography Standard, Jun 14, 2002, http://www.rsa.com/rsalabs/node.asp?id=2125.

[PKCS#5] RSA Laboratories, PKCS #5 v2.1: Password-Based Cryptography Standard, Oct 5, 2006, http://www.rsa.com/rsalabs/node.asp?id=2127.



[PKCS#7] RSA Laboratories, PKCS#7 v1.5: Cryptographic Message Syntax Standard, Nov 1, 1993, http://www.rsa.com/rsalabs/node.asp?id=2129.

[PKCS#8] RSA Laboratories, PKCS#8 v1.2: Private-Key Information Syntax Standard, Nov 1, 1993, http://www.rsa.com/rsalabs/node.asp?id=2130.

[PKCS#10] RSA Laboratories, PKCS #10 v1.7: Certification Request Syntax Standard, May 26, 2000, http://www.rsa.com/rsalabs/node.asp?id=2132.

[RFC1319] B. Kaliski, The MD2 Message-Digest Algorithm, IETF RFC 1319, Apr 1992, http://www.ietf.org/rfc/rfc1319.txt.

[RFC1320] R. Rivest, The MD4 Message-Digest Algorithm, IETF RFC 1320, Apr 1992, http://www.ietf.org/rfc/rfc1320.txt.

[RFC1321] R. Rivest, The MD5 Message-Digest Algorithm, IETF RFC 1321, Apr 1992, http://www.ietf.org/rfc/rfc1321.txt.

[RFC1421] J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, IETF RFC 1421, Feb 1993, http://www.ietf.org/rfc/rfc1421.txt.

[RFC1424] B. Kaliski, Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, IETF RFC 1424, Feb 1993, http://www.ietf.org/rfc/rfc1424.txt.

[RFC1945] T. Berners-Lee, R. Fielding, H. Frystyk, Hypertext Transfer Protocol -- HTTP/1.0, IETF RFC 1945, May 1996, http://www.ietf.org/rfc/rfc1945.txt.



[RFC2104] H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104, Feb 1997, http://www.ietf.org/rfc/rfc2104.txt.

[RFC2119] S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, IETF RFC 2119, March 1997, http://www.ietf.org/rfc/rfc2119.txt.

[RFC2246] T. Dierks and C. Allen, The TLS Protocol, Version 1.0, IETF RFC 2246, Jan 1999, http://www.ietf.org/rfc/rfc2246.txt.

[RFC2898] B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0, IETF RFC 2898, Sep 2000, http://www.ietf.org/rfc/rfc2898.txt.



[RFC3394] J. Schaad, R. Housley, Advanced Encryption Standard (AES) Key Wrap Algorithm, IETF RFC 3394, Sep 2002, http://www.ietf.org/rfc/rfc3394.txt.

[RFC3447] J. Jonsson, B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, IETF RFC 3447, Feb 2003, http://www.ietf.org/rfc/rfc3447.txt.

[RFC3629] F. Yergeau, UTF-8, a transformation format of ISO 10646, IETF RFC 3629, Nov 2003, http://www.ietf.org/rfc/rfc3629.txt.

[RFC3647] S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, IETF RFC 3647, Nov 2003, http://www.ietf.org/rfc/rfc3647.txt.

[RFC3686] R. Housley, Using Advanced Encryption Standard (AES) Counter Mode with IPsec Encapsulating Security Payload (ESP), IETF RFC 3686, Jan 2004, http://www.ietf.org/rfc/rfc3686.txt.



[RFC4055] J. Schadd, B. Kaliski, and R, Housley, HHAdditionalAdditional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC 4055, June 2055, http://www.ietf.org/rfc/rfc4055.txt.

[RFC4210] C. Adams, S. Farrell, T. Kause and T. Mononen, Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP), IETF RFC 2510, Sep 2005, http://www.ietf.org/rfc/rfc4210.txt.

[RFC4211] J. Schaad, Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF), IETF RFC 4211, Sep 2005, http://www.ietf.org/rfc/rfc4211.txt.

[RFC4868] S. Kelly, S. Frankel, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, IETF RFC 4868, May 2007, http://www.ietf.org/rfc/rfc4868.txt.

[RFC4880] J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer, OpenPGP Message Format, IETF RFC 4880, Nov 2007, http://www.ietf.org/rfc/rfc4880.txt.



[RFC4949] R. Shirey, Internet Security Glossary, Version 2, IETF RFC 4949, Aug 2007, http://www.ietf.org/rfc/rfc4949.txt.

[RFC5272] J. Schaad and M. Meyers, Certificate Management over CMS (CMC), IETF RFC 5272, Jun 2008, http://www.ietf.org/rfc/rfc5272.txt.

[RFC5280] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 Public Key Infrastructure Certificate, IETF RFC 5280, May 2008, http://www.ietf.org/rfc/rfc5280.txt.

[RFC5649] R. Housley, Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm, IETF RFC 5649, Aug 2009, http://www.ietf.org/rfc/rfc5649.txt.

[SEC2] SEC 2: Recommended Elliptic Curve Domain Parameters, http://www.secg.org/collateral/sec2_final.pdf.

[SP800-38A] M. Dworkin, Recommendation for Block Cipher Modes of Operation – Methods and Techniques, NIST Special Publication 800-38A, Dec 2001, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.

[SP800-38B] M. Dworkin, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, May 2005, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf.

[SP800-38C] M. Dworkin, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, NIST Special Publication 800-38C, May 2004, http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf.

[SP800-38D] M. Dworkin, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D, Nov 2007, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf.

[SP800-38E] M. Dworkin, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Block-Oriented Storage Devices, NIST Special Publication 800-38E, Jan 2010, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf.

[SP800-56A] E. Barker, D. Johnson, and M. Smid, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), NIST Special Publication 800-56A, Mar 2007, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf.

[SP800-56B] E. Barker, L. Chen, A. Regenscheid, and M. Smid, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography, NIST Special Publication 800-56B, Aug 2009, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf.

[SP800-57-1] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendations for Key Management - Part 1: General (Revised), NIST Special Publication 800-57 part 1, Mar 2007, http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf.



[SP800-67] W. Barker, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication 800-67, Version 1.1, Revised 19 May 2008, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf.

[SP800-108] L. Chen, Recommendation for Key Derivation Using Pseudorandom Functions (Revised), NIST Special Publication 800-108, Oct 2009, http://csrc.nist.gov/publications/nistpubs/800-108/sp800-108.pdf.



[X.509] International Telecommunication Union (ITU)–T, X.509: Information technology – Open systems interconnection – The Directory: Public-key and attribute certificate frameworks, Aug 2005, http://www.itu.int/rec/T-REC-X.509-200508-I/en.

[X9.24-1] ANSI, X9.24 - Retail Financial Services Symmetric Key Management - Part 1: Using Symmetric Techniques, 2004.

[X9.31] ANSI, X9.31:Digital: Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA), Sep 1998.

[X9.42] ANSI, X9.-42: Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, 2003.



[X9.-57] ANSI, X9.-57: Public Key Cryptography for the Financial Services Industry: Certificate Management, 1997.

[X9.62] ANSI, X9.-62: Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2005.

[X9.-63] ANSI, X9.-63: Public Key Cryptography for the Financial Services Industry, Key Agreement and Key Transport Using Elliptic Curve Cryptography, 2001.

[X9.-102] ANSI, X9.-102: Symmetric Key Cryptography for the Financial Services Industry - Wrapping of Keys and Associated Data, 2008.

[X9 TR-31] ANSI, X9 TR-31: Interoperable Secure Key Exchange Key Block Specification for Symmetric Algorithms, 2005.


    1. Non-Normative References


[ECC-Brainpool] ECC Brainpool Standard Curves and Curve Generation v. 1.0.19.10.2005, http://www.ecc-brainpool.org/download/Domain-parameters.pdf

[ISO/IEC 9945-2] The Open Group, Regular Expressions, The Single UNIX Specification version 2, 1997, ISO/IEC 9945-2:1993, http://www.opengroup.org/onlinepubs/007908799/xbd/re.html.

[KMIP-UG] Key Management Interoperability Protocol Usage Guide Version 1.2 Working Draft 05, Aug 19, 2013, https://www.oasis-open.org/apps/org/workgroup/kmip/download.php/50368/kmip-ug-v1%202-wd05.pdf.

[KMIP-TC] Key Management Interoperability Protocol Test Cases Version 1.2 Working Draft 02, Aug 07, 2013, https://www.oasis-open.org/apps/org/workgroup/kmip/download.php/50188/kmip-testcases-v1.2-wd02.docx.

[KMIP-UC] Key Management Interoperability Protocol Use Cases Version 1.2 Working Draft 10, Jun 20, 2013, https://www.oasis-open.org/apps/org/workgroup/kmip/download.php/49644/kmip-usecases-v1.2-wd10.doc.

[w1979] A. Shamir, How to share a secret, Communications of the ACM, vol 22, no. 11, pp. 612-613, Nov 1979.



Recommended Additions to the Reference List

It is recommended that the following references be added to the reference list. These references are related to the references highlighted in green in the previous section. For example, some are the RFC equivalents for the rest of the PKCS standards and others are updates to referenced RFCs.



Additional Normative References

[FIPS 180-x] Secure Hash Standard (SHS)

[RFC2315] B. Kaliski, PKCS #7: Cryptographic Message Syntax Version 1.5, IETF RFC2315, March 1998, http://www.rfc-editor.org/rfc/rfc2315.txt

[RFC2986] M. Nystrom and B. Kaliski, PKCS #10: Certification Request Syntax Specification Version 1.7, IETF RFC2986, November 2000, http://www.rfc-editor.org/rfc/rfc2986.txt

[RFC3447] J. Jonsson and B. Kaliski, Public-Key Cryptographic Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, IETF RFC3447, February 2003, http://www.rfc-editor.org/rfc/rfc3447.txt

[RFC5208] B. Kaliski, Public Key Cryptographic Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2, IETF RFC5208, May 2008, http://www.rfc-editor.org/rfc/rfc5208.txt

[RFC5755] S. Turner, D. Brown, K. Yiu, R. Housley, T. Polk, Updates for RSAES-OAEP and RSASSA-PSS Algorithm Parameters, IETF RFC5755, January 2010, http://www.rfc-editor.org/rfc/rfc5756.txt

(Updates RFC4055)



[RFC6402] J. Schaad, Certificate Management over CMS (CMC) Updates, IETF RFC6402, November 2011, http://www.rfc-editor.org/rfc/rfc6402.txt

(Updates RFC5272)



[RFC6818] P. Yee, Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC6818, January 2013, http://www.rfc-editor.org/rfc/rfc6818.txt

(Updates RFC5280)



[SP800-38F] M. Dworkin, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, NIST Special Publication 800-38F, December 2012, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf

Abstract: This publication describes cryptographic methods that are approved for “key wrapping,” i.e., the protection of the confidentiality and integrity of cryptographic keys. In addition to describing existing methods, this publication specifies two new, deterministic authenticated-encryption modes of operation of the Advanced Encryption Standard (AES) algorithm: the AES Key Wrap (KW) mode and the AES Key Wrap With Padding (KWP) mode. An analogous mode with the Triple Data Encryption Algorithm (TDEA) as the underlying block cipher, called TKW, is also specified, to support legacy applications.

KMIP includes several of the AES Key Wrapping methods under the reference of ANSI X9.102.



Additional Non-Normative References

[RFC6151] S. Turner and L. Chen, Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms, IETF RFC6151, March 2011, http://www.rfc-editor.org/rfc/rfc6151.txt

(Updates RFC1321 and RFC2104)



[RFC6712] T. Kause, and M. Peylo, Internet X.509 Public Key Infrastructure – HTTP Transfer for the Certificate Management Protocol (CMP), IETF RFC6712, September 2012, http://www.rfc-editor.org/rfc/rfc6712.txt

(Updates RFC4210}



Recommended Updates to the Reference List

The references listed in this section are updated versions of references included in the KMIP 1.2 Specification. These correspond to the references highlighted in turquoise in the edited list. When known, implications to KMIP, if we move to the newer revision of the reference, are provided.



Updates to Normative References

[FIPS 180-4] Secure Hash Standard (SHS), FIPS PUB 180-4, March 2012

http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf

(Supersedes FIPS180-3)



FIPS 180-4 introduces two new hash algorithms (SHA-512/224 and SHA-512/256), includes a method for determining initial values for any future SHA-512-based hash algorithms and removes a requirement for the execution of the message length encoding operation.

The two new hash algorithms, SHA-512/224 and SHA-512/256, are not presently included in the KMIP 1.2 Specification. Updating the reference implies we should add these two new hash algorithms.



[FIPS 186-4] Digital Signature Standard (DSS), FIPS PUB 186-4, July 2013, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf

(Supersedes FIPS 186-3)



This revision includes a clarification of terms, a reduction of restrictions on the use of random number generators and the retention and use of prime number generation seeds, a correction of wording and typographical errors, and further aligns the FIPS with Key Cryptography Standard (PKCS) #1.

No known implications to KMIP related to this revision.



[ISO16609]

(The 2012 revision is the latest – Supersedes the 2004 version. KMIP references a 1991 version)



[ISO9797-1]

(The 2012 revision is the latest – Supersedes the 1999 version that KMIP references)



[SP800-56A] E. Barker, L. Chen, A. Roginsky, and M. Smid, Recommendations for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, NIST Special Publication 800-56A Revision 2, May 2013, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf

(Supersedes SP800-56A Revision 1)


[SP800-57-1] E. Barker, W. Barker, W. Burr, W. Polk and M. Smid, Recommendations for Key Management – Part 1: General (Revision 3), NIST Special Publication 800-57 Part 1 Revision 3, July 2012, http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf

(Supersedes SP800-57 Part 1 Revision 2)


[SP800-67] W. Barker and E. Barker, Recommendations for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication 800-67 Revision 1, January 2012, http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf

(Supersedes SP800-67)


[X.509], International Telecommunications Union (ITU)-T, X.509: Information technology – Open systems interconnection – The Directory: Public-key and attribute certificate frameworks, November 2008,

http://www.itu.int/rec/recommendation.asp?lang=en&parent=T-REC-X.509-200811-I

(Supersedes the August 2005 Revision)



[X9.24-1]

(The 2009 revision is the latest – Supersedes the 2004 version KMIP references)



[X9.63]

(The 2011 revision is the latest – Supersedes the 2001 version KMIP references)


[X9 TR-31]

(The 2010 revision is the latest – Supersedes the 2005 version KMIP references)





База данных защищена авторским правом ©shkola.of.by 2016
звярнуцца да адміністрацыі

    Галоўная старонка