| draft-eastlake-rfc6931bis-xmlsec-uris-28.original | draft-eastlake-rfc6931bis-xmlsec-uris-28.txt | |||
|---|---|---|---|---|
| Internet Engineering Task Force (IETF) D. Eastlake 3rd | ||||
| Request for Comments: 0000 Futurewei Technologies, Inc. | ||||
| Obsoletes: 6931 June 2022 | ||||
| Category: Standards Track | ||||
| ISSN: 2070-1721 | ||||
| Additional XML Security Uniform Resource Identifiers (URIs) | ||||
| Abstract | ||||
| This document updates and corrects the IANA "XML Security URIs" | ||||
| registry that lists URIs intended for use with XML digital | ||||
| signatures, encryption, canonicalization, and key management. These | ||||
| URIs identify algorithms and types of information. This document | ||||
| also updates, corrects three errata against, and obsoletes RFC 6931. | ||||
| Status of This Memo | ||||
| This is an Internet Standards Track document. | ||||
| This document is a product of the Internet Engineering Task Force | ||||
| (IETF). It represents the consensus of the IETF community. It has | ||||
| received public review and has been approved for publication by the | ||||
| Internet Engineering Steering Group (IESG). Further information on | ||||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| Information about the current status of this document, any errata, | ||||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc0000. | ||||
| Copyright Notice | ||||
| Copyright (c) 2022 IETF Trust and the persons identified as the | ||||
| document authors. All rights reserved. | ||||
| This document is subject to BCP 78 and the IETF Trust's Legal | ||||
| Provisions Relating to IETF Documents | ||||
| (https://trustee.ietf.org/license-info) in effect on the date of | ||||
| publication of this document. Please review these documents | ||||
| carefully, as they describe your rights and restrictions with respect | ||||
| to this document. Code Components extracted from this document must | ||||
| include Revised BSD License text as described in Section 4.e of the | ||||
| Trust Legal Provisions and are provided without warranty as described | ||||
| in the Revised BSD License. | ||||
| Table of Contents | ||||
| 1. Introduction | ||||
| 1.1. Terminology | ||||
| 1.2. Acronyms | ||||
| 2. Algorithms | ||||
| 2.1. DigestMethod (Hash) Algorithms | ||||
| 2.1.1. MD5 | ||||
| 2.1.2. SHA-224 | ||||
| 2.1.3. SHA-384 | ||||
| 2.1.4. Whirlpool | ||||
| 2.1.5. SHA3 Algorithms | ||||
| 2.2. SignatureMethod MAC Algorithms | ||||
| 2.2.1. HMAC-MD5 | ||||
| 2.2.2. HMAC SHA Variations | ||||
| 2.2.3. HMAC-RIPEMD160 | ||||
| 2.2.4. Poly1305 | ||||
| 2.2.5. SipHash-2-4 | ||||
| 2.2.6. XMSS and XMSSMT | ||||
| 2.3. SignatureMethod Public Key Signature Algorithms | ||||
| 2.3.1. RSA-MD5 | ||||
| 2.3.2. RSA-SHA256 | ||||
| 2.3.3. RSA-SHA384 | ||||
| 2.3.4. RSA-SHA512 | ||||
| 2.3.5. RSA-RIPEMD160 | ||||
| 2.3.6. ECDSA-SHA*, ECDSA-RIPEMD160, ECDSA-Whirlpool | ||||
| 2.3.7. ESIGN-SHA* | ||||
| 2.3.8. RSA-Whirlpool | ||||
| 2.3.9. RSASSA-PSS with Parameters | ||||
| 2.3.10. RSASSA-PSS without Parameters | ||||
| 2.3.11. RSA-SHA224 | ||||
| 2.3.12. Edwards-Curve | ||||
| 2.4. Minimal Canonicalization | ||||
| 2.5. Transform Algorithms | ||||
| 2.5.1. XPointer | ||||
| 2.6. EncryptionMethod Algorithms | ||||
| 2.6.1. ARCFOUR Encryption Algorithm | ||||
| 2.6.2. Camellia Block Encryption | ||||
| 2.6.3. Camellia Key Wrap | ||||
| 2.6.4. PSEC-KEM, RSAES-KEM, and ECIES-KEM | ||||
| 2.6.5. SEED Block Encryption | ||||
| 2.6.6. SEED Key Wrap | ||||
| 2.6.7. ChaCha20 | ||||
| 2.6.8. ChaCha20+Poly1305 | ||||
| 2.7. Key AgreementMethod Algorithm | ||||
| 2.7.1. X25519 and X448 Key Agreement | ||||
| 2.8. KeyDerivationMethod Algorithm | ||||
| 2.8.1. HKDF Key Derivation | ||||
| 3. KeyInfo | ||||
| 3.1. PKCS #7 Bag of Certificates and CRLs | ||||
| 3.2. Additional RetrievalMethod Type Values | ||||
| 4. Indexes | ||||
| 4.1. Index by Fragment Index | ||||
| 4.2. Index by URI | ||||
| 5. Allocation Considerations | ||||
| 5.1. W3C Allocation Considerations | ||||
| 5.2. IANA Considerations | ||||
| 6. Security Considerations | ||||
| 7. References | ||||
| 7.1. Normative References | ||||
| 7.2. Informational References | ||||
| Appendix A. Changes from RFC 6931 | ||||
| Appendix B. Bad URIs | ||||
| Acknowledgements | ||||
| Author's Address | ||||
| 1. Introduction | ||||
| XML digital signatures, canonicalization, and encryption were | ||||
| standardized by the W3C and by the joint IETF/W3C XMLDSIG Working | ||||
| Group [W3C] [XMLSEC]. These are now W3C Recommendations and some are | ||||
| also RFCs. They are available as follows: | ||||
| +==========================+=============+========================+ | ||||
| | RFC Status | W3C REC | Topic | | ||||
| +==========================+=============+========================+ | ||||
| | [RFC3275] Draft Standard | [XMLDSIG10] | XML Digital Signatures | | ||||
| +--------------------------+-------------+------------------------+ | ||||
| | [RFC3076] Informational | [CANON10] | Canonical XML | | ||||
| +--------------------------+-------------+------------------------+ | ||||
| | - - - - - - | [XMLENC10] | XML Encryption 1.0 | | ||||
| +--------------------------+-------------+------------------------+ | ||||
| | [RFC3741] Informational | [XCANON] | Exclusive XML | | ||||
| | | | Canonicalization 1.0 | | ||||
| +--------------------------+-------------+------------------------+ | ||||
| Table 1 | ||||
| These documents and recommendations use URIs [RFC3986] to identify | ||||
| algorithms and keying information types. The W3C has subsequently | ||||
| produced updated XML Signature 1.1 [XMLDSIG11], Canonical XML 1.1 | ||||
| [CANON11], and XML Encryption 1.1 [XMLENC11] versions, as well as a | ||||
| new XML Signature Properties specification [XMLDSIG-PROP]. | ||||
| In addition, the XML Encryption recommendation has been augmented by | ||||
| [GENERIC], which defines algorithms, XML types, and elements | ||||
| necessary to use generic hybrid ciphers in XML security applications. | ||||
| [GENERIC] also provides for a key encapsulation algorithm and a data | ||||
| encapsulation algorithm, with the combination of the two forming the | ||||
| generic hybrid cipher. | ||||
| All camel-case element names (names with both interior upper and | ||||
| lower case letters) herein, such as DigestValue, are from these | ||||
| documents. | ||||
| This document is an updated convenient reference list of URIs and | ||||
| corresponding algorithms in which there is expressed interest. This | ||||
| document obsoletes and fixes Errata [Err3597], [Err3965], and | ||||
| [Err4004] against [RFC6931]. | ||||
| All of the URIs for algorithms and data types herein are listed in | ||||
| the indexes in Section 4. Of these URIs, those that were added by | ||||
| earlier RFCs or by this document have a subsection in Sections 2 or | ||||
| 3. A few URIs defined elsewhere also have a subsection in Sections 2 | ||||
| or 3, but most such URIs do not. For example, use of SHA-256 as | ||||
| defined in [XMLENC11] has no subsection here but is included in the | ||||
| indexes in Section 4. | ||||
| Specification in this document of the URI representing an algorithm | ||||
| does not imply endorsement of the algorithm for any particular | ||||
| purpose. A protocol specification, which this is not, generally | ||||
| gives algorithm and implementation requirements for the protocol. | ||||
| Security considerations for algorithms are constantly evolving, as | ||||
| documented elsewhere. This specification simply provides some URIs | ||||
| and relevant formatting when those URIs are used. | ||||
| This document is not intended to change the algorithm implementation | ||||
| requirements of any IETF or W3C document. Use of [RFC2119]/[RFC8174] | ||||
| terminology is intended to be only such as is already stated or | ||||
| implied by other authoritative documents. | ||||
| Progressing XML Digital Signature [RFC3275] along the Standards Track | ||||
| required removal of any algorithms from the original version | ||||
| [RFC3075] for which there was not demonstrated interoperability. | ||||
| This required removal of the Minimal Canonicalization algorithm, in | ||||
| which there was continued interest. The URI for Minimal | ||||
| Canonicalization was included in [RFC6931] and is included here. | ||||
| 1.1. Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | ||||
| "OPTIONAL" in this document are to be interpreted as described in | ||||
| BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | ||||
| capitals, as shown here. | ||||
| "camel-case" refers to terms that are mostly lower case but have | ||||
| internal capital letters. | ||||
| 1.2. Acronyms | ||||
| The following acronyms are used in this document: | ||||
| AAD - Additional Authenticated Data | ||||
| AEAD - Authenticated Encryption with Associated Data | ||||
| HMAC - Hashed Message Authentication Code [RFC2104] [RFC5869] | ||||
| IETF - Internet Engineering Task Force <https://www.ietf.org> | ||||
| MAC - Message Authentication Code | ||||
| MD - Message Digest | ||||
| NIST - National Institute of Standards and Technology | ||||
| <https://www.nist.gov> | ||||
| RSA - Rivest, Shamir, and Adleman | ||||
| SHA - Secure Hash Algorithm | ||||
| URI - Uniform Resource Identifier [RFC3986] | ||||
| W3C - World Wide Web Consortium <https://www.w3.org> | ||||
| XML - eXtensible Markup Language | ||||
| 2. Algorithms | ||||
| The URI [RFC3986] that was dropped from the XML Digital Signature | ||||
| standard due to the transition from Proposed Standard to Draft | ||||
| Standard [RFC3275] is included in Section 2.4 with its original | ||||
| <http://www.w3.org/2000/09/xmldsig#> | ||||
| prefix so as to avoid changing the XML Digital Signatures (XMLDSIG) | ||||
| standard's namespace. | ||||
| Additional algorithms in RFC 4051 were given URIs that start with | ||||
| <http://www.w3.org/2001/04/xmldsig-more#> | ||||
| Further algorithms added in [RFC6931] were given URIs that start with | ||||
| <http://www.w3.org/2007/05/xmldsig-more#> | ||||
| and algorithms added in this document are given URIs that start with | ||||
| <http://www.w3.org/2021/04/xmldsig-more#> | ||||
| In addition, for ease of reference, this document includes in the | ||||
| indexes in Section 4 many cryptographic algorithm URIs from XML | ||||
| security documents using the namespaces with which they are defined | ||||
| in those documents as follows: | ||||
| <http://www.w3.org/2000/09/xmldsig#> | ||||
| for some URIs specified in [RFC3275], | ||||
| <http://www.w3.org/2001/04/xmlenc#> | ||||
| for some URIs specified in [XMLENC10], and | ||||
| <http://www.w3/org/xmlsec-ghc#> | ||||
| for some URIs specified in [GENERIC]. | ||||
| See also [XMLSECXREF]. | ||||
| 2.1. DigestMethod (Hash) Algorithms | ||||
| These algorithms are usable wherever a DigestMethod element occurs. | ||||
| 2.1.1. MD5 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#md5 | ||||
| The MD5 algorithm [RFC1321] takes no explicit parameters. An example | ||||
| of an MD5 DigestAlgorithm element is: | ||||
| <DigestAlgorithm | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#md5"/> | ||||
| An MD5 digest is a 128-bit string. The content of the DigestValue | ||||
| element SHALL be the base64 [RFC4648] encoding of this bit string | ||||
| viewed as a 16-octet stream. See [RFC6151] for MD5 security | ||||
| considerations. | ||||
| 2.1.2. SHA-224 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#sha224 | ||||
| The SHA-224 algorithm [FIPS180-4] [RFC6234] takes no explicit | ||||
| parameters. An example of a SHA-224 DigestAlgorithm element is: | ||||
| <DigestAlgorithm | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#sha224" /> | ||||
| A SHA-224 digest is a 224-bit string. The content of the DigestValue | ||||
| element SHALL be the base64 [RFC4648] encoding of this string viewed | ||||
| as a 28-octet stream. | ||||
| 2.1.3. SHA-384 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#sha384 | ||||
| The SHA-384 algorithm [FIPS180-4] takes no explicit parameters. An | ||||
| example of a SHA-384 DigestAlgorithm element is: | ||||
| <DigestAlgorithm | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#sha384" /> | ||||
| A SHA-384 digest is a 384-bit string. The content of the DigestValue | ||||
| element SHALL be the base64 [RFC4648] encoding of this string viewed | ||||
| as a 48-octet stream. | ||||
| 2.1.4. Whirlpool | ||||
| Identifier: | ||||
| http://www.w3.org/2007/05/xmldsig-more#whirlpool | ||||
| The Whirlpool algorithm [ISO-10118-3] takes no explicit parameters. | ||||
| An example of a Whirlpool DigestAlgorithm element is: | ||||
| <DigestAlgorithm | ||||
| Algorithm="http://www.w3.org/2007/05/xmldsig-more#whirlpool" /> | ||||
| A Whirlpool digest is a 512-bit string. The content of the | ||||
| DigestValue element SHALL be the base64 [RFC4648] encoding of this | ||||
| string viewed as a 64-octet stream. | ||||
| 2.1.5. SHA3 Algorithms | ||||
| Identifiers: | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-224 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-256 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-384 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-512 | ||||
| NIST conducted a hash function competition for an alternative to the | ||||
| SHA family. The Keccak-f[1600] algorithm was selected [KECCAK]. | ||||
| This hash function is commonly referred to as "SHA-3" [FIPS202]. | ||||
| A SHA-3 224, 256, 384, and 512 digest is a 224-, 256-, 384-, and | ||||
| 512-bit string, respectively. The content of the DigestValue element | ||||
| SHALL be the base64 [RFC4648] encoding of this string viewed as a | ||||
| 28-, 32-, 48-, and 64-octet stream, respectively. An example of a | ||||
| SHA3-224 DigestAlgorithm element is: | ||||
| <DigestAlgorithm | ||||
| Algorithm="http://www.w3.org/2007/05/xmldsig-more#sha3-224" /> | ||||
| 2.2. SignatureMethod MAC Algorithms | ||||
| This section covers SignatureMethod Message Authentication Code (MAC) | ||||
| Algorithms. | ||||
| Note: Some text in this section is duplicated from [RFC3275] for the | ||||
| convenience of the reader. [RFC3275] is normative in case of | ||||
| conflict. | ||||
| 2.2.1. HMAC-MD5 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-md5 | ||||
| The HMAC algorithm [RFC2104] takes the truncation length in bits as a | ||||
| parameter; if the parameter is not specified, then all the bits of | ||||
| the hash are output. An example of an HMAC-MD5 SignatureMethod | ||||
| element is as follows: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#hmac-md5"> | ||||
| <HMACOutputLength>112</HMACOutputLength> | ||||
| </SignatureMethod> | ||||
| The output of the HMAC algorithm is the output (possibly truncated) | ||||
| of the chosen digest algorithm. This value SHALL be base64 [RFC4648] | ||||
| encoded in the same straightforward fashion as the output of the | ||||
| digest algorithms. Example: the SignatureValue element for the HMAC- | ||||
| MD5 digest | ||||
| 9294727A 3638BB1C 13F48EF8 158BFC9D | ||||
| from the test vectors in <xref target="RFC2104"/> would be | ||||
| kpRyejY4uxwT9I74FYv8nQ== | ||||
| Schema Definition: | ||||
| <simpleType name="HMACOutputLength"> | ||||
| <restriction base="integer"/> | ||||
| </simpleType> | ||||
| DTD: | ||||
| <!ELEMENT HMACOutputLength (#PCDATA) > | ||||
| The Schema Definition and DTD immediately above are copied from | ||||
| [RFC3275]. | ||||
| See [RFC6151] for HMAC-MD5 security considerations. | ||||
| 2.2.2. HMAC SHA Variations | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-sha224 | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-sha256 | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-sha384 | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-sha512 | ||||
| SHA-224, SHA-256, SHA-384, and SHA-512 [FIPS180-4] [RFC6234] can also | ||||
| be used in HMAC as described in Section 2.2.1 for HMAC-MD5. | ||||
| 2.2.3. HMAC-RIPEMD160 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160 | ||||
| RIPEMD-160 [ISO-10118-3] is a 160-bit hash that is used here in HMAC. | ||||
| The output can be optionally truncated. An example is as follows: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160"> | ||||
| <HMACOutputLength>144</HMACOutputLength> | ||||
| </SignatureMethod> | ||||
| 2.2.4. Poly1305 | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#poly1305 | ||||
| Poly1305 [RFC8439] [POLY1305] is a high-speed message authentication | ||||
| code algorithm. It takes a 32-octet one-time key and a message and | ||||
| produces a 16-octet tag, which is used to authenticate the message. | ||||
| An example of a Poly1305 SignatureMethod element is as follows: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2021/04/xmldsig-more#poly1305"/> | ||||
| 2.2.5. SipHash-2-4 | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#siphash-2-4 | ||||
| SipHash [SipHash1] [SipHash2] computes a 64-bit MAC from a 128-bit | ||||
| secret key and a variable-length message. An example of a SipHash- | ||||
| 2-4 SignatureMethod element is as follows: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2021/04/xmldsig-more#siphash-2-4"/> | ||||
| 2.2.6. XMSS and XMSSMT | ||||
| XMSS (eXtended Merkle Signature Scheme) and XMSSMT (XMSS Multi-Tree) | ||||
| [RFC8391] are stateful hash-based signature schemes [FIPS800-208]. | ||||
| According to NIST, it is believed that the security of these schemes | ||||
| depends only on the security of the underlying hash functions, in | ||||
| particular the infeasibility of finding a preimage or a second | ||||
| preimage, and it is believed that the security of these hash | ||||
| functions will not be broken by the development of large-scale | ||||
| quantum computers. | ||||
| For further information on the intended usage of these signature | ||||
| schemes and the careful state management required to maintain their | ||||
| strength, see [FIPS800-208]. | ||||
| IANA maintains a registry whose entries correspond to the XMSS | ||||
| Identifiers below (see [XMSS]). The fragment part of the URIs is | ||||
| formed by replacing occurrences of underscore ("_") in the name | ||||
| appearing in the IANA Registry with hyphen ("-"). | ||||
| Identifiers for XMSS: | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-10-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-10-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-10-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-16-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-16-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-16-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-20-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-20-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-20-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-10-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-10-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-16-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-16-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-20-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake-20-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-10-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-10-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-16-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-16-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-20-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmss-shake256-20-256 | ||||
| The hash functions used in the XMSS signature schemes above are SHA2 | ||||
| [RFC6234] or one of the two the SHAKE extensible output functions | ||||
| [FIPS202] as indicated by the second token of the URI extension | ||||
| (SHAKE means SHAKE128). The tree height for XMSS is 10, 16, or 20 as | ||||
| indicated by the third token of the URI extension. The SHA2 or SHAKE | ||||
| output size is 192, 256, or 512 bits as indicated by the final token | ||||
| of the URI extension. SHA2 with 192 bits of output means | ||||
| SHA2-256/192, that is, the most significant 192 bits of the SHA-256 | ||||
| hash as specified in [FIPS800-208]. | ||||
| IANA maintains a registry whose entries correspond to the XMSSMT | ||||
| Identifiers below (see [XMSS]). The fragment part of the URIs is | ||||
| formed by replacing occurrences of underscore ("_") and slash ("/") | ||||
| in the name appearing in the IANA Registry with hyphen ("-"). | ||||
| Identifiers for XMSSMT: | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-2-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-2-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-4-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-20-4-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-2-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-2-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-4-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-4-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-8-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-8-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-40-8-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-3-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-3-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-3-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-6-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-6-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-6-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-12-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-12-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-sha2-60-12-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-20-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-20-2-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-20-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-20-4-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-2-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-4-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-8-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-40-8-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-3-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-3-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-6-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-6-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-12-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake-60-12-512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-20-2-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-20-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-20-4-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-20-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-2-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-2-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-4-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-4-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-8-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-40-8-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-3-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-3-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-6-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-6-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-12-192 | ||||
| http://www.w3.org/2021/04/xmldsig-more#xmssmt-shake256-60-12-256 | ||||
| The hash functions used in the XMSSMT signature schemes above are | ||||
| SHA2 [RFC6234] or one of the two the SHAKE extensible output function | ||||
| [FIPS202] as indicated by the second token of the URI extension | ||||
| (SHAKE means SHAKE128). The tree height for XMSSMT is 20, 40, or 60 | ||||
| as indicated by the third token of the URI extension. The number of | ||||
| layers is indicated by a fourth token. The SHA2, SHAKE, or SHAKE256 | ||||
| output size is 192, 256, or 512 bits as indicated by the final token | ||||
| of the URI extension. SHA2 with 192 bits of output means | ||||
| SHA2-256/192, that is, the most significant 192 bits of the SHA-256 | ||||
| hash as specified in [FIPS800-208]. | ||||
| An example of an XMSS SignatureAlgorithm element is: | ||||
| <SignatureAlgorithm | ||||
| Algorithm="http://www.w3.org/2021/04/xmldsig-more#xmss-sha2-10-192" | ||||
| /> | ||||
| 2.3. SignatureMethod Public Key Signature Algorithms | ||||
| These algorithms are distinguished from those in Section 2.2 in that | ||||
| they use public key methods. That is to say, the signing key is | ||||
| different from and not feasibly derivable from the verification key. | ||||
| 2.3.1. RSA-MD5 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-md5 | ||||
| This implies the PKCS#1 v1.5 padding algorithm described in | ||||
| [RFC8017]. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-md5" /> | ||||
| The SignatureValue content for an RSA-MD5 signature is the base64 | ||||
| [RFC4648] encoding of the octet string computed as per Section 8.2.1 | ||||
| of [RFC8017], signature generation for the RSASSA-PKCS1-v1_5 | ||||
| signature scheme. As specified in the EMSA-PKCS1-V1_5-ENCODE | ||||
| function in Section 9.2 of [RFC8017], the value input to the | ||||
| signature function MUST contain a prepended algorithm object | ||||
| identifier for the hash function, but the availability of an ASN.1 | ||||
| parser and recognition of OIDs is not required of a signature | ||||
| verifier. The PKCS#1 v1.5 representation appears as: | ||||
| CRYPT (PAD (ASN.1 (OID, DIGEST (data)))) | ||||
| The padded ASN.1 will be of the following form: | ||||
| 01 | FF* | 00 | prefix | hash | ||||
| The vertical bar ("|") represents concatenation. "01", "FF", and "00" | ||||
| are fixed octets of the corresponding hexadecimal value, and the | ||||
| asterisk ("*") after "FF" indicates repetition. "hash" is the MD5 | ||||
| digest of the data. "prefix" is the ASN.1 BER MD5 algorithm | ||||
| designator prefix required in PKCS #1 [RFC8017], that is, | ||||
| hex 30 20 30 0c 06 08 2a 86 48 86 f7 0d 02 05 05 00 04 10 | ||||
| This prefix is included to make it easier to use standard | ||||
| cryptographic libraries. The FF octet MUST be repeated enough times | ||||
| that the value of the quantity being CRYPTed is exactly one octet | ||||
| shorter than the RSA modulus. | ||||
| See [RFC6151] for MD5 security considerations. | ||||
| 2.3.2. RSA-SHA256 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 | ||||
| This implies the PKCS#1 v1.5 padding algorithm [RFC8017] as described | ||||
| in Section 2.3.1 but with the ASN.1 BER SHA-256 algorithm designator | ||||
| prefix. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /> | ||||
| 2.3.3. RSA-SHA384 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-sha384 | ||||
| This implies the PKCS#1 v1.5 padding algorithm [RFC8017] as described | ||||
| in Section 2.3.1 but with the ASN.1 BER SHA-384 algorithm designator | ||||
| prefix. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha384" /> | ||||
| Because it takes about the same effort to calculate a SHA-384 message | ||||
| digest as it does a SHA-512 message digest, it is suggested that RSA- | ||||
| SHA512 be used in preference to RSA-SHA384 where possible. | ||||
| 2.3.4. RSA-SHA512 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-sha512 | ||||
| This implies the PKCS#1 v1.5 padding algorithm [RFC8017] as described | ||||
| in Section 2.3.1 but with the ASN.1 BER SHA-512 algorithm designator | ||||
| prefix. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha512" /> | ||||
| 2.3.5. RSA-RIPEMD160 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-ripemd160 | ||||
| This implies the PKCS#1 v1.5 padding algorithm [RFC8017] as described | ||||
| in Section 2.3.1 but with the ASN.1 BER RIPEMD160 algorithm | ||||
| designator prefix. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-ripemd160" | ||||
| /> | ||||
| 2.3.6. ECDSA-SHA*, ECDSA-RIPEMD160, ECDSA-Whirlpool | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1 | ||||
| http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha224 | ||||
| http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256 | ||||
| http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384 | ||||
| http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512 | ||||
| http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-224 | ||||
| http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-256 | ||||
| http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-384 | ||||
| http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-512 | ||||
| http://www.w3.org/2007/05/xmldsig-more#ecdsa-ripemd160 | ||||
| http://www.w3.org/2007/05/xmldsig-more#ecdsa-whirlpool | ||||
| The Elliptic Curve Digital Signature Algorithm (ECDSA) [FIPS186-4] is | ||||
| the elliptic curve analogue of the Digital Signature Algorithm (DSA) | ||||
| signature method, i.e., the Digital Signature Standard (DSS). It | ||||
| takes no explicit parameters. For some detailed specifications of | ||||
| how to use it with SHA hash functions and XML Digital Signature, | ||||
| please see [X9.62] and [RFC4050]. The #sha3-*, #ecdsa-ripemd160, and | ||||
| #ecdsa-whirlpool fragments identify signature methods processed in | ||||
| the same way as specified by the #ecdsa-sha1 fragment, with the | ||||
| exception that a SHA3 function (see Section 2.1.5), RIPEMD160, or | ||||
| Whirlpool (see Section 2.1.4) is used instead of SHA-1. | ||||
| The output of the ECDSA algorithm consists of a pair of integers | ||||
| usually referred to as the pair (r, s). The signature value consists | ||||
| of the base64 encoding of the concatenation of two octet streams that | ||||
| respectively result from the octet encoding of the values r and s in | ||||
| that order. Conversion from integer to octet stream must be done | ||||
| according to the I2OSP operation defined in the [RFC8017] | ||||
| specification with the l parameter equal to the size of the base | ||||
| point order of the curve in octets (e.g., 32 for the P-256 curve and | ||||
| 66 for the P-521 curve [FIPS186-4]). | ||||
| For an introduction to elliptic curve cryptographic algorithms, see | ||||
| [RFC6090] and note the errata (Errata IDs 2773-2777). | ||||
| 2.3.7. ESIGN-SHA* | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#esign-sha1 | ||||
| http://www.w3.org/2001/04/xmldsig-more#esign-sha224 | ||||
| http://www.w3.org/2001/04/xmldsig-more#esign-sha256 | ||||
| http://www.w3.org/2001/04/xmldsig-more#esign-sha384 | ||||
| http://www.w3.org/2001/04/xmldsig-more#esign-sha512 | ||||
| The ESIGN algorithm specified in [IEEEP1363a] is a signature scheme | ||||
| based on the integer factorization problem. | ||||
| An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#esign-sha1" | ||||
| /> | ||||
| 2.3.8. RSA-Whirlpool | ||||
| Identifier: | ||||
| http://www.w3.org/2007/05/xmldsig-more#rsa-whirlpool | ||||
| As in the definition of the RSA-SHA1 algorithm in [XMLDSIG11], the | ||||
| designator "RSA" means the RSASSA-PKCS1-v1_5 algorithm as defined in | ||||
| [RFC8017]. When identified through the #rsa-whirlpool fragment | ||||
| identifier, Whirlpool is used as the hash algorithm instead. Use of | ||||
| the ASN.1 BER Whirlpool algorithm designator is implied. That | ||||
| designator is: | ||||
| hex 30 4e 30 0a 06 06 28 cf 06 03 00 37 05 00 04 40 | ||||
| as an explicit octet sequence. This corresponds to OID | ||||
| 1.0.10118.3.0.55 defined in [ISO-10118-3]. | ||||
| An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2007/05/xmldsig-more#rsa-whirlpool" | ||||
| /> | ||||
| 2.3.9. RSASSA-PSS with Parameters | ||||
| Identifiers: | ||||
| http://www.w3.org/2007/05/xmldsig-more#rsa-pss | ||||
| http://www.w3.org/2007/05/xmldsig-more#MGF1 | ||||
| These identifiers use the PKCS#1 EMSA-PSS encoding algorithm | ||||
| [RFC8017]. The RSASSA-PSS algorithm takes the digest method (hash | ||||
| function), a mask generation function, the salt length in octets | ||||
| (SaltLength), and the trailer field as explicit parameters. | ||||
| Algorithm identifiers for hash functions specified in XML encryption | ||||
| [XMLENC11], [XMLDSIG11], and in Section 2.1 are considered to be | ||||
| valid algorithm identifiers for hash functions. According to | ||||
| [RFC8017], the default value for the digest function is SHA-1, but | ||||
| due to the discovered weakness of SHA-1 [RFC6194], it is recommended | ||||
| that SHA-256 or a stronger hash function be used. Notwithstanding | ||||
| [RFC8017], SHA-256 is the default to be used with these | ||||
| SignatureMethod identifiers if no hash function has been specified. | ||||
| The default salt length for these SignatureMethod identifiers, if the | ||||
| SaltLength is not specified, SHALL be the number of octets in the | ||||
| hash value of the digest method as recommended in [RFC4055]. In a | ||||
| parameterized RSASSA-PSS signature, the ds:DigestMethod and the | ||||
| SaltLength parameters usually appear. If they do not, the defaults | ||||
| make this equivalent to <http://www.w3.org/2007/05/xmldsig- | ||||
| more#sha256-rsa-MGF1> (see Section 2.3.10). The TrailerField | ||||
| defaults to 1 (0xBC) when omitted. | ||||
| Schema Definition (target namespace <http://www.w3.org/2007/05/ | ||||
| xmldsig-more#>): | ||||
| <xs:element name="RSAPSSParams" type="pss:RSAPSSParamsType"> | ||||
| <xs:annotation> | ||||
| <xs:documentation> | ||||
| Top level element that can be used in xs:any namespace="#other" | ||||
| wildcard of ds:SignatureMethod content. | ||||
| </xs:documentation> | ||||
| </xs:annotation> | ||||
| </xs:element> | ||||
| <xs:complexType name="RSAPSSParamsType"> | ||||
| <xs:sequence> | ||||
| <xs:element ref="ds:DigestMethod" minOccurs="0"/> | ||||
| <xs:element name="MaskGenerationFunction" | ||||
| type="pss:MaskGenerationFunctionType" minOccurs="0"/> | ||||
| <xs:element name="SaltLength" type="xs:int" | ||||
| minOccurs="0"/> | ||||
| <xs:element name="TrailerField" type="xs:int" | ||||
| minOccurs="0"/> | ||||
| </xs:sequence> | ||||
| </xs:complexType> | ||||
| <xs:complexType name="MaskGenerationFunctionType"> | ||||
| <xs:sequence> | ||||
| <xs:element ref="ds:DigestMethod" minOccurs="0"/> | ||||
| </xs:sequence> | ||||
| <xs:attribute name="Algorithm" type="xs:anyURI" | ||||
| default="http://www.w3.org/2007/05/xmldsig-more#MGF1"/> | ||||
| </xs:complexType> | ||||
| 2.3.10. RSASSA-PSS without Parameters | ||||
| [RFC8017] currently specifies only one mask generation function MGF1 | ||||
| based on a hash function. Although [RFC8017] allows for | ||||
| parameterization, the default is to use the same hash function as the | ||||
| digest method function. Only this default approach is supported by | ||||
| this section; therefore, the definition of a mask generation function | ||||
| type is not needed yet. The same applies to the trailer field. | ||||
| There is only one value (0xBC) specified in [RFC8017]. Hence, this | ||||
| default parameter must be used for signature generation. The default | ||||
| salt length is the length of the hash function. | ||||
| Identifiers: | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-224-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-256-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-384-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha3-512-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#md2-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#md5-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha1-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha224-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha256-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha384-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#sha512-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#ripemd128-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#ripemd160-rsa-MGF1 | ||||
| http://www.w3.org/2007/05/xmldsig-more#whirlpool-rsa-MGF1 | ||||
| An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2007/05/xmldsig-more#SHA3-256-rsa-MGF1" | ||||
| /> | ||||
| 2.3.11. RSA-SHA224 | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#rsa-sha224 | ||||
| This implies the PKCS#1 v1.5 padding algorithm [RFC8017] as described | ||||
| in Section 2.3.1 but with the ASN.1 BER SHA-224 algorithm designator | ||||
| prefix. An example of use is: | ||||
| <SignatureMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha224" /> | ||||
| Because it takes about the same effort to calculate a SHA-224 message | ||||
| digest as it does a SHA-256 message digest, it is suggested that RSA- | ||||
| SHA256 be used in preference to RSA-SHA224 where possible. | ||||
| See also Appendix B concerning an erroneous version of this URI that | ||||
| appeared in [RFC6931]. | ||||
| 2.3.12. Edwards-Curve | ||||
| The Edwards-curve Digital Signature Algorithm (EdDSA) is a variant of | ||||
| Schnorr's signature system with Edwards curves. A specification is | ||||
| provided and some advantages listed in [RFC8032]. The general EdDSA | ||||
| takes 11 parameters that must be carefully chosen for secure and | ||||
| efficient operation. Identifiers for two variants, Ed25519 and | ||||
| Ed448, are given below. | ||||
| Ed25519 uses 32-octet public keys and produces 64-octet signatures. | ||||
| It provides about 128 bits of security and uses SHA-512 [RFC6234] | ||||
| internally as part of signature generation. | ||||
| Ed448 uses 57-octet public keys and produces 114-octet signatures. | ||||
| It provides about 224 bits of security and uses "SHAKE256" [FIPS202] | ||||
| internally as part of signature generation. (SHAKE256 is specified | ||||
| by NIST as an "Extensible Output Function" and not specified or | ||||
| approved by NIST as a secure hash function.) | ||||
| For further information on the variants of EdDSA identified below, | ||||
| see [RFC8032]. | ||||
| Identifiers: | ||||
| http://www.w3.org/2021/04/xmldsig-more#eddsa-ed25519ph | ||||
| http://www.w3.org/2021/04/xmldsig-more#eddsa-ed25519ctx | ||||
| http://www.w3.org/2021/04/xmldsig-more#eddsa-ed25519 | ||||
| http://www.w3.org/2021/04/xmldsig-more#eddsa-ed448 | ||||
| http://www.w3.org/2021/04/xmldsig-more#eddsa-ed448ph | ||||
| An example of use is: | ||||
| <SignatureMethod Algorithm= | ||||
| "http://www.w3.org/2021/04/xmldsig-more#eddsa-ed448" /> | ||||
| 2.4. Minimal Canonicalization | ||||
| Thus far, two independent interoperable implementations of Minimal | ||||
| Canonicalization have not been announced. Therefore, when XML | ||||
| Digital Signature was advanced along the Standards Track from | ||||
| [RFC3075] to [RFC3275], Minimal Canonicalization was dropped. | ||||
| However, there was still interest. For its definition, see | ||||
| Section 6.5.1 of [RFC3075]. | ||||
| For reference, its identifier remains: | ||||
| http://www.w3.org/2000/09/xmldsig#minimal | ||||
| 2.5. Transform Algorithms | ||||
| The XPointer Transform algorithm syntax is described below. All | ||||
| CanonicalizationMethod algorithms can also be used as Transform | ||||
| algorithms. | ||||
| 2.5.1. XPointer | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#xptr | ||||
| This transform algorithm takes an [XPointer] as an explicit | ||||
| parameter. An example of use is: | ||||
| <Transform | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more/xptr"> | ||||
| <XPointer | ||||
| xmlns="http://www.w3.org/2001/04/xmldsig-more/xptr"> | ||||
| xpointer(id("foo")) xmlns(bar=http://foobar.example) | ||||
| xpointer(//bar:Zab[@Id="foo"]) | ||||
| </XPointer> | ||||
| </Transform> | ||||
| Schema Definition: | ||||
| <element name="XPointer" type="string"/> | ||||
| DTD: | ||||
| <!ELEMENT XPointer (#PCDATA) > | ||||
| Input to this transform is an octet stream (which is then parsed into | ||||
| XML). | ||||
| Output from this transform is a node set; the results of the XPointer | ||||
| are processed as defined in the XMLDSIG specification [RFC3275] for a | ||||
| same-document XPointer. | ||||
| 2.6. EncryptionMethod Algorithms | ||||
| This subsection gives identifiers and information for several | ||||
| EncryptionMethod Algorithms. | ||||
| 2.6.1. ARCFOUR Encryption Algorithm | ||||
| Identifier: | ||||
| http://www.w3.org/2001/04/xmldsig-more#arcfour | ||||
| ARCFOUR is a fast, simple stream encryption algorithm that is | ||||
| compatible with RSA Security's RC4 algorithm [RC4] (Rivest Cipher 4); | ||||
| however, RC4 has been found to have a number of weaknesses and its | ||||
| use is prohibited in several IETF protocols, for example TLS | ||||
| [RFC7465]. An example EncryptionMethod element using ARCFOUR is: | ||||
| <EncryptionMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#arcfour"> | ||||
| <KeySize>40</KeySize> | ||||
| </EncryptionMethod> | ||||
| Arcfour makes use of the generic KeySize parameter specified and | ||||
| defined in [XMLENC11]. | ||||
| 2.6.2. Camellia Block Encryption | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#camellia128-cbc | ||||
| http://www.w3.org/2001/04/xmldsig-more#camellia192-cbc | ||||
| http://www.w3.org/2001/04/xmldsig-more#camellia256-cbc | ||||
| Camellia is a block cipher with the same interface as the AES | ||||
| [CAMELLIA] [RFC3713]; it has a 128-bit block size and 128-, 192-, and | ||||
| 256-bit key sizes. In XML Encryption, Camellia is used in the same | ||||
| way as the AES: It is used in the Cipher Block Chaining (CBC) mode | ||||
| with a 128-bit initialization vector (IV). The resulting cipher text | ||||
| is prefixed by the IV. If included in XML output, it is then base64 | ||||
| encoded. An example Camellia EncryptionMethod is as follows: | ||||
| <EncryptionMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2001/04/xmldsig-more#camellia128-cbc" | ||||
| /> | ||||
| 2.6.3. Camellia Key Wrap | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#kw-camellia128 | ||||
| http://www.w3.org/2001/04/xmldsig-more#kw-camellia192 | ||||
| http://www.w3.org/2001/04/xmldsig-more#kw-camellia256 | ||||
| Camellia [CAMELLIA] [RFC3713] key wrap is identical to the AES key | ||||
| wrap algorithm [RFC3394] specified in the XML Encryption standard | ||||
| with "AES" replaced by "Camellia". As with AES key wrap, the check | ||||
| value is 0xA6A6A6A6A6A6A6A6. | ||||
| The algorithm is the same regardless of the size of the Camellia key | ||||
| used in wrapping, called the "key encrypting key" or "KEK". If | ||||
| Camellia is supported, it is particularly suggested that wrapping | ||||
| 128-bit keys with a 128-bit KEK and wrapping 256-bit keys with a | ||||
| 256-bit KEK be supported. | ||||
| An example of use is: | ||||
| <EncryptionMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2001/04/xmldsig-more#kw-camellia128" | ||||
| /> | ||||
| 2.6.4. PSEC-KEM, RSAES-KEM, and ECIES-KEM | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#psec-kem | ||||
| http://www.w3.org/2010/xmlsec-ghc#rsaes-kem | ||||
| http://www.w3.org/2010/xmlsec-ghc#ecies-kem | ||||
| These algorithms, specified in [ISO-18033-2], are key encapsulation | ||||
| mechanisms using elliptic curve or RSA encryption. RSAEA-KEM and | ||||
| ECIES-KEM are also specified in [GENERIC]. | ||||
| An example of use of PSEC-KEM is: | ||||
| <EncryptionMethod | ||||
| Algorithm="http://www.w3.org/2001/04/xmldsig-more#psec-kem"> | ||||
| <ECParameters> | ||||
| <Version>version</Version> | ||||
| <FieldID>id</FieldID> | ||||
| <Curve>curve</Curve> | ||||
| <Base>base</Base> | ||||
| <Order>order</Order> | ||||
| <Cofactor>cofactor</Cofactor> | ||||
| </ECParameters> | ||||
| </EncryptionMethod> | ||||
| See [ISO-18033-2] for information on the parameters above. | ||||
| 2.6.5. SEED Block Encryption | ||||
| Identifier: | ||||
| http://www.w3.org/2007/05/xmldsig-more#seed128-cbc | ||||
| SEED [RFC4269] is a block cipher with a 128-bit block size and | ||||
| 128-bit key size. In XML Encryption, SEED can be used in the Cipher | ||||
| Block Chaining (CBC) mode with a 128-bit initialization vector (IV). | ||||
| The resulting cipher text is prefixed by the IV. If included in XML | ||||
| output, it is then base64 encoded. | ||||
| An example SEED EncryptionMethod is as follows: | ||||
| <EncryptionMethod | ||||
| Algorithm="http://www.w3.org/2007/05/xmldsig-more#seed128-cbc" /> | ||||
| 2.6.6. SEED Key Wrap | ||||
| Identifier: | ||||
| http://www.w3.org/2007/05/xmldsig-more#kw-seed128 | ||||
| Key wrapping with SEED is identical to Section 2.2.1 of [RFC3394] | ||||
| with "AES" replaced by "SEED". The algorithm is specified in | ||||
| [RFC4010]. The implementation of SEED is optional. The default | ||||
| initial value is 0xA6A6A6A6A6A6A6A6. | ||||
| An example of use is: | ||||
| <EncryptionMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2007/05/xmldsig-more#kw-seed128" | ||||
| /> | ||||
| 2.6.7. ChaCha20 | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#chacha20 | ||||
| ChaCha20 [RFC8439], a stream cipher, is a variant of Salsa20 | ||||
| [ChaCha]. It is considerably faster than AES in software-only | ||||
| implementations. In addition to a 256-bit key and the plain text to | ||||
| be encrypted, ChaCha20 takes a 96-bit Nonce and an initial 32-bit | ||||
| Counter. The Nonce and Counter are represented as hex in nested | ||||
| elements as shown below. | ||||
| An example of use is: | ||||
| <EncryptionMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2021/04/xmldsig-more#chacha20"> | ||||
| <Nonce>0123456789abcdef01234567</Nonce> | ||||
| <Counter>fedcba09</Counter> | ||||
| </EncryptionMethod> | ||||
| 2.6.8. ChaCha20+Poly1305 | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#chacha20poly1305 | ||||
| ChaCha20+Poly1305 is an Authenticated Encryption with Associated Data | ||||
| (AEAD) algorithm. In addition to a 256-bit key and plain text to be | ||||
| encrypted and authenticated, ChaCha20+Poly1305 takes a 96-bit Nonce | ||||
| and variable-length Additional Authenticated Data (AAD). The Nonce | ||||
| is represented as a child element of the EncryptionMethod element | ||||
| with a hex value. The AAD is a string, which may be null. The AAD | ||||
| element may be absent, in which case the AAD is null. The | ||||
| CipherData, either present in the CipherValue or by reference, is the | ||||
| concatenation of the encrypted ChaCha20 output and the Poly1305 | ||||
| 128-bit tag. | ||||
| An example of use is: | ||||
| <EncryptionMethod | ||||
| Algorithm= | ||||
| "http://www.w3.org/2021/04/xmldsig-more#chacha20poly1305"> | ||||
| <Nonce>0123456789abcdef01234567</Nonce> | ||||
| <AAD>The quick brown fox jumps over the lazy dog.</AAD> | ||||
| </EncryptionMethod> | ||||
| 2.7. Key AgreementMethod Algorithm | ||||
| This subsection gives identifiers and information for an additional | ||||
| key AgreementMethod Algorithm [XMLENC11]. | ||||
| 2.7.1. X25519 and X448 Key Agreement | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#x25519 | ||||
| http://www.w3.org/2021/04/xmldsig-more#x448 | ||||
| The X25519 and X448 key agreement algorithms are specified in | ||||
| [RFC7748]. | ||||
| 2.8. KeyDerivationMethod Algorithm | ||||
| This subsection gives identifiers and information for an additional | ||||
| KeyDerivationMethod Algorithm [XMLENC11]. | ||||
| 2.8.1. HKDF Key Derivation | ||||
| This section covers the HMAC-based Extract-and-Expand Key Derivation | ||||
| Function (HKDF [RFC5869]). | ||||
| Identifier: | ||||
| http://www.w3.org/2021/04/xmldsig-more#hkdf | ||||
| HKDF takes as inputs a hash function, an optional non-secret "salt", | ||||
| initial keying material (IKM), optional context and application- | ||||
| specific "info", and the required output keying size. Note that | ||||
| these strictly determine the output so, for example, invoking HKDF at | ||||
| different times but with the same salt, info, initial keying | ||||
| material, and output key size will produce identical output keying | ||||
| material. | ||||
| The inputs can be supplied to HKDF as follows: | ||||
| hash function: The algorithm attribute of a child DigestMethod | ||||
| element. | ||||
| salt: The content of a Salt child element of AgreementMethod in hex. | ||||
| If not provided, a string of zero octets as long as the hash | ||||
| function output is used as specified in [RFC5869]. | ||||
| IKM: The content of an OriginatorKeyInfo child element of | ||||
| AgreementMethod in hex. May be absent in some applications | ||||
| where this is known through some other method. | ||||
| info: The content of the KA-Nonce child element of AgreementMethod | ||||
| in hex. | ||||
| size: The content of a KeySize child element of AgreementMethod as a | ||||
| decimal number. | ||||
| Here is the test case from Appendix A.1 of [RFC5869] as an example: | ||||
| <AgreementMethod | ||||
| algorithm="http://www.w3.org/2021/04/xmldsig-more#hkdf"> | ||||
| <DigestMethod | ||||
| algorithm="http://www.w3.org/2001/04/xmldsig-more#hmac-sha256"/> | ||||
| <Salt>000102030405060708090a0b0c</Salt> | ||||
| <OriginatorKeyInfo>0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b | ||||
| </OriginatorKeyInfo> | ||||
| <KA-Nonce>f0f1f2f3f4f5f6f7f8f9</KA-Nonce> | ||||
| <KeySize>42</KeySize> | ||||
| </AgreementMethod> | ||||
| 3. KeyInfo | ||||
| In Section 3.1, a KeyInfo element child is specified, while in | ||||
| Section 3.2, additional KeyInfo Type values for use in | ||||
| RetrievalMethod are specified. | ||||
| 3.1. PKCS #7 Bag of Certificates and CRLs | ||||
| A PKCS #7 [RFC2315] "signedData" can also be used as a bag of | ||||
| certificates and/or certificate revocation lists (CRLs). The | ||||
| PKCS7signedData element is defined to accommodate such structures | ||||
| within KeyInfo. The binary PKCS #7 structure is base64 [RFC4648] | ||||
| encoded. Any signer information present is ignored. The following | ||||
| is an example [RFC3092], eliding the base64 data: | ||||
| <foo:PKCS7signedData | ||||
| xmlns:foo="http://www.w3.org/2001/04/xmldsig-more"> | ||||
| ... | ||||
| </foo:PKCS7signedData> | ||||
| 3.2. Additional RetrievalMethod Type Values | ||||
| The Type attribute of RetrievalMethod is an optional identifier for | ||||
| the type of data to be retrieved. The result of dereferencing a | ||||
| RetrievalMethod reference for all KeyInfo types with an XML structure | ||||
| is an XML element or document with that element as the root. The | ||||
| various "raw" key information types return a binary value. Thus, | ||||
| they require a Type attribute because they are not unambiguously | ||||
| parsable. | ||||
| Identifiers: | ||||
| http://www.w3.org/2001/04/xmldsig-more#KeyName | ||||
| http://www.w3.org/2001/04/xmldsig-more#KeyValue | ||||
| http://www.w3.org/2001/04/xmldsig-more#PKCS7signedData | ||||
| http://www.w3.org/2001/04/xmldsig-more#rawPGPKeyPacket | ||||
| http://www.w3.org/2001/04/xmldsig-more#rawPKCS7signedData | ||||
| http://www.w3.org/2001/04/xmldsig-more#rawSPKISexp | ||||
| http://www.w3.org/2001/04/xmldsig-more#rawX509CRL | ||||
| http://www.w3.org/2001/04/xmldsig-more#RetrievalMethod | ||||
| 4. Indexes | ||||
| The following subsections provide an index by URI and by fragment | ||||
| identifier (the portion of the URI after "#") of the algorithm and | ||||
| KeyInfo URIs defined in this document and in the standards plus the | ||||
| one KeyInfo child element name defined in this document. The "Sec/ | ||||
| Doc" column has the section of this document or, if not specified in | ||||
| this document, the standards document where the item is specified. | ||||
| See also [XMLSECXREF]. | ||||
| 4.1. Index by Fragment Index | ||||
| The initial "http://www.w3.org/" part of the URI is not included | ||||
| below. The first six entries have a null fragment identifier or no | ||||
| fragment identifier. "{Bad}" indicates a Bad value that was | ||||
| accidentally included in [RFC6931]. Implementations SHOULD only | ||||
| generate the correct URI but SHOULD understand both the correct and | ||||
| erroneous URI. See also Appendix B. | ||||
| Fragment URI Sec/Doc | ||||
| --------- ---- -------- | ||||
| 2002/06/xmldsig-filter2 [XPATH] | ||||
| 2006/12/xmlc12n11# {Bad} [CANON11] | ||||
| 2006/12/xmlc14n11# [CANON11] | ||||
| TR/1999/REC-xslt-19991116 [XSLT] | ||||
| TR/1999/REC-xpath-19991116 [XPATH] | ||||
| TR/2001/06/xml-exc-c14n# [XCANON] | ||||
| TR/2001/REC-xml-c14n-20010315 [CANON10] | ||||
| TR/2001/REC-xmlschema-1-20010502 [SCHEMA] | ||||
| aes128-cbc 2001/04/xmlenc#aes128-cbc [XMLENC11] | ||||
| aes128-gcm 2009/xmlenc11#aes128-gcm [XMLENC11] | ||||
| aes192-cbc 2001/04/xmlenc#aes192-cbc [XMLENC11] | ||||
| aes192-gcm 2009/xmlenc11#aes192-gcm [XMLENC11] | ||||
| aes256-cbc 2001/04/xmlenc#aes256-cbc [XMLENC11] | ||||
| aes256-gcm 2009/xmlenc11#aes256-gcm [XMLENC11] | ||||
| arcfour 2001/04/xmldsig-more#arcfour 2.6.1 | ||||
| base64 2000/09/xmldsig#base64 [RFC3275] | ||||
| camellia128-cbc 2001/04/xmldsig-more#camellia128-cbc 2.6.2 | ||||
| camellia192-cbc 2001/04/xmldsig-more#camellia192-cbc 2.6.2 | ||||
| camellia256-cbc 2001/04/xmldsig-more#camellia256-cbc 2.6.2 | ||||
| chacha20 2021/04/xmldsig-more#chacha20 2.6.7 | ||||
| chacha20poly1305 2021/04/xmldsig-more#chacha20poly1305 2.6.8 | ||||
| ConcatKDF 2009/xmlenc11#ConcatKDF [XMLENC11] | ||||
| decrypt#XML 2002/07/decrypt#XML [DECRYPT] | ||||
| decrypt#Binary 2002/07/decrypt#Binary [DECRYPT] | ||||
| DEREncodedKeyValue 2009/xmldsig11#DEREncodedKeyValue [XMLDSIG11] | ||||
| dh 2001/04/xmlenc#dh [XMLENC11] | ||||
| dh-es 2009/xmlenc11#dh-es [XMLENC11] | ||||
| dsa-sha1 2000/09/xmldsig#dsa-sha1 [RFC3275] | ||||
| dsa-sha256 2009/xmldsig11#dsa-sha256 [XMLDSIG11] | ||||
| DSAKeyValue 2000/09/xmldsig#DSAKeyValue [XMLDSIG11] | ||||
| ECDH-ES 2009/xmlenc11#ECDH-ES [XMLENC11] | ||||
| ecdsa-ripemd160 2007/05/xmldsig-more#ecdsa-ripemd160 2.3.6 | ||||
| ecdsa-sha1 2001/04/xmldsig-more#ecdsa-sha1 2.3.6 | ||||
| ecdsa-sha224 2001/04/xmldsig-more#ecdsa-sha224 2.3.6 | ||||
| ecdsa-sha256 2001/04/xmldsig-more#ecdsa-sha256 2.3.6 | ||||
| ecdsa-sha384 2001/04/xmldsig-more#ecdsa-sha384 2.3.6 | ||||
| ecdsa-sha512 2001/04/xmldsig-more#ecdsa-sha512 2.3.6 | ||||
| ecdsa-sha3-224 2021/04/xmldsig-more#ecdsa-sha3-224 2.3.6 | ||||
| ecdsa-sha3-256 2021/04/xmldsig-more#ecdsa-sha3-256 2.3.6 | ||||
| ecdsa-sha3-384 2021/04/xmldsig-more#ecdsa-sha3-384 2.3.6 | ||||
| ecdsa-sha3-512 2021/04/xmldsig-more#ecdsa-sha3-512 2.3.6 | ||||
| ecdsa-whirlpool 2007/05/xmldsig-more#ecdsa-whirlpool 2.3.5 | ||||
| ecies-kem 2010/xmlsec-ghc#ecies-kem [GENERIC] | ||||
| ECKeyValue 2009/xmldsig11#ECKeyValue [XMLDSIG11] | ||||
| eddsa-ed25519 2021/04/xmldsig-more#eddsa-ed25519 2.3.12 | ||||
| eddsa-ed25519ctx 2021/04/xmldsig-more#eddsa-ed25519ctx 2.3.12 | ||||
| eddsa-ed25519ph 2021/04/xmldsig-more#eddsa-ed25519ph 2.3.12 | ||||
| eddsa-ed448 2021/04/xmldsig-more#eddsa-ed448 2.3.12 | ||||
| eddsa-ed448ph 2021/04/xmldsig-more#eddsa-ed448ph 2.3.12 | ||||
| enveloped-signature 2000/09/xmldsig#enveloped-signature [RFC3275] | ||||
| esign-sha1 2001/04/xmldsig-more#esign-sha1 2.3.7 | ||||
| esign-sha224 2001/04/xmldsig-more#esign-sha224 2.3.7 | ||||
| esign-sha256 2001/04/xmldsig-more#esign-sha256 2.3.7 | ||||
| esign-sha384 2001/04/xmldsig-more#esign-sha384 2.3.7 | ||||
| esign-sha512 2001/04/xmldsig-more#esign-sha512 2.3.7 | ||||
| generic-hybrid 2010/xmlsec-ghc#generic-hybrid [GENERIC] | ||||
| hkdf 2021/04/xmldsig-more#hkdf 2.8.1 | ||||
| hmac-md5 2001/04/xmldsig-more#hmac-md5 2.2.1 | ||||
| hmac-ripemd160 2001/04/xmldsig-more#hmac-ripemd160 2.2.3 | ||||
| hmac-sha1 2000/09/xmldsig#hmac-sha1 [RFC3275] | ||||
| hmac-sha224 2001/04/xmldsig-more#hmac-sha224 2.2.2 | ||||
| hmac-sha256 2001/04/xmldsig-more#hmac-sha256 2.2.2 | ||||
| hmac-sha384 2001/04/xmldsig-more#hmac-sha384 2.2.2 | ||||
| hmac-sha512 2001/04/xmldsig-more#hmac-sha512 2.2.2 | ||||
| KeyName 2001/04/xmldsig-more#KeyName 3.2 | ||||
| KeyValue 2001/04/xmldsig-more#KeyValue 3.2 | ||||
| kw-aes128 2001/04/xmlenc#kw-aes128 [XMLENC11] | ||||
| kw-aes128-pad 2009/xmlenc11#kw-aes-128-pad [XMLENC11] | ||||
| kw-aes192 2001/04/xmlenc#kw-aes192 [XMLENC11] | ||||
| kw-aes192-pad 2009/xmlenc11#kw-aes-192-pad [XMLENC11] | ||||
| kw-aes256 2001/04/xmlenc#kw-aes256 [XMLENC11] | ||||
| kw-aes256-pad 2009/xmlenc11#kw-aes-256-pad [XMLENC11] | ||||
| kw-camellia128 2001/04/xmldsig-more#kw-camellia128 2.6.3 | ||||
| kw-camellia192 2001/04/xmldsig-more#kw-camellia192 2.6.3 | ||||
| kw-camellia256 2001/04/xmldsig-more#kw-camellia256 2.6.3 | ||||
| kw-seed128 2007/05/xmldsig-more#kw-seed128 2.6.6 | ||||
| md2-rsa-MGF1 2007/05/xmldsig-more#md2-rsa-MGF1 2.3.10 | ||||
| md5 2001/04/xmldsig-more#md5 2.1.1 | ||||
| md5-rsa-MGF1 2007/05/xmldsig-more#md5-rsa-MGF1 2.3.10 | ||||
| MGF1 2007/05/xmldsig-more#MGF1 2.3.9 | ||||
| mgf1sha1 2009/xmlenc11#mgf1sha1 [XMLENC11] | ||||
| mgf1sha224 2009/xmlenc11#mgf1sha224 [XMLENC11] | ||||
| mgf1sha256 2009/xmlenc11#mgf1sha256 [XMLENC11] | ||||
| mgf1sha384 2009/xmlenc11#mgf1sha384 [XMLENC11] | ||||
| mgf1sha512 2009/xmlenc11#mgf1sha512 [XMLENC11] | ||||
| MgmtData 2000/09/xmldsig#MgmtData [XMLDSIG11] | ||||
| minimal 2000/09/xmldsig#minimal 2.4 | ||||
| pbkdf2 2009/xmlenc11#pbkdf2 [XMLENC11] | ||||
| PGPData 2000/09/xmldsig#PGPData [XMLDSIG11] | ||||
| PKCS7signedData 2001/04/xmldsig-more#PKCS7signedData 3.1 | ||||
| PKCS7signedData 2001/04/xmldsig-more#PKCS7signedData 3.2 | ||||
| poly1305 2021/04/xmldsig-more#poly1305 2.2.4 | ||||
| psec-kem 2001/04/xmldsig-more#psec-kem 2.6.4 | ||||
| rawPGPKeyPacket 2001/04/xmldsig-more#rawPGPKeyPacket 3.2 | ||||
| rawPKCS7signedData 2001/04/xmldsig-more#rawPKCS7signedData 3.2 | ||||
| rawSPKISexp 2001/04/xmldsig-more#rawSPKISexp 3.2 | ||||
| rawX509Certificate 2000/09/xmldsig#rawX509Certificate [RFC3275] | ||||
| rawX509CRL 2001/04/xmldsig-more#rawX509CRL 3.2 | ||||
| RetrievalMethod 2001/04/xmldsig-more#RetrievalMethod 3.2 | ||||
| ripemd128-rsa-MGF1 2007/05/xmldsig-more#ripemd128-rsa-MGF1 | ||||
| 2.3.10 | ||||
| ripemd160 2001/04/xmlenc#ripemd160 [XMLENC11] | ||||
| ripemd160-rsa-MGF1 2007/05/xmldsig-more#ripemd160-rsa-MGF1 | ||||
| 2.3.10 | ||||
| rsa-1_5 2001/04/xmlenc#rsa-1_5 [XMLENC11] | ||||
| rsa-md5 2001/04/xmldsig-more#rsa-md5 2.3.1 | ||||
| rsa-oaep 2009/xmlenc11#rsa-oaep [XMLENC11] | ||||
| rsa-oaep-mgf1p 2001/04/xmlenc#rsa-oaep-mgf1p [XMLENC11] | ||||
| rsa-pss 2007/05/xmldsig-more#rsa-pss 2.3.9 | ||||
| rsa-ripemd160 2001/04/xmldsig-more#rsa-ripemd160 2.3.5 | ||||
| rsa-sha1 2000/09/xmldsig#rsa-sha1 [RFC3275] | ||||
| rsa-sha224 2007/05/xmldsig-more#rsa-sha224 {Bad} 2.3.11 | ||||
| rsa-sha224 2001/04/xmldsig-more#rsa-sha224 2.3.11 | ||||
| rsa-sha256 2001/04/xmldsig-more#rsa-sha256 2.3.2 | ||||
| rsa-sha384 2001/04/xmldsig-more#rsa-sha384 2.3.3 | ||||
| rsa-sha512 2001/04/xmldsig-more#rsa-sha512 2.3.4 | ||||
| rsa-whirlpool 2007/05/xmldsig-more#rsa-whirlpool 2.3.5 | ||||
| rsaes-kem 2010/xmlsec-ghc#rsaes-kem [GENERIC] | ||||
| RSAKeyValue 2000/09/xmldsig#RSAKeyValue [XMLDSIG11] | ||||
| seed128-cbc 2007/05/xmldsig-more#seed128-cbc 2.6.5 | ||||
| sha1 2000/09/xmldsig#sha1 [RFC3275] | ||||
| sha1-rsa-MGF1 2007/05/xmldsig-more#sha1-rsa-MGF1 2.3.10 | ||||
| sha224 2001/04/xmldsig-more#sha224 2.1.2 | ||||
| sha224-rsa-MGF1 2007/05/xmldsig-more#sha224-rsa-MGF1 2.3.10 | ||||
| sha256 2001/04/xmlenc#sha256 [XMLENC11] | ||||
| sha256-rsa-MGF1 2007/05/xmldsig-more#sha256-rsa-MGF1 2.3.10 | ||||
| sha3-224 2007/05/xmldsig-more#sha3-224 2.1.5 | ||||
| sha3-224-rsa-MGF1 2007/05/xmldsig-more#sha3-224-rsa-MGF1 2.3.10 | ||||
| sha3-256 2007/05/xmldsig-more#sha3-256 2.1.5 | ||||
| sha3-256-rsa-MGF1 2007/05/xmldsig-more#sha3-256-rsa-MGF1 2.3.10 | ||||
| sha3-384 2007/05/xmldsig-more#sha3-384 2.1.5 | ||||
| sha3-384-rsa-MGF1 2007/05/xmldsig-more#sha3-384-rsa-MGF1 2.3.10 | ||||
| sha3-512 2007/05/xmldsig-more#sha3-512 2.1.5 | ||||
| sha3-512-rsa-MGF1 2007/05/xmldsig-more#sha3-512-rsa-MGF1 2.3.10 | ||||
| sha384 2001/04/xmldsig-more#sha384 2.1.3 | ||||
| sha384-rsa-MGF1 2007/05/xmldsig-more#sha384-rsa-MGF1 2.3.10 | ||||
| sha512 2001/04/xmlenc#sha512 [XMLENC11] | ||||
| sha512-rsa-MGF1 2007/05/xmldsig-more#sha512-rsa-MGF1 2.3.10 | ||||
| siphash-2-4 2021/04/xmldsig-more#siphash-2-4 2.2.5 | ||||
| SPKIData 2000/09/xmldsig#SPKIData [XMLDSIG11] | ||||
| tripledes-cbc 2001/04/xmlenc#tripledes-cbc [XMLENC11] | ||||
| whirlpool 2007/05/xmldsig-more#whirlpool 2.1.4 | ||||
| whirlpool-rsa-MGF1 2007/05/xmldsig-more#whirlpool-rsa-MGF1 | ||||
| 2.3.10 | ||||
| WithComments 2006/12/xmlc14n11#WithComments [CANON11] | ||||
| WithComments TR/2001/06/xml-exc-c14n#WithComments | ||||
| [XCANON] | ||||
| WithComments TR/2001/REC-xml-c14n-20010315#WithComments | ||||
| [CANON10] | ||||
| x25519 2021/04/xmldsig-more#x25519 2.7.1 | ||||
| x448 2021/04/xmldsig-more#x448 2.7.1 | ||||
| X509Data 2000/09/xmldsig#X509Data [XMLDSIG11] | ||||
| xmss-sha2-10-192 2021/04/xmldsig-more#xmss-sha2-10-192 2.2.6 | ||||
| xmss-sha2-10-256 2021/04/xmldsig-more#xmss-sha2-10-256 2.2.6 | ||||
| xmss-sha2-10-512 2021/04/xmldsig-more#xmss-sha2-10-512 2.2.6 | ||||
| xmss-sha2-16-192 2021/04/xmldsig-more#xmss-sha2-16-192 2.2.6 | ||||
| xmss-sha2-16-256 2021/04/xmldsig-more#xmss-sha2-16-256 2.2.6 | ||||
| xmss-sha2-16-512 2021/04/xmldsig-more#xmss-sha2-16-512 2.2.6 | ||||
| xmss-sha2-20-192 2021/04/xmldsig-more#xmss-sha2-20-192 2.2.6 | ||||
| xmss-sha2-20-256 2021/04/xmldsig-more#xmss-sha2-20-256 2.2.6 | ||||
| xmss-sha2-20-512 2021/04/xmldsig-more#xmss-sha2-20-512 2.2.6 | ||||
| xmss-shake-10-256 2021/04/xmldsig-more#xmss-shake-10-256 2.2.6 | ||||
| xmss-shake-10-512 2021/04/xmldsig-more#xmss-shake-10-512 2.2.6 | ||||
| xmss-shake-16-256 2021/04/xmldsig-more#xmss-shake-16-256 2.2.6 | ||||
| xmss-shake-16-512 2021/04/xmldsig-more#xmss-shake-16-512 2.2.6 | ||||
| xmss-shake-20-256 2021/04/xmldsig-more#xmss-shake-20-256 2.2.6 | ||||
| xmss-shake-20-512 2021/04/xmldsig-more#xmss-shake-20-512 2.2.6 | ||||
| xmss-shake256-10-192 2021/04/xmldsig-more#xmss-shake256-10-192 | ||||
| 2.2.6 | ||||
| xmss-shake256-10-256 2021/04/xmldsig-more#xmss-shake256-10-256 | ||||
| 2.2.6 | ||||
| xmss-shake256-16-192 2021/04/xmldsig-more#xmss-shake256-16-192 | ||||
| 2.2.6 | ||||
| xmss-shake256-16-256 2021/04/xmldsig-more#xmss-shake256-16-256 | ||||
| 2.2.6 | ||||
| xmss-shake256-20-192 2021/04/xmldsig-more#xmss-shake256-20-192 | ||||
| 2.2.6 | ||||
| xmss-shake256-20-256 2021/04/xmldsig-more#xmss-shake256-20-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-2-192 2021/04/xmldsig-more#xmssmt-sha2-20-2-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-2-256 2021/04/xmldsig-more#xmssmt-sha2-20-2-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-2-256 2021/04/xmldsig-more#xmssmt-sha2-20-2-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-4-192 2021/04/xmldsig-more#xmssmt-sha2-20-4-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-4-256 2021/04/xmldsig-more#xmssmt-sha2-20-4-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-20-4-256 2021/04/xmldsig-more#xmssmt-sha2-20-4-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-2-192 2021/04/xmldsig-more#xmssmt-sha2-40-2-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-2-256 2021/04/xmldsig-more#xmssmt-sha2-40-2-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-2-256 2021/04/xmldsig-more#xmssmt-sha2-40-2-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-4-192 2021/04/xmldsig-more#xmssmt-sha2-40-4-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-4-256 2021/04/xmldsig-more#xmssmt-sha2-40-4-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-4-256 2021/04/xmldsig-more#xmssmt-sha2-40-4-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-8-192 2021/04/xmldsig-more#xmssmt-sha2-40-8-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-8-256 2021/04/xmldsig-more#xmssmt-sha2-40-8-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-40-8-256 2021/04/xmldsig-more#xmssmt-sha2-40-8-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-3-192 2021/04/xmldsig-more#xmssmt-sha2-60-3-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-3-256 2021/04/xmldsig-more#xmssmt-sha2-60-3-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-3-256 2021/04/xmldsig-more#xmssmt-sha2-60-3-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-6-192 2021/04/xmldsig-more#xmssmt-sha2-60-6-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-6-256 2021/04/xmldsig-more#xmssmt-sha2-60-6-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-6-256 2021/04/xmldsig-more#xmssmt-sha2-60-6-512 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-12-192 2021/04/xmldsig-more#xmssmt-sha2-60-12-192 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-12-256 2021/04/xmldsig-more#xmssmt-sha2-60-12-256 | ||||
| 2.2.6 | ||||
| xmssmt-sha2-60-12-256 2021/04/xmldsig-more#xmssmt-sha2-60-12-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-20-2-256 2021/04/xmldsig-more#xmssmt-shake-20-2-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-20-2-512 2021/04/xmldsig-more#xmssmt-shake-20-2-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-20-4-256 2021/04/xmldsig-more#xmssmt-shake-20-4-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-20-4-512 2021/04/xmldsig-more#xmssmt-shake-20-4-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-2-256 2021/04/xmldsig-more#xmssmt-shake-40-2-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-2-512 2021/04/xmldsig-more#xmssmt-shake-40-2-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-4-256 2021/04/xmldsig-more#xmssmt-shake-40-4-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-4-512 2021/04/xmldsig-more#xmssmt-shake-40-4-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-8-256 2021/04/xmldsig-more#xmssmt-shake-40-8-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-40-8-512 2021/04/xmldsig-more#xmssmt-shake-40-8-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-3-256 2021/04/xmldsig-more#xmssmt-shake-60-3-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-3-512 2021/04/xmldsig-more#xmssmt-shake-60-3-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-6-256 2021/04/xmldsig-more#xmssmt-shake-60-6-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-6-512 2021/04/xmldsig-more#xmssmt-shake-60-6-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-12-256 2021/04/xmldsig-more#xmssmt-shake-20-12-256 | ||||
| 2.2.6 | ||||
| xmssmt-shake-60-12-512 2021/04/xmldsig-more#xmssmt-shake-20-12-512 | ||||
| 2.2.6 | ||||
| xmssmt-shake256-20-2-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-2-192 2.2.6 | ||||
| xmssmt-shake256-20-2-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-2-256 2.2.6 | ||||
| xmssmt-shake256-20-4-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-4-192 2.2.6 | ||||
| xmssmt-shake256-20-4-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-4-256 2.2.6 | ||||
| xmssmt-shake256-40-2-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-2-192 2.2.6 | ||||
| xmssmt-shake256-40-2-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-2-256 2.2.6 | ||||
| xmssmt-shake256-40-4-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-4-192 2.2.6 | ||||
| xmssmt-shake256-40-4-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-4-256 2.2.6 | ||||
| xmssmt-shake256-40-8-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-8-192 2.2.6 | ||||
| xmssmt-shake256-40-8-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-8-256 2.2.6 | ||||
| xmssmt-shake256-60-3-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-3-192 2.2.6 | ||||
| xmssmt-shake256-60-3-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-3-256 2.2.6 | ||||
| xmssmt-shake256-60-6-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-6-192 2.2.6 | ||||
| xmssmt-shake256-60-6-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-6-256 2.2.6 | ||||
| xmssmt-shake256-60-12-192 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-12-192 2.2.6 | ||||
| xmssmt-shake256-60-12-256 | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-12-256 2.2.6 | ||||
| xptr 2001/04/xmldsig-more#xptr 2.5.1 | ||||
| --------- ---- -------- | ||||
| Fragment URI Sec/Doc | ||||
| The initial "http://www.w3.org/" part of the URI is not included | ||||
| above. | ||||
| 4.2. Index by URI | ||||
| The initial "http://www.w3.org/" part of the URI is not included | ||||
| below. "{Bad}" indicates a Bad value that was accidentally included | ||||
| in [RFC6931]. Implementations SHOULD only generate the correct URI | ||||
| but SHOULD understand both the correct and erroneous URI. See also | ||||
| Appendix B. | ||||
| URI Sec/Doc Type | ||||
| ---- -------- ------ | ||||
| 2000/09/xmldsig#base64 [RFC3275] Transform | ||||
| 2000/09/xmldsig#DSAKeyValue [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#dsa-sha1 [RFC3275] SignatureMethod | ||||
| 2000/09/xmldsig#enveloped-signature [RFC3275] Transform | ||||
| 2000/09/xmldsig#hmac-sha1 [RFC3275] SignatureMethod | ||||
| 2000/09/xmldsig#MgmtData [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#minimal 2.4 Canonicalization | ||||
| 2000/09/xmldsig#PGPData [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#rawX509Certificate [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#rsa-sha1 [RFC3275] SignatureMethod | ||||
| 2000/09/xmldsig#RSAKeyValue [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#sha1 [RFC3275] DigestAlgorithm | ||||
| 2000/09/xmldsig#SPKIData [RFC3275] Retrieval type | ||||
| 2000/09/xmldsig#X509Data [RFC3275] Retrieval type | ||||
| 2001/04/xmldsig-more#arcfour 2.6.1 EncryptionMethod | ||||
| 2001/04/xmldsig-more#camellia128-cbc 2.6.2 EncryptionMethod | ||||
| 2001/04/xmldsig-more#camellia192-cbc 2.6.2 EncryptionMethod | ||||
| 2001/04/xmldsig-more#camellia256-cbc 2.6.2 EncryptionMethod | ||||
| 2001/04/xmldsig-more#ecdsa-sha1 2.3.6 SignatureMethod | ||||
| 2001/04/xmldsig-more#ecdsa-sha224 2.3.6 SignatureMethod | ||||
| 2001/04/xmldsig-more#ecdsa-sha256 2.3.6 SignatureMethod | ||||
| 2001/04/xmldsig-more#ecdsa-sha384 2.3.6 SignatureMethod | ||||
| 2001/04/xmldsig-more#ecdsa-sha512 2.3.6 SignatureMethod | ||||
| 2001/04/xmldsig-more#esign-sha1 2.3.7 SignatureMethod | ||||
| 2001/04/xmldsig-more#esign-sha224 2.3.7 SignatureMethod | ||||
| 2001/04/xmldsig-more#esign-sha256 2.3.7 SignatureMethod | ||||
| 2001/04/xmldsig-more#esign-sha384 2.3.7 SignatureMethod | ||||
| 2001/04/xmldsig-more#esign-sha512 2.3.7 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-md5 2.2.1 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-ripemd160 2.2.3 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-sha224 2.2.2 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-sha256 2.2.2 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-sha384 2.2.2 SignatureMethod | ||||
| 2001/04/xmldsig-more#hmac-sha512 2.2.2 SignatureMethod | ||||
| 2001/04/xmldsig-more#KeyName 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#KeyValue 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#kw-camellia128 2.6.3 EncryptionMethod | ||||
| 2001/04/xmldsig-more#kw-camellia192 2.6.3 EncryptionMethod | ||||
| 2001/04/xmldsig-more#kw-camellia256 2.6.3 EncryptionMethod | ||||
| 2001/04/xmldsig-more#md5 2.1.1 DigestAlgorithm | ||||
| 2001/04/xmldsig-more#PKCS7signedData 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#psec-kem 2.6.4 EncryptionMethod | ||||
| 2001/04/xmldsig-more#rawPGPKeyPacket 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#rawPKCS7signedData 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#rawSPKISexp 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#rawX509CRL 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#RetrievalMethod 3.2 Retrieval type | ||||
| 2001/04/xmldsig-more#rsa-md5 2.3.1 SignatureMethod | ||||
| 2001/04/xmldsig-more#rsa-sha224 2.3.11 SignatureMethod | ||||
| 2001/04/xmldsig-more#rsa-sha256 2.3.2 SignatureMethod | ||||
| 2001/04/xmldsig-more#rsa-sha384 2.3.3 SignatureMethod | ||||
| 2001/04/xmldsig-more#rsa-sha512 2.3.4 SignatureMethod | ||||
| 2001/04/xmldsig-more#rsa-ripemd160 2.3.5 SignatureMethod | ||||
| 2001/04/xmldsig-more#sha224 2.1.2 DigestAlgorithm | ||||
| 2001/04/xmldsig-more#sha384 2.1.3 DigestAlgorithm | ||||
| 2001/04/xmldsig-more#xptr 2.5.1 Transform | ||||
| 2001/04/xmldsig-more#PKCS7signedData 3.1 KeyInfo child | ||||
| 2001/04/xmlenc#aes128-cbc [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#aes192-cbc [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#aes256-cbc [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#dh [XMLENC11] AgreementMethod | ||||
| 2001/04/xmlenc#kw-aes128 [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#kw-aes192 [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#kw-aes256 [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#ripemd160 [XMLENC11] DigestAlgorithm | ||||
| 2001/04/xmlenc#rsa-1_5 [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#rsa-oaep-mgf1p [XMLENC11] EncryptionMethod | ||||
| 2001/04/xmlenc#sha256 [XMLENC11] DigestAlgorithm | ||||
| 2001/04/xmlenc#sha512 [XMLENC11] DigestAlgorithm | ||||
| 2001/04/xmlenc#tripledes-cbc [XMLENC11] EncryptionMethod | ||||
| 2002/06/xmldsig-filter2 [XPATH] Transform | ||||
| 2002/07/decrypt#XML [DECRYPT] Transform | ||||
| 2002/07/decrypt#Binary [DECRYPT] Transform | ||||
| 2006/12/xmlc12n11# {Bad} [CANON11] Canonicalization | ||||
| 2006/12/xmlc14n11# [CANON11] Canonicalization | ||||
| 2006/12/xmlc14n11#WithComments [CANON11] Canonicalization | ||||
| 2007/05/xmldsig-more#ecdsa-ripemd160 2.3.6 SignatureMethod | ||||
| 2007/05/xmldsig-more#ecdsa-whirlpool 2.3.5 SignatureMethod | ||||
| 2007/05/xmldsig-more#kw-seed128 2.6.6 EncryptionMethod | ||||
| 2007/05/xmldsig-more#md2-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#md5-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#MGF1 2.3.9 SignatureMethod | ||||
| 2007/05/xmldsig-more#ripemd128-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#ripemd160-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#rsa-pss 2.3.9 SignatureMethod | ||||
| 2007/05/xmldsig-more#rsa-sha224 {Bad} 2.3.11 SignatureMethod | ||||
| 2007/05/xmldsig-more#rsa-whirlpool 2.3.5 SignatureMethod | ||||
| 2007/05/xmldsig-more#seed128-cbc 2.6.5 EncryptionMethod | ||||
| 2007/05/xmldsig-more#sha1-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha224-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha256-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha3-224 2.1.5 DigestAlgorithm | ||||
| 2007/05/xmldsig-more#sha3-224-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha3-256 2.1.5 DigestAlgorithm | ||||
| 2007/05/xmldsig-more#sha3-256-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha3-384 2.1.5 DigestAlgorithm | ||||
| 2007/05/xmldsig-more#sha3-384-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha3-512 2.1.5 DigestAlgorithm | ||||
| 2007/05/xmldsig-more#sha3-512-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha384-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#sha512-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2007/05/xmldsig-more#whirlpool 2.1.4 DigestAlgorithm | ||||
| 2007/05/xmldsig-more#whirlpool-rsa-MGF1 2.3.10 SignatureMethod | ||||
| 2009/xmlenc11#kw-aes-128-pad [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#kw-aes-192-pad [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#kw-aes-256-pad [XMLENC11] EncryptionMethod | ||||
| 2009/xmldsig11#dsa-sha256 [XMLDSIG11] SignatureMethod | ||||
| 2009/xmldsig11#ECKeyValue [XMLDSIG11] Retrieval type | ||||
| 2009/xmldsig11#DEREncodedKeyValue [XMLDSIG11] Retrieval type | ||||
| 2009/xmlenc11#aes128-gcm [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#aes192-gcm [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#aes256-gcm [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#ConcatKDF [XMLENC11] KeyDerivation | ||||
| 2009/xmlenc11#mgf1sha1 [XMLENC11] SignatureMethod | ||||
| 2009/xmlenc11#mgf1sha224 [XMLENC11] SignatureMethod | ||||
| 2009/xmlenc11#mgf1sha256 [XMLENC11] SignatureMethod | ||||
| 2009/xmlenc11#mgf1sha384 [XMLENC11] SignatureMethod | ||||
| 2009/xmlenc11#mgf1sha512 [XMLENC11] SignatureMethod | ||||
| 2009/xmlenc11#pbkdf2 [XMLENC11] KeyDerivation | ||||
| 2009/xmlenc11#rsa-oaep [XMLENC11] EncryptionMethod | ||||
| 2009/xmlenc11#ECDH-ES [XMLENC11] AgreementMethod | ||||
| 2009/xmlenc11#dh-es [XMLENC11] EncryptionMethod | ||||
| 2010/xmlsec-ghc#generic-hybrid [GENERIC] Generic Hybrid | ||||
| 2010/xmlsec-ghc#rsaes-kem [GENERIC] Generic Hybrid | ||||
| 2010/xmlsec-ghc#ecies-kem [GENERIC] Generic Hybrid | ||||
| 2021/04/xmldsig-more#chacha20 2.6.7 EncryptionMethod | ||||
| 2021/04/xmldsig-more#chacha20poly1305 2.6.8 EncryptionMethod | ||||
| 2021/04/xmldsig-more#ecdsa-sha3-224 2.3.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#ecdsa-sha3-256 2.3.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#ecdsa-sha3-384 2.3.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#ecdsa-sha3-512 2.3.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#eddsa-ed25519ph 2.3.12 SignatureMethod | ||||
| 2021/04/xmldsig-more#eddsa-ed25519ctx 2.3.12 SignatureMethod | ||||
| 2021/04/xmldsig-more#eddsa-ed25519 2.3.12 SignatureMethod | ||||
| 2021/04/xmldsig-more#eddsa-ed448 2.3.12 SignatureMethod | ||||
| 2021/04/xmldsig-more#eddsa-ed448ph 2.3.12 SignatureMethod | ||||
| 2021/04/xmldsig-more#hkdf 2.8.1 KeyDerivation | ||||
| 2021/04/xmldsig-more#po1y305 2.2.4 SignatureMethod | ||||
| 2021/04/xmldsig-more#siphash-2-4 2.2.5 SignatureMethod | ||||
| 2021/04/xmldsig-more#x25519 2.7.1 AgreementMethod | ||||
| 2021/04/xmldsig-more#x448 2.7.1 AgreementMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-10-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-10-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-10-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-16-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-16-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-16-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-20-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-20-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-sha2-20-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-10-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-10-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-16-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-16-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-20-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake-20-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-10-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-10-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-16-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-16-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-20-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmss-shake256-20-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-2-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-2-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-2-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-4-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-4-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-20-4-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-2-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-2-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-2-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-4-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-4-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-4-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-8-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-8-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-40-8-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-3-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-3-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-3-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-6-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-6-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-6-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-12-192 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-12-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-sha2-60-12-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-20-2-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-20-2-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-20-4-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-20-4-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-2-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-2-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-4-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-4-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-8-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-40-8-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-3-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-3-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-6-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-6-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-12-256 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake-60-12-512 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-2-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-2-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-4-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-20-4-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-2-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-2-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-4-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-4-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-8-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-40-8-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-3-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-3-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-6-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-6-256 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-12-192 | ||||
| 2.2.6 SignatureMethod | ||||
| 2021/04/xmldsig-more#xmssmt-shake256-60-12-256 | ||||
| 2.2.6 SignatureMethod | ||||
| TR/1999/REC-xpath-19991116 [XPATH] Transform | ||||
| TR/1999/REC-xslt-19991116 [XSLT] Transform | ||||
| TR/2001/06/xml-exc-c14n# [XCANON] Canonicalization | ||||
| TR/2001/06/xml-exc-c14n#WithComments [XCANON] Canonicalization | ||||
| TR/2001/REC-xml-c14n-20010315 [CANON10] Canonicalization | ||||
| TR/2001/REC-xml-c14n-20010315#WithComments | ||||
| [CANON10] Canonicalization | ||||
| TR/2001/REC-xmlschema-1-20010502 [SCHEMA] Transform | ||||
| ---- -------- ------ | ||||
| URI Sec/Doc Type | ||||
| The initial "http://www.w3.org/" part of the URI is not included | ||||
| above. "{Bad}" indicates a Bad value that was accidentally included | ||||
| in [RFC6931]. Implementations SHOULD only generate the correct URI | ||||
| but SHOULD understand both the correct and erroneous URI. See also | ||||
| Appendix B. | ||||
| 5. Allocation Considerations | ||||
| W3C and IANA allocation considerations are given below. | ||||
| 5.1. W3C Allocation Considerations | ||||
| As it is easy for people to construct their own unique URIs [RFC3986] | ||||
| and, if appropriate, to obtain a URI from the W3C, additional URI | ||||
| specification under the following XMLSEC URI prefixes is prohibited | ||||
| as shown: | ||||
| +===========================================+=======================+ | ||||
| | URI | Status | | ||||
| +===========================================+=======================+ | ||||
| | <http://www.w3.org/2000/09/xmldsig#> | Frozen by W3C. | | ||||
| +-------------------------------------------+-----------------------+ | ||||
| | <http://www.w3.org/2001/04/xmldsig-more#> | Frozen with | | ||||
| | | RFC 4051. | | ||||
| +-------------------------------------------+-----------------------+ | ||||
| | <http://www.w3.org/2007/05/xmldsig-more#> | Frozen with | | ||||
| | | [RFC6931]. | | ||||
| +-------------------------------------------+-----------------------+ | ||||
| Table 2 | ||||
| The W3C has assigned <http://www.w3.org/2021/04/xmldsig-more#> for | ||||
| additional new URIs specified in this document. | ||||
| There are also occurrences in this document of | ||||
| <http://www.w3.org/2010/xmlsec-ghc#> due to the inclusion of some | ||||
| algorithms from [GENERIC] for convenience. | ||||
| An "xmldsig-more" URI does not imply any official W3C or IETF status | ||||
| for these algorithms or identifiers nor does it imply that they are | ||||
| only useful in digital signatures. Currently, dereferencing such | ||||
| URIs may or may not produce a temporary placeholder document. | ||||
| Permission to use these URI prefixes has been given by the W3C. | ||||
| 5.2. IANA Considerations | ||||
| IANA has established a registry entitled "XML Security URIs". The | ||||
| contents will be updated to correspond to Section 4.2 of this | ||||
| document with each section number in the "Sec/Doc" column augmented | ||||
| with a reference to this RFC (for example, "2.6.4" means "[this | ||||
| document], Section 2.6.4"). All references to [RFC6931] in that | ||||
| registry should be updated to [this document]. | ||||
| New entries, including new Types, will be added based on | ||||
| Specification Required [RFC8126]. Criteria for the designated expert | ||||
| for inclusion are (1) documentation sufficient for interoperability | ||||
| of the algorithm or data type and the XML syntax for its | ||||
| representation and use and (2) sufficient importance as normally | ||||
| indicated by inclusion in (2a) an approved W3C Note, Proposed | ||||
| Recommendation, or Recommendation, or (2b) an approved IETF RFC. | ||||
| Typically, the registry will reference a W3C or IETF document | ||||
| specifying such XML syntax; that document will either contain a more | ||||
| detailed description of the algorithm or data type or reference | ||||
| another document with a more detailed description. | ||||
| 6. Security Considerations | ||||
| This RFC is concerned with documenting the URIs that designate | ||||
| algorithms and some data types used in connection with XML security. | ||||
| The security considerations vary widely with the particular | ||||
| algorithms, and the general security considerations for XML security | ||||
| are outside of the scope of this document but appear in [XMLDSIG11], | ||||
| [XMLENC11], [CANON10], [CANON11], and [GENERIC]. | ||||
| [RFC6151] should be consulted before considering the use of MD5 as a | ||||
| DigestMethod or the use of HMAC-MD5 or RSA-MD5 as a SignatureMethod. | ||||
| See [RFC6194] for SHA-1 security considerations. | ||||
| Additional security considerations are given in connection with the | ||||
| description of some algorithms in the body of this document. | ||||
| Implementers should be aware that cryptographic algorithms become | ||||
| weaker with time. As new cryptoanalysis techniques are developed and | ||||
| computing performance improves, the work factor to break a particular | ||||
| cryptographic algorithm will decrease. Therefore, cryptographic | ||||
| implementations should be modular, allowing new algorithms to be | ||||
| readily inserted. That is, implementers should be prepared for the | ||||
| set of mandatory-to-implement algorithms for any particular use to | ||||
| change over time. This is sometimes referred to as "algorithm | ||||
| agility" [RFC7696]. | ||||
| 7. References | ||||
| 7.1. Normative References | ||||
| [FIPS180-4] | ||||
| National Institute of Standards and Technology (NIST), | ||||
| "Secure Hash Standard (SHS)", DOI 10.6028/NIST.FIPS.180-4, | ||||
| FIPS 180-4, August 2015, | ||||
| <https://nvlpubs.nist.gov/nistpubs/FIPS/ | ||||
| NIST.FIPS.180-4.pdf>. | ||||
| [FIPS186-4] | ||||
| National Institute of Standards and Technology (NIST), | ||||
| "Digital Signature Standard (DSS)", FIPS 186-4, | ||||
| DOI 10.6028/NIST.FIPS.186-4, July 2013, | ||||
| <https://nvlpubs.nist.gov/nistpubs/FIPS/ | ||||
| NIST.FIPS.186-4.pdf>. | ||||
| [FIPS202] National Institute of Standards and Technology (NIST), | ||||
| "SHA-3 Standard: Permutation-Based Hash and Extendable- | ||||
| Output Functions", FIPS 202, DOI 10.6028/NIST.FIPS.202, | ||||
| August 2015, <https://nvlpubs.nist.gov/nistpubs/FIPS/ | ||||
| NIST.FIPS.202.pdf>. | ||||
| [FIPS800-208] | ||||
| National Institute of Standards and Technology (NIST), | ||||
| "Recommendation for Stateful Hash-Based Signature | ||||
| Schemes", NIST 800-208, DOI 10.6028/NIST.SP.800-208, | ||||
| October 2020, | ||||
| <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/ | ||||
| NIST.SP.800-208.pdf>. | ||||
| [IEEEP1363a] | ||||
| Institute of Electrical and Electronics Engineers, "IEEE | ||||
| Standard Specifications for Public-Key Cryptography - | ||||
| Amendment 1: Additional Techniques", IEEE Std 1363a-2004, | ||||
| 2004. | ||||
| [ISO-10118-3] | ||||
| ISO, "Information technology -- Security techniques -- | ||||
| Hash-functions -- Part 3: Dedicated hash-functions", ISO/ | ||||
| IEC 10118-3:2004, 2004. | ||||
| [ISO-18033-2] | ||||
| ISO, "Information technology -- Security techniques | ||||
| --Encryption algorithms -- Part 3: Asymmetric ciphers", | ||||
| ISO/IEC 18033-2:2010, 2010. | ||||
| [RC4] Schneier, B., "Applied Cryptography: Protocols, | ||||
| Algorithms, and Source Code in C, Second Edition", John | ||||
| Wiley and Sons, New York, NY , 1996. | ||||
| [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, | ||||
| DOI 10.17487/RFC1321, April 1992, | ||||
| <https://www.rfc-editor.org/info/rfc1321>. | ||||
| [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | ||||
| Hashing for Message Authentication", RFC 2104, | ||||
| DOI 10.17487/RFC2104, February 1997, | ||||
| <https://www.rfc-editor.org/info/rfc2104>. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
| Requirement Levels", BCP 14, RFC 2119, | ||||
| DOI 10.17487/RFC2119, March 1997, | ||||
| <https://www.rfc-editor.org/info/rfc2119>. | ||||
| [RFC2315] Kaliski, B., "PKCS #7: Cryptographic Message Syntax | ||||
| Version 1.5", RFC 2315, DOI 10.17487/RFC2315, March 1998, | ||||
| <https://www.rfc-editor.org/info/rfc2315>. | ||||
| [RFC3275] Eastlake 3rd, D., Reagle, J., and D. Solo, "(Extensible | ||||
| Markup Language) XML-Signature Syntax and Processing", | ||||
| RFC 3275, DOI 10.17487/RFC3275, March 2002, | ||||
| <https://www.rfc-editor.org/info/rfc3275>. | ||||
| [RFC3394] Schaad, J. and R. Housley, "Advanced Encryption Standard | ||||
| (AES) Key Wrap Algorithm", RFC 3394, DOI 10.17487/RFC3394, | ||||
| September 2002, <https://www.rfc-editor.org/info/rfc3394>. | ||||
| [RFC3713] Matsui, M., Nakajima, J., and S. Moriai, "A Description of | ||||
| the Camellia Encryption Algorithm", RFC 3713, | ||||
| DOI 10.17487/RFC3713, April 2004, | ||||
| <https://www.rfc-editor.org/info/rfc3713>. | ||||
| [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform | ||||
| Resource Identifier (URI): Generic Syntax", STD 66, | ||||
| RFC 3986, DOI 10.17487/RFC3986, January 2005, | ||||
| <https://www.rfc-editor.org/info/rfc3986>. | ||||
| [RFC4050] Blake-Wilson, S., Karlinger, G., Kobayashi, T., and Y. | ||||
| Wang, "Using the Elliptic Curve Signature Algorithm | ||||
| (ECDSA) for XML Digital Signatures", RFC 4050, | ||||
| DOI 10.17487/RFC4050, April 2005, | ||||
| <https://www.rfc-editor.org/info/rfc4050>. | ||||
| [RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional | ||||
| Algorithms and Identifiers for RSA Cryptography for use in | ||||
| the Internet X.509 Public Key Infrastructure Certificate | ||||
| and Certificate Revocation List (CRL) Profile", RFC 4055, | ||||
| DOI 10.17487/RFC4055, June 2005, | ||||
| <https://www.rfc-editor.org/info/rfc4055>. | ||||
| [RFC4269] Lee, H.J., Lee, S.J., Yoon, J.H., Cheon, D.H., and J.I. | ||||
| Lee, "The SEED Encryption Algorithm", RFC 4269, | ||||
| DOI 10.17487/RFC4269, December 2005, | ||||
| <https://www.rfc-editor.org/info/rfc4269>. | ||||
| [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data | ||||
| Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006, | ||||
| <https://www.rfc-editor.org/info/rfc4648>. | ||||
| [RFC5869] Krawczyk, H. and P. Eronen, "HMAC-based Extract-and-Expand | ||||
| Key Derivation Function (HKDF)", RFC 5869, | ||||
| DOI 10.17487/RFC5869, May 2010, | ||||
| <https://www.rfc-editor.org/info/rfc5869>. | ||||
| [RFC6234] Eastlake 3rd, D. and T. Hansen, "US Secure Hash Algorithms | ||||
| (SHA and SHA-based HMAC and HKDF)", RFC 6234, | ||||
| DOI 10.17487/RFC6234, May 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6234>. | ||||
| [RFC7748] Langley, A., Hamburg, M., and S. Turner, "Elliptic Curves | ||||
| for Security", RFC 7748, DOI 10.17487/RFC7748, January | ||||
| 2016, <https://www.rfc-editor.org/info/rfc7748>. | ||||
| [RFC8017] Moriarty, K., Ed., Kaliski, B., Jonsson, J., and A. Rusch, | ||||
| "PKCS #1: RSA Cryptography Specifications Version 2.2", | ||||
| RFC 8017, DOI 10.17487/RFC8017, November 2016, | ||||
| <https://www.rfc-editor.org/info/rfc8017>. | ||||
| [RFC8032] Josefsson, S. and I. Liusvaara, "Edwards-Curve Digital | ||||
| Signature Algorithm (EdDSA)", RFC 8032, | ||||
| DOI 10.17487/RFC8032, January 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8032>. | ||||
| [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | ||||
| Writing an IANA Considerations Section in RFCs", BCP 26, | ||||
| RFC 8126, DOI 10.17487/RFC8126, June 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8126>. | ||||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | ||||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | ||||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | ||||
| [RFC8391] Huelsing, A., Butin, D., Gazdag, S., Rijneveld, J., and A. | ||||
| Mohaisen, "XMSS: eXtended Merkle Signature Scheme", | ||||
| RFC 8391, DOI 10.17487/RFC8391, May 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8391>. | ||||
| [RFC8439] Nir, Y. and A. Langley, "ChaCha20 and Poly1305 for IETF | ||||
| Protocols", RFC 8439, DOI 10.17487/RFC8439, June 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8439>. | ||||
| [SipHash1] Aumasson, J. and D. Bernstein, "SipHash: A Fast Short- | ||||
| Input PRF", Progress in Cryptology - INDOCRYPT 2012, | ||||
| Lecture Notes in Computer Science vol. 7668, December | ||||
| 2012, <https://doi.org/10.1007/978-3-642-34931-7_28>. | ||||
| [X9.62] American National Standards Institute, Accredited | ||||
| Standards Committee X9, "Public Key Cryptography for the | ||||
| Financial Services Industry: The Elliptic Curve Digital | ||||
| Signature Algorithm (ECDSA)", ANSI X9.62:2005, 2005. | ||||
| [XMLENC10] Reagle, J. and D. Eastlake 3rd, "XML Encryption Syntax and | ||||
| Processing", W3C Recommendation, December 2002, | ||||
| <https://www.w3.org/TR/2002/REC-xmlenc-core-20021210/>. | ||||
| [XMLENC11] Eastlake 3rd, D., Reagle, J., Hirsch, F., and T. Roessler, | ||||
| "XML Encryption Syntax and Processing Version 1.1", | ||||
| W3C Proposed Recommendation, April 2013, | ||||
| <https://www.w3.org/TR/xmlenc-core1/>. | ||||
| [XPointer] Grosso, P., Maler, E., Marsh, J., and N. Walsh, "XPointer | ||||
| Framework", W3C Recommendation, March 2003, | ||||
| <https://www.w3.org/TR/2003/REC-xptr-framework-20030325/>. | ||||
| 7.2. Informational References | ||||
| [CAMELLIA] Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., | ||||
| Nakajima, J., and T. Tokita, "Camellia: A 128-Bit Block | ||||
| Cipher Suitable for Multiple Platforms -- Design and | ||||
| Analysis", In Selected Areas in Cryptography, 7th Annual | ||||
| International Workshop, SAC 2000, August 2000. | ||||
| [CANON10] Boyer, J., "Canonical XML Version 1.0", | ||||
| W3C Recommendation, March 2001, | ||||
| <https://www.w3.org/TR/2001/REC-xml-c14n-20010315>. | ||||
| [CANON11] Boyer, J. and G. Marcy, "Canonical XML Version 1.1", | ||||
| W3C Recommendation, May 2008, | ||||
| <https://www.w3.org/TR/2008/REC-xml-c14n11-20080502/>. | ||||
| [ChaCha] Bernstein, D., "ChaCha, a variant of Salsa20", January | ||||
| 2008, <https://cr.yp.to/chacha/chacha-20080128.pdf>. | ||||
| [DECRYPT] Hughes, M., Imamura, T., and H. Maruyama, "Decryption | ||||
| Transform for XML Signature", W3C Recommendation, December | ||||
| 2002, | ||||
| <https://www.w3.org/TR/2002/REC-xmlenc-decrypt-20021210>. | ||||
| [Err3597] RFC Errata, "Erratum ID 3597", RFC 6931, | ||||
| <https://www.rfc-editor.org/errata/eid3597>. | ||||
| [Err3965] RFC Errata, "Erratum ID 3965", RFC 6931, | ||||
| <https://www.rfc-editor.org/errata/eid3965>. | ||||
| [Err4004] RFC Errata, "Erratum ID 4004", RFC 6931, | ||||
| <https://www.rfc-editor.org/errata/eid4004>. | ||||
| [GENERIC] Nyström, M. and F. Hirsch, "XML Security Generic Hybrid | ||||
| Ciphers", W3C Working Group Note, April 2013, | ||||
| <https://www.w3.org/TR/xmlsec-generic-hybrid/>. | ||||
| [KECCAK] Bertoni, G., Daeman, J., Peeters, M., and G. Van Assche, | ||||
| "The KECCAK sponge function family", January 2013, | ||||
| <https://keccak.noekeon.org>. | ||||
| [POLY1305] Bernstein, D., "The Poly1305-AES message-authentication | ||||
| code", March 2005, | ||||
| <https://cr.yp.to/mac/poly1305-20050329.pdf>. | ||||
| [RFC3075] Eastlake 3rd, D., Reagle, J., and D. Solo, "XML-Signature | ||||
| Syntax and Processing", RFC 3075, DOI 10.17487/RFC3075, | ||||
| March 2001, <https://www.rfc-editor.org/info/rfc3075>. | ||||
| [RFC3076] Boyer, J., "Canonical XML Version 1.0", RFC 3076, | ||||
| DOI 10.17487/RFC3076, March 2001, | ||||
| <https://www.rfc-editor.org/info/rfc3076>. | ||||
| [RFC3092] Eastlake 3rd, D., Manros, C., and E. Raymond, "Etymology | ||||
| of "Foo"", RFC 3092, DOI 10.17487/RFC3092, April 2001, | ||||
| <https://www.rfc-editor.org/info/rfc3092>. | ||||
| [RFC3741] Boyer, J., Eastlake 3rd, D., and J. Reagle, "Exclusive XML | ||||
| Canonicalization, Version 1.0", RFC 3741, | ||||
| DOI 10.17487/RFC3741, March 2004, | ||||
| <https://www.rfc-editor.org/info/rfc3741>. | ||||
| [RFC4010] Park, J., Lee, S., Kim, J., and J. Lee, "Use of the SEED | ||||
| Encryption Algorithm in Cryptographic Message Syntax | ||||
| (CMS)", RFC 4010, DOI 10.17487/RFC4010, February 2005, | ||||
| <https://www.rfc-editor.org/info/rfc4010>. | ||||
| [RFC6090] McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic | ||||
| Curve Cryptography Algorithms", RFC 6090, | ||||
| DOI 10.17487/RFC6090, February 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6090>. | ||||
| [RFC6151] Turner, S. and L. Chen, "Updated Security Considerations | ||||
| for the MD5 Message-Digest and the HMAC-MD5 Algorithms", | ||||
| RFC 6151, DOI 10.17487/RFC6151, March 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6151>. | ||||
| [RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security | ||||
| Considerations for the SHA-0 and SHA-1 Message-Digest | ||||
| Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6194>. | ||||
| [RFC6931] Eastlake 3rd, D., "Additional XML Security Uniform | ||||
| Resource Identifiers (URIs)", RFC 6931, | ||||
| DOI 10.17487/RFC6931, April 2013, | ||||
| <https://www.rfc-editor.org/info/rfc6931>. | ||||
| [RFC7465] Popov, A., "Prohibiting RC4 Cipher Suites", RFC 7465, | ||||
| DOI 10.17487/RFC7465, February 2015, | ||||
| <https://www.rfc-editor.org/info/rfc7465>. | ||||
| [RFC7696] Housley, R., "Guidelines for Cryptographic Algorithm | ||||
| Agility and Selecting Mandatory-to-Implement Algorithms", | ||||
| BCP 201, RFC 7696, DOI 10.17487/RFC7696, November 2015, | ||||
| <https://www.rfc-editor.org/info/rfc7696>. | ||||
| [SCHEMA] Thompson, H., Beech, D., Maloney, M., and N. Mendelsohn, | ||||
| "XML Schema Part 1: Structures Second Edition", W3C | ||||
| Recommendation, 28 October 2004, | ||||
| <https://www.w3.org/TR/2004/REC-xmlschema-1-20041028/>. - | ||||
| Biron, P. and A. Malhotra, "XML Schema Part 2: Datatypes | ||||
| Second Edition", W3C Recommendation, October 2004, | ||||
| <https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/>. | ||||
| [SipHash2] Aumasson, J. and D. Bernstein, "SipHash: A Fast Short- | ||||
| Input PRF", Department of Computer Science, University of | ||||
| Illinois at Chicago , | ||||
| <https://www.aumasson.jp/siphash/siphash.pdf>. | ||||
| [W3C] "World Wide Web Consortium", <https://www.w3.org>. | ||||
| [XCANON] Boyer, J., Eastlake 3rd, D., and J. Reagle, "Exclusive XML | ||||
| Canonicalization Version 1.0", W3C Recommendation, July | ||||
| 2002, | ||||
| <https://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/>. | ||||
| [XMLDSIG-PROP] | ||||
| Hirsch, F., "XML Signature Properties", W3C Proposed | ||||
| Recommendation, January 2013, <https://www.w3.org/TR/2013/ | ||||
| PR-xmldsig-properties-20130124/>. | ||||
| [XMLDSIG10] | ||||
| Bartel, M., Boyer, J., Fox, B., Simon, E., and B. | ||||
| LaMacchia, "XML Signature Syntax and Processing (Second | ||||
| Edition)", W3C Recommendation, June 2008, | ||||
| <https://www.w3.org/TR/2008/REC-xmldsig-core-20080610/>. | ||||
| [XMLDSIG11] | ||||
| Bartel, M., Boyer, J., Fox, B., Simon, E., and B. | ||||
| LaMacchia, "XML Signature Syntax and Processing Version | ||||
| 1.1", W3C Proposed Recommendation, April 2013, | ||||
| <https://www.w3.org/TR/xmldsig-core1/>. | ||||
| [XMLSEC] Eastlake 3rd, D. and K. Niles, "Secure XML: The New Syntax | ||||
| for Signatures and Encryption", Addison-Wesley (Pearson | ||||
| Education) ISBN 0-201-75605-6, 2003. | ||||
| [XMLSECXREF] | ||||
| Hirsch, F., Roessler, T., and K. Yiu, "XML Security | ||||
| Algorithm Cross-Reference", W3C Working Group Note, | ||||
| January 2013, <https://www.w3.org/TR/2013/NOTE-xmlsec- | ||||
| algorithms-20130124/>. | ||||
| [XMSS] IANA, "XMSS: Extended Hash-Based Signatures", | ||||
| <https://www.iana.org/assignments/xmss-extended-hash- | ||||
| based-signatures>. | ||||
| [XPATH] Boyer, J., Hughes, M., and J. Reagle, "XML-Signature XPath | ||||
| Filter 2.0", W3C Recommendation, 8 November 2002, | ||||
| <https://www.w3.org/TR/2002/REC-xmldsig- | ||||
| filter2-20021108/>. - Berglund, A., Boag, S., Chamberlin, | ||||
| D., Fernandez, M., Kay, M., Robie, J., and J. Simeon, "XML | ||||
| Path Language (XPath) 2.0 (Second Edition)", | ||||
| W3C Recommendation, December 2010, | ||||
| <https://www.w3.org/TR/2010/REC-xpath20-20101214/>. | ||||
| [XSLT] Saxonica, M., "XSL Transformations (XSLT) Version 2.0", | ||||
| W3C Recommendation, January 2007, | ||||
| <https://www.w3.org/TR/2007/REC-xslt20-20070123/>. | ||||
| Appendix A. Changes from RFC 6931 | ||||
| The following changes have been made in [RFC6931] to produce this | ||||
| document. | ||||
| * Deleted Appendix on Changes from RFC 4051, since they were already | ||||
| included in [RFC6931], and remove reference to RFC 4051 and to the | ||||
| one Errata against RFC 4051. | ||||
| * Fixed three errata as follows: [Err3597], [Err3965], and | ||||
| [Err4004]. In cases where [RFC6931] had an erroneous URI, it is | ||||
| still included in the indices and it is stated that | ||||
| implementations SHOULD only generate the correct URI but SHOULD | ||||
| understand both the correct and erroneous URI. | ||||
| * Added the following algorithms: | ||||
| +=========+==========================+ | ||||
| | Section | Algorithm(s) | | ||||
| +=========+==========================+ | ||||
| | 2.2.4 | Poly1305 | | ||||
| +---------+--------------------------+ | ||||
| | 2.2.5 | SipHash-2-4 | | ||||
| +---------+--------------------------+ | ||||
| | 2.2.6 | XMSS and XMSSMT | | ||||
| +---------+--------------------------+ | ||||
| | 2.3.6 | ECDSA with SHA3 | | ||||
| +---------+--------------------------+ | ||||
| | 2.3.12 | Edwards-Curve Signatures | | ||||
| +---------+--------------------------+ | ||||
| | 2.6.7 | ChaCha20 | | ||||
| +---------+--------------------------+ | ||||
| | 2.6.8 | ChaCha20+Poly1305 | | ||||
| +---------+--------------------------+ | ||||
| | 2.7.1 | X25519 | | ||||
| +---------+--------------------------+ | ||||
| | 2.8.1 | HKDF | | ||||
| +---------+--------------------------+ | ||||
| Table 3 | ||||
| * Listed ECIES-KEM and RSAES-KEM in Section 2.6.4 so they are easier | ||||
| to find even though the URI for them is specified in [GENERIC]. | ||||
| * Updated references for [GENERIC] and FIPS 186, added appropriate | ||||
| references. | ||||
| * Added some XML examples. | ||||
| * Fixed minor typos and added editorial changes. | ||||
| Appendix B. Bad URIs | ||||
| [RFC6931] included two bad URIs as shown below. "{Bad}" in the | ||||
| indexes (Sections 4.1 and 4.2) indicates such a bad value. | ||||
| Implementations SHOULD only generate the correct URI but SHOULD | ||||
| understand both the correct and erroneous URI. | ||||
| 2006/12/xmlc12n11# | ||||
| Appears in the indices of [RFC6931] (Sections 4.1 and 4.2 of this | ||||
| document) when it should be "2006/12/xmlc14n11#" (i.e., the "12" | ||||
| inside "xmlc12n11" should have been "14"). This is [Err3965] and | ||||
| is corrected in this document. | ||||
| 2007/05/xmldsig-more#rsa-sha224 | ||||
| Appears in the indices of [RFC6931] (Sections 4.1 and 4.2 of this | ||||
| document) when it should be "2001/04/xmldsig-more#rsa-sha224". | ||||
| This is [Err4004] and is corrected in this document. | ||||
| Acknowledgements | ||||
| The contributions of the following, listed in alphabetic order, by | ||||
| reporting errata against [RFC6931] or contributing to this document, | ||||
| are gratefully acknowledged: | ||||
| Roman Danyliw, Pim van der Eijk, Frederick Hirsch, Benjamin Kaduk, | ||||
| Alexey Melnikov, Gayle Noble, Axel Puhlmann, Juraj Somorovsky, | ||||
| Peter Yee, and Annie Yousar. | ||||
| The contributions of the following, listed in alphabetic order, to | ||||
| [RFC6931], on which this document is based, are gratefully | ||||
| acknowledged: | ||||
| Benoit Claise, Adrian Farrel, Stephen Farrell, Ernst Giessmann, | ||||
| Frederick Hirsch, Bjoern Hoehrmann, Russ Housley, Satoru Kanno, | ||||
| Charlie Kaufman, Konrad Lanz, HwanJin Lee, Barry Leiba, Peter | ||||
| Lipp, Subramanian Moonesamy, Thomas Roessler, Hanseong Ryu, Peter | ||||
| Saint-Andre, and Sean Turner. | ||||
| The following contributors to RFC 4051 are gratefully acknowledged: | ||||
| Glenn Adams, Joel Halpern, Russ Housley, Merlin Hughs, Gregor | ||||
| Karlinger, Brian LaMachia, Shiho Moriai, and Joseph Reagle. | ||||
| Author's Address | ||||
| Donald E. Eastlake 3rd | ||||
| Futurewei Technologies, Inc. | ||||
| 2386 Panoramic Circle | ||||
| Apopka, FL 32703 | ||||
| United States of America | ||||
| Phone: +1-508-333-2270 | ||||
| Email: d3e3e3@gmail.com | ||||
| End of changes. 1 change blocks. | ||||
| lines changed or deleted | lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||