W3C home > Mailing lists > Public > www-xkms@w3.org > April 2004

Appendix C

From: tommy lindberg <lindberg_tommy@hotmail.com>
Date: Wed, 07 Apr 2004 10:25:41 +0000
To: www-xkms@w3.org
Message-ID: <BAY12-F64ke0avyybr40003091c@hotmail.com>

Appendix C of the XKMS Vesion 2 Candidate Recommendation, entitled Sample 
Protocol Exchanges, contains examples of key derivations, some of which 
appear not to be accurate.  I enclose my suggested corrections below.

Section 8.1 (Use of Limited-Use Shared Secret Data) says that "All space and 
control characters are removed." Given sections C.1.2 and C.1.3, this 
suggests that a hyphen is a control character. For
the sake of clarity I propose using "punctuation characters" instead of or 
in addition to "control characters".

Also, it might be more appropriate to call the derived quantities "Secret 
Keys" as opposed to "Private Keys".


C.1.2 Bob Registration Authentication Key
Authentication Data
3N9CJ-JK4JK-S04JF-W0934-JSR09-JWIK4
Converted Authentication Data
[33][6e][39][63][6a][6a][6b][34] [6a][6b][73][30][34][6a][66][77] 
[30][39][33][34][6a][73][72][30]
[39][6a][77][69][6b][34]
Key = HMAC-SHA1 (Converted Authentication Data, 0x1)
[92][33][7c][7c][3e][8d][3b][7a] [cf][11][59][89][36][64][56][69] 
[95][4f][8f][d7]


C.1.3 Bob Registration Private Key Encryption
Authentication Data
3N9CJ-K4JKS-04JWF-0934J-SR09JW-IK4
Converted Authentication Data
[33][6e][39][63][6a][6b][34][6a] [6b][73][30][34][6a][77][66][30] 
[39][33][34][6a][73][72][30][39] [6a][77][69][6b][34]
First Block = HMAC-SHA1 (Converted Authentication Data, 0x4)
[78][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd]
Key = First Block XOR 0x4
[7c][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd]
Second Block = HMAC-SHA1 (Converted Authentication Data, Key)
[1e][7f][e1][b0][ab][d0][f8][09] [2e][28][f3][9d][14][a8][d0][83] 
[2e][ab][ea][22]
Final Private Key
[78][f1][e7][b1][b3][fd][0c][bc] [96][04][e7][01][4f][33][78][d3] 
[0b][c8][5f][bd][1e][7f][e1][b0]


C.1.4 Bob Recovery Private Key Encryption
Authentication Data
A8YUT vuhhu c9h29 8y43u h9j3i 23
Converted Authentication Data
[61][38][79][75][74][76][75][68] [68][75][63][39][68][32][39][38] 
[79][34][33][75][68][39][6a][33] [69][32][33]
Private Key
[91][8c][67][d8][bc][16][78][86] [dd][6d][39][19][91][c4][49][6f] 
[14][e2][61][33][6c][15][06][7b]


C.2.1 Alice Pass Phrase Computation

The values are correct, but the lines
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x1)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x2

should read
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x2)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x3)


C.2.2 Bob Pass Phrase Computation

The values are correct, but the lines
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x1)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x2

should read
Pass Phrase Pass 1 HMAC-SHA1 (Converted Authentication Data, 0x2)
Pass Phrase Pass 2 = HMAC-SHA1 (Pass Phrase Pass 1 , 0x3)


Regards
Tommy

_________________________________________________________________
Protect your PC - get McAfee.com VirusScan Online 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963
Received on Wednesday, 7 April 2004 06:26:14 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 27 October 2009 08:39:21 GMT