RE: ACTION-829: Provide additional proposal text regarding xml encryption changes for pkcs1.5

On OAEP's use of SHA-1, maybe someone who participated in XML Encryption 1.0 can clarify the following for me:
- What is the OAEPparams element intended to carry? If it is a Base64-encoded DER-encoded ASN.1 value of type RSAES-OAEP-params from RFC 3447 then we should be fine since all parameters - including the MGF can be specified in it.
- OTOH, if I am correct above, then why was the MGF fixed to use SHA-1? This seems inconsistent.

-- Magnus


> -----Original Message-----
> From: public-xmlsec-request@w3.org [mailto:public-xmlsec-request@w3.org]
> On Behalf Of Cantor, Scott
> Sent: Tuesday, September 13, 2011 7:55 AM
> To: public-xmlsec@w3.org
> Subject: Re: ACTION-829: Provide additional proposal text regarding xml
> encryption changes for pkcs1.5
> 
> The WG preference was to leave the requirements more as is, so this is a
> modified proposal to clean up the text.
> 
> Remove the last paragraph in the section 5.5 intro that starts "The RSA
> v1.5 Key Transport algorithm given below..." It's misleading by implying you
> have to use 1.5 with 3DES, and the reference for V2 to AESWRAP isn't correct
> anyway. I think that text adds nothing.
> 
> Add a paragraph break leading to this text:
> 
> "Implementations must support this key transport algorithm for transporting
> 192-bit TRIPLEDES keys. Support of this algorithm for transporting other keys is
> optional. RSA-OAEP is recommended for the transport of AES keys, including
> 192-bit keys.
> 
> Replace the last paragraph in section 5.5.2 with:
> 
> "The transported key size is 192 bits for TRIPLEDES and 128, 192, or 256 bits for
> AES. Implementations MUST implement RSA-OAEP for the transport of all key
> types and sizes that are mandatory to implement for symmetric encryption. They
> MAY implement RSA-OAEP for the transport of other keys."
> 
> This question remains:
> 
> >Question: What, if anything, should be said about the DigestMethod(s)
> >to require in conjunction with OAEP. Today, one typically finds that
> >only
> >SHA-1 works and is used. That seems like a problem if we reach a future
> >state in which SHA-1 is totally broken and people want to turn it off
> >entirely rather than pick and choose places where its use isn't
> >suspect. I think even if we don't need SHA-256 here we ought to mandate
> >it for future proofing.
> 
> -- Scott
> 
> 

Received on Wednesday, 14 September 2011 06:24:31 UTC