- From: Edgar, Gerald <gerald.edgar@boeing.com>
- Date: Thu, 3 Feb 2011 10:50:14 -0800
- To: "public-xmlsec@w3.org" <public-xmlsec@w3.org>
Reading this RFC I found this portion on page 3:
... The adoption of
ECC has been slower than had been anticipated, perhaps due to the
lack of freely available normative documents and uncertainty over
intellectual property rights.
This note contains a description of the fundamental algorithms of ECC
over finite fields with characteristic greater than three, based
directly on original references. Its intent is to provide the
Internet community with a summary of the basic algorithms that
predate any specialized or optimized algorithms. The summary is
detailed enough for use as a normative reference. ...
Does this mean basing our references to ECC on the material in this RFC could comply with W3C patent Policy?
Gerald Edgar, Boeing
-----Original Message-----
From: public-xmlsec-request@w3.org [mailto:public-xmlsec-request@w3.org] On Behalf Of Thomas Roessler
Sent: Wednesday, February 02, 2011 11:00 PM
To: public-xmlsec@w3.org
Cc: Thomas Roessler
Subject: Fwd: RFC 6090 on Fundamental Elliptic Curve Cryptography Algorithms
FYI
--
Thomas Roessler, W3C <tlr@w3.org> (@roessler)
Begin forwarded message:
> From: rfc-editor@rfc-editor.org
> Date: 3 February 2011 05:03:26 GMT+01:00
> To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
> Cc: rfc-editor@rfc-editor.org
> Subject: RFC 6090 on Fundamental Elliptic Curve Cryptography
> Algorithms
>
>
> A new Request for Comments is now available in online RFC libraries.
>
>
> RFC 6090
>
> Title: Fundamental Elliptic Curve Cryptography Algorithms
> Author: D. McGrew, K. Igoe,
> M. Salter
> Status: Informational
> Stream: IETF
> Date: February 2011
> Mailbox: mcgrew@cisco.com,
> kmigoe@nsa.gov,
> msalter@restarea.ncsc.mil
> Pages: 34
> Characters: 75993
> Updates/Obsoletes/SeeAlso: None
>
> I-D Tag: draft-mcgrew-fundamental-ecc-04.txt
>
> URL: http://www.rfc-editor.org/rfc/rfc6090.txt
>
> This note describes the fundamental algorithms of Elliptic Curve
> Cryptography (ECC) as they were defined in some seminal references
> from 1994 and earlier. These descriptions may be useful for
> implementing the fundamental algorithms without using any of the
> specialized methods that were developed in following years. Only
> elliptic curves defined over fields of characteristic greater than
> three are in scope; these curves are those used in Suite B.
> This document is not an Internet Standards Track specification; it is
> published for informational purposes.
>
>
> INFORMATIONAL: This memo provides information for the Internet community.
> It does not specify an Internet standard of any kind. Distribution of
> this memo is unlimited.
>
> This announcement is sent to the IETF-Announce and rfc-dist lists.
> To subscribe or unsubscribe, see
> http://www.ietf.org/mailman/listinfo/ietf-announce
> http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist
>
> For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
> For downloading RFCs, see http://www.rfc-editor.org/rfc.html.
>
> Requests for special distribution should be addressed to either the
> author of the RFC in question, or to rfc-editor@rfc-editor.org.
> Unless specifically noted otherwise on the RFC itself, all RFCs are
> for unlimited distribution.
>
>
> The RFC Editor Team
> Association Management Solutions, LLC
>
>
> _______________________________________________
> IETF-Announce mailing list
> IETF-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-announce
>
Received on Thursday, 3 February 2011 19:53:28 UTC