xmlenc Call 13:00 EST 20011119

DATE AND TIME

Monday, 13:00 EST (1pm) 19-Nov-01.
Call Tobin bridge (+1-617-252-7000)

BACKGROUND

The Overview URL for this group is at:
        http://www.w3.org/Encryption/2001/
 
 
AGENDA
 
Start processing Last Call comments.

  Pending

     * [6]Should the CarriedKeyName attribute really be a child element?
     * [7]Section 3.5: The ReferenceList Element In the schema
       definition, why not use <choice> rather than <sequence>?
     * [8]Is Canonical XML really a recommended serialization algorith;
       when exactly must one use it?
     * [9]Christian's Comments
     * [10]Rivest's Comments
         1. new combined "encryption+integrity" modes of operation
         2. You have provisions for referring to some elements indirectly
            (e.g. through a URI), but you may need some >way to ensure
            that what you retrieve is what was intended (e.g. through a
            hash of the element to be retrieved). Perhaps this is
            implicitly handled already...
         3. The are of modes of encryption that won't fit your model, but
            which are very useful. For example, "secret-sharing" allows
            encryption of a document into several pieces, or shares, in
            such a way that a requisite number of them are required to
            decrypt/reconstruct the document. Just be sure you don't
            preclude somehow expansion to handle this sort of thing later
            on.
         4. I'm very uncomfortable with allowing the encryption algorithm
            to be "understood" between the sender and the recipient; you
            should force the sender to be explicit. Non-explicitness is
            the cause of very many protocol failures.

      [6] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0020.html
      [7] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0020.html
      [8] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0019.html
      [9] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0029.html
     [10] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Oct/0030.html

   (Section 5)
     * [11]Nonce and Key Wrap Algorithm: "It seems to me that with the
       key wrap algorithm specified in section 5.6.2, there is no way a
       nonce can be used, although you may still set up one in the
       corresponding CipherData element by the document."
     * [12]I want it fixed that 168 bit keys are transported in 192 bit
       form, that's all.
     * Cleanup of canonicalization and inclusion of exclusive
       canonicalization.

     [11] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Nov/0025.html
     [12] 
http://lists.w3.org/Archives/Public/xml-encryption/2001Nov/0000.html

Received on Wednesday, 14 November 2001 21:32:35 UTC