- From: Joseph Reagle <reagle@w3.org>
- Date: Wed, 14 Nov 2001 22:32:32 -0400
- To: "XML Encryption WG " <xml-encryption@w3.org>
DATE AND TIME Monday, 13:00 EST (1pm) 19-Nov-01. Call Tobin bridge (+1-617-252-7000) BACKGROUND The Overview URL for this group is at: http://www.w3.org/Encryption/2001/ AGENDA Start processing Last Call comments. Pending * [6]Should the CarriedKeyName attribute really be a child element? * [7]Section 3.5: The ReferenceList Element In the schema definition, why not use <choice> rather than <sequence>? * [8]Is Canonical XML really a recommended serialization algorith; when exactly must one use it? * [9]Christian's Comments * [10]Rivest's Comments 1. new combined "encryption+integrity" modes of operation 2. You have provisions for referring to some elements indirectly (e.g. through a URI), but you may need some >way to ensure that what you retrieve is what was intended (e.g. through a hash of the element to be retrieved). Perhaps this is implicitly handled already... 3. The are of modes of encryption that won't fit your model, but which are very useful. For example, "secret-sharing" allows encryption of a document into several pieces, or shares, in such a way that a requisite number of them are required to decrypt/reconstruct the document. Just be sure you don't preclude somehow expansion to handle this sort of thing later on. 4. I'm very uncomfortable with allowing the encryption algorithm to be "understood" between the sender and the recipient; you should force the sender to be explicit. Non-explicitness is the cause of very many protocol failures. [6] http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0020.html [7] http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0020.html [8] http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0019.html [9] http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0029.html [10] http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0030.html (Section 5) * [11]Nonce and Key Wrap Algorithm: "It seems to me that with the key wrap algorithm specified in section 5.6.2, there is no way a nonce can be used, although you may still set up one in the corresponding CipherData element by the document." * [12]I want it fixed that 168 bit keys are transported in 192 bit form, that's all. * Cleanup of canonicalization and inclusion of exclusive canonicalization. [11] http://lists.w3.org/Archives/Public/xml-encryption/2001Nov/0025.html [12] http://lists.w3.org/Archives/Public/xml-encryption/2001Nov/0000.html
Received on Wednesday, 14 November 2001 21:32:35 UTC