Tweaked Section 5 of Encryption Syntax and Processing

Attached is Section 5 with changes to make the way in which
a shared key is derived from a shared secret produced by a
Key Agreement algorithm dependent on that algorithm and to
mention that Key Transport algorithms can be used for data
encryption as well as key encryption.  A few other minor
editorial fixes also made...

Donald 
============================================================
Donald E. Eastlake 3rd         Donald.Eastlake@motorola.com
Motorola, MS: M2-450                      +1 508-261-5434(w)
20 Cabot Boulevard                  dee3@torque.pothole.com
Mansfield, MA 02048 USA                  +1 508-634-2066(h)

Received on Tuesday, 18 September 2001 16:49:31 UTC