- From: Takeshi Imamura <IMAMU@jp.ibm.com>
- Date: Thu, 24 Jan 2002 16:09:23 +0900
- To: Christian Geuer-Pollmann <geuer-pollmann@nue.et-inf.uni-siegen.de>
- Cc: xml-encryption@w3.org
Hi Christian, I think it can be incorporated in the same manner as the other algorithms. That is, you just specify the identifier of a password-based encryption algorithm to the EncryptionMethod element and include a KeyName element or something in the KeyInfo element in order to let a decryptor know a password for decryption. I'm not sure whether we should include such algorithms in the spec, though. Thanks, Takeshi IMAMURA Tokyo Research Laboratory IBM Research imamu@jp.ibm.com From: Christian Geuer-Pollmann <geuer-pollmann@nue.et-inf.uni-siegen.de> @w3.org on 2002/01/22 01:25 Sent by: xml-encryption-request@w3.org To: Joseph Reagle <reagle@w3.org> cc: xml-encryption@w3.org Subject: Password derivation Hi Joseph, in [1] section 4.2.10 there is stated: "4.2.10: Password derivation: Unclear what it means, strike from requirements." I guess I have an idea: Currently, I'm implementing an XML-Signature/Encryption-based KeyStore (for all the non-Java-Folks, a file which collects encrypted Keys, Certificates etc). The keys which are used in EncryptedData elements must be derived from user-supplied passwords. This means that a mechanism like the one defined in PKCS12 is used to derive a literal key from a used-supplied passphrase (or in Java lingo, to create a byte[] key from a char[] passphrase). Question: How could this be incorporated into XML Encryption? Example: I want to use #kw-aes256 for wrapping an RSA private key, and the AES 256 bit key should be derived from a user-supplied pass phrase. Do I simply say nothing and let the application decide where to get the AES key from? Christian [1] W3C XML-Encryption Minutes, Boston, MA, 01 March 2000 http://www.w3.org/Encryption/2001/Minutes/0103-Boston/minutes.html
Received on Thursday, 24 January 2002 02:09:32 UTC