亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2876.txt

?? <VC++網(wǎng)絡游戲建摸與實現(xiàn)>源代碼
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                         J. PawlingRequest for Comments: 2876                     WGSI, A Getronics CompanyCategory: Informational                                        July 2000             Use of the KEA and SKIPJACK Algorithms in CMSStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document describes the conventions for using the Key Exchange   Algorithm (KEA) and SKIPJACK encryption algorithm in conjunction with   the Cryptographic Message Syntax [CMS] enveloped-data and encrypted-   data content types.1. Introduction   Throughout this document, the terms MUST, MUST NOT, SHOULD and MAY   are used in capital letters. This conforms to the definitions in   [MUSTSHOULD]. [MUSTSHOULD] defines the use of these key words to help   make the intent of standards track documents as clear as possible.   The same key words are used in this document to help implementers   achieve interoperability. Software that claims compliance with this   document MUST provide the capabilities as indicated by the MUST, MUST   NOT, SHOULD and MAY terms.  The KEA and SKIPJACK cryptographic   algorithms are described in [SJ-KEA].2. Content Encryption Process   This section applies to the construction of both the enveloped-data   and encrypted-data content types.  Compliant software MUST meet the   requirements stated in [CMS] Section 6.3, "Content-encryption   Process". The input to the encryption process MUST be padded to a   multiple of eight octets using the padding rules described in [CMS]   Section 6.3.  The content MUST be encrypted as a single string using   the SKIPJACK algorithm in 64-bit Cipher Block Chaining (CBC) mode   using randomly-generated 8-byte Initialization Vector (IV) and 80-bit   SKIPJACK content-encryption key (CEK) values.Pawling                      Informational                      [Page 1]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 20003. Content Decryption Process   This section applies to the processing of both the enveloped-data and   encrypted-data content types.  The encryptedContent MUST be decrypted   as a single string using the SKIPJACK algorithm in 64-bit CBC mode.   The 80-bit SKIPJACK CEK and the 8-byte IV MUST be used as inputs to   the SKIPJACK decryption process.  Following decryption, the padding   MUST be removed from the decrypted data.  The padding rules are   described in [CMS] Section 6.3, "Content-encryption Process".4. Enveloped-data Conventions   The CMS enveloped-data content type consists of an encrypted content   and wrapped CEKs for one or more recipients.  Compliant software MUST   meet the requirements for constructing an enveloped-data content type   stated in [CMS] Section 6, "Enveloped-data Content Type".  [CMS]   Section 6 should be studied before reading this section, because this   section does not repeat the [CMS] text.   An 8-byte IV and 80-bit CEK MUST be randomly generated for each   instance of an enveloped-data content type as inputs to the SKIPJACK   algorithm for use to encrypt the content.  The SKIPJACK CEK MUST only   be used for encrypting the content of a single instance of an   enveloped-data content type.   KEA and SKIPJACK can be used with the enveloped-data content type   using either of the following key management techniques defined in   [CMS] Section 6:   1) Key Agreement:  The SKIPJACK CEK is uniquely wrapped for each      recipient using a pairwise symmetric key-encryption key (KEK)      generated using KEA using the originator's private KEA key,      recipient's public KEA key and other values.  Section 4.2 provides      additional details.   2) "Previously Distributed" Symmetric KEK:  The SKIPJACK CEK is      wrapped using a "previously distributed" symmetric KEK (such as a      Mail List Key).  The methods by which the symmetric KEK is      generated and distributed are beyond the scope of this document.      Section 4.3 provides more details.   [CMS] Section 6 also defines the concept of the key transport key   management technique.  The key transport technique MUST NOT be used   with KEA.Pawling                      Informational                      [Page 2]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 20004.1. EnvelopedData Fields   The enveloped-data content type is Abstract Syntax Notation.1 (ASN.1)   encoded using the EnvelopedData syntax.  The fields of the   EnvelopedData syntax must be populated as follows:   The EnvelopedData version MUST be 2.   If key agreement is being used, then the EnvelopedData originatorInfo   field SHOULD be present and SHOULD include the originator's KEA X.509   v3 certificate containing the KEA public key associated with the KEA   private key used to form each pairwise symmetric KEK used to wrap   each copy of the SKIPJACK CEK.  The issuers' X.509 v3 certificates   required to form the complete certification path for the originator's   KEA X.509 v3 certificate MAY be included in the EnvelopedData   originatorInfo field. Self-signed certificates SHOULD NOT be included   in the EnvelopedData originatorInfo field.   The EnvelopedData RecipientInfo CHOICE is dependent on the key   management technique used.  Sections 4.2 and 4.3 provide more   information.   The EnvelopedData encryptedContentInfo contentEncryptionAlgorithm   algorithm field MUST be the id-fortezzaConfidentialityAlgorithm   object identifier (OID).  The EnvelopedData encryptedContentInfo   contentEncryptionAlgorithm parameters field MUST include the random   8-byte IV used as the input to the content encryption process.   The EnvelopedData unprotectedAttrs MAY be present.4.2.  Key Agreement   This section describes the conventions for using KEA and SKIPJACK   with the CMS enveloped-data content type to support key agreement.   When key agreement is used, then the RecipientInfo   keyAgreeRecipientInfo CHOICE MUST be used.   If the EnvelopedData originatorInfo field does not include the   originator's KEA X.509 v3 certificate, then each recipientInfos   KeyAgreementRecipientInfo originator field MUST include the   issuerAndSerialNumber CHOICE identifying the originator's KEA X.509   v3 certificate.  If the EnvelopedData originatorInfo field includes   the originator's KEA X.509 v3 certificate, then each recipientInfos   KeyAgreementRecipientInfo originator field MUST include either the   subjectKeyIdentifier CHOICE containing the value from the   subjectKeyIdentifier extension of the originator's KEA X.509 v3   certificate or the issuerAndSerialNumber CHOICE identifying thePawling                      Informational                      [Page 3]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 2000   originator's KEA X.509 v3 certificate.  To minimize the size of the   EnvelopedData, it is recommended that the subjectKeyIdentifier CHOICE   be used.   In some environments, the KeyAgreementRecipientInfo originator field   MAY include the originatorKey CHOICE.  The originatorKey CHOICE   SHOULD NOT be used with KEA for e-mail transactions.  Within a   controlled security architecture, a module may produce KEA key pairs   for use in conjunction with internal/local storage of encrypted data.   In this case, there may not be an X.509 certificate associated with a   (possibly) short term or one time use public KEA key.  When   originatorKey is used, then the KEA public key MUST be conveyed in   the publicKey BIT STRING as specified in [KEA] Section 3.1.2.  The   originatorKey algorithm identifier MUST be the id-   keyExchangeAlgorithm OID.  The originatorKey algorithm parameters   field MUST contain the KEA "domain identifier" (ASN.1 encoded as an   OCTET STRING) identifying the KEA algorithm parameters (i.e., p/q/g   values) associated with the KEA public key.  [KEA] Section 3.1.1   describes the method for computing the KEA domain identifier value.4.2.1.  SKIPJACK CEK Wrap Process   The SKIPJACK CEK is uniquely wrapped for each recipient of the   EnvelopedData using a pairwise KEK generated using the KEA material   of the originator and the recipient along with the originator's User   Keying Material (UKM) (i.e. Ra).  The CMS EnvelopedData syntax   provides two options for wrapping the SKIPJACK CEK for each recipient   using a KEA-generated KEK.  The "shared Originator UKM" option SHOULD   be used when constructing EnvelopedData objects.  The "unique   originator UKM" option MAY be used when constructing EnvelopedData   objects.  Compliant software MUST be capable of processing   EnvelopedData objects constructed using both options.   1) Shared Originator UKM Option:  CMS provides the ability for a   single, shared originator's UKM to be used to generate each pairwise   KEK used to wrap the SKIPJACK CEK for each recipient.  When using the   shared originator UKM option, a single RecipientInfo   KeyAgreeRecipientInfo structure MUST be constructed to contain the   wrapped SKIPJACK CEKs for all of the KEA recipients sharing the same   KEA parameters.  The KeyAgreeRecipientInfo structure includes   multiple RecipientEncryptedKey fields that each contain the SKIPJACK   CEK wrapped for a specific recipient.Pawling                      Informational                      [Page 4]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 2000   2) Unique Originator UKM Option:  CMS also provides the ability for a   unique originator UKM to be used to generate each pairwise KEK used   to wrap the SKIPJACK CEK for each recipient.  When using the unique   originator UKM option, a separate RecipientInfo KeyAgreeRecipientInfo   structure MUST be constructed for each recipient.  Each   KeyAgreeRecipientInfo structure includes a single   RecipientEncryptedKey field containing the SKIPJACK CEK wrapped for   the recipient.  This option requires more overhead than the shared   UKM option because the KeyAgreeRecipientInfo fields (i.e. version,   originator, ukm, keyEncryptionAlgorithm) must be repeated for each   recipient.   The next two paragraphs apply to both options.   The KeyAgreeRecipientInfo keyEncryptionAlgorithm algorithm field MUST   include the id-kEAKeyEncryptionAlgorithm OID.  The   KeyAgreeRecipientInfo keyEncryptionAlgorithm parameters field MUST   contain a KeyWrapAlgorithm as specified in [CMS] Appendix A, "ASN.1   Module".  The algorithm field of KeyWrapAlgorithm MUST be the id-   fortezzaWrap80 OID indicating that the FORTEZZA 80-bit wrap function   is used to wrap the 80-bit SKIPJACK CEK.  Since the FORTEZZA 80-bit   wrap function includes an integrity check value, the wrapped SKIPJACK   key is 96 bits long.  The parameters field of KeyWrapAlgorithm MUST   be absent.   If the originator is not already an explicit recipient, then a copy   of the SKIPJACK CEK SHOULD be wrapped for the originator and included   in the EnvelopedData.  This allows the originator to decrypt the   contents of the EnvelopedData.4.2.1.1. SKIPJACK CEK Wrap Process Using A Shared Originator UKM Value   This section describes how a shared originator UKM value is used as   an input to KEA to generate each pairwise KEK used to wrap the   SKIPJACK CEK for each recipient.   When using the shared originator UKM option, a single RecipientInfo   KeyAgreeRecipientInfo structure MUST be constructed to contain the   wrapped SKIPJACK CEKs for all of the KEA recipients using the same   set of KEA parameters.  If all recipients' KEA public keys were   generated using the same set of KEA parameters, then there MUST only   be a single RecipientInfo KeyAgreeRecipientInfo structure for all of   the KEA recipients.  If the recipients' KEA public keys were   generated using different sets of KEA parameters, then multiple   RecipientInfo KeyAgreeRecipientInfo fields MUST be constructed   because the originatorIdentifierOrKey will be different for each   distinct set of recipients' KEA parameters.Pawling                      Informational                      [Page 5]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 2000   A unique 128-byte originator's UKM MUST be generated for each   distinct set of recipients' KEA parameters.  The originator's UKM   MUST be placed in each KeyAgreeRecipientInfo ukm OCTET STRING.   The originator's and recipient's KEA parameters MUST be identical to   use KEA to successfully generate a pairwise KEK.  [KEA] describes how   a KEA public key is conveyed in an X.509 v3 certificate.  [KEA]   states that the KEA parameters are not included in KEA certificates;   instead, a "domain identifier" is supplied in the   subjectPublicKeyInfo algorithm parameters field of every KEA   certificate. The values of the KEA domain identifiers in the   originator's and recipient's KEA X.509 v3 certificates can be   compared to determine if the originator's and recipient's KEA   parameters are identical.   The following steps MUST be repeated for each recipient:   1) KEA MUST be used to generate the pairwise KEK based on the      originator's UKM, originator's private KEA key, recipient's 128      byte public KEA key (obtained from the recipient's KEA X.509 v3      certificate) and the recipient's 128-byte public KEA key used as      the Rb value.   2) The SKIPJACK CEK MUST be wrapped using the KEA-generated pairwise      KEK as input to the FORTEZZA 80-bit wrap function. The FORTEZZA      80-bit wrap function takes the 80-bit SKIPJACK CEK along with a      16-bit integrity checkvalue and produces a 96-bit result using the      KEA-generated pairwise KEK.   3) A new RecipientEncryptedKey SEQUENCE MUST be constructed for the      recipient.   4) The value of the subjectKeyIdentifier extension from the      recipient's KEA X.509 v3 certificate MUST be placed in the      recipient's RecipientEncryptedKey rid rKeyId subjectKeyIdentifier      field.  The KeyAgreeRecipientIdentifier CHOICE MUST be rKeyId.      The date and other fields MUST be absent from the      recipientEncryptedKey rid rKeyId SEQUENCE.   5) The wrapped SKIPJACK CEK MUST be placed in the recipient's      RecipientEncryptedKey encryptedKey OCTET STRING.   6) The recipient's RecipientEncryptedKey MUST be included in the      KeyAgreeRecipientInfo recipientEncryptedKeys SEQUENCE OF      RecipientEncryptedKey.Pawling                      Informational                      [Page 6]RFC 2876           KEA and SKIPJACK Algorithms in CMS          July 20004.2.1.2. SKIPJACK CEK Wrap Process Using Unique Originator UKM Values   This section describes how a unique originator UKM value is generated   for each recipient to be used as an input to KEA to generate that   recipient's pairwise KEK.   The following steps MUST be repeated for each recipient:   1) A new RecipientInfo KeyAgreeRecipientInfo structure MUST be      constructed.   2) A unique 128-byte originator's UKM MUST be generated.  The      originator's UKM MUST be placed in the KeyAgreeRecipientInfo ukm      OCTET STRING.   3) KEA MUST be used to generate the pairwise KEK based on the      originator's UKM, originator's private KEA key, recipient's 128-      byte public KEA key and recipient's 128-byte public KEA key used      as the Rb value.   4) The SKIPJACK CEK MUST be wrapped using the KEA-generated pairwise      KEK as input to the FORTEZZA 80-bit wrap function.  The FORTEZZA      80-bit wrap function takes the 80-bit SKIPJACK CEK along with a      16-bit integrity check value and produces a 96-bit result using

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99精品视频在线免费观看| www..com久久爱| 亚洲精品亚洲人成人网在线播放| 欧美日韩激情一区二区三区| 国产综合色视频| 一区二区三区精品视频| 精品国产乱子伦一区| 色哟哟国产精品免费观看| 久久不见久久见免费视频7| 国产精品福利电影一区二区三区四区| 欧美一区二区三区在线电影 | 99这里只有久久精品视频| 麻豆精品一区二区三区| 亚洲福利视频一区| 日韩一区在线看| 欧美国产在线观看| 日韩精品一区二区三区swag| 欧美综合亚洲图片综合区| 99在线热播精品免费| 国产成人免费在线| 久久精品国产精品亚洲红杏 | 成人精品电影在线观看| 久草在线在线精品观看| 天天色天天爱天天射综合| 自拍偷拍欧美激情| 国产精品另类一区| 国产三级欧美三级| 久久免费的精品国产v∧| 日韩欧美www| 欧美一卡二卡在线| 欧美福利一区二区| 欧美精品视频www在线观看| 精品视频在线看| 欧美午夜电影在线播放| 欧美丝袜第三区| 欧美日韩在线免费视频| 欧美羞羞免费网站| 欧美日韩在线一区二区| 欧美巨大另类极品videosbest| 在线观看日韩毛片| 欧美日韩亚洲综合| 51精品国自产在线| 日韩一区二区麻豆国产| 日韩视频在线观看一区二区| 欧美videofree性高清杂交| 日韩欧美你懂的| 久久综合成人精品亚洲另类欧美| 久久免费电影网| 国产精品嫩草影院av蜜臀| 国产精品久久久久影院| 亚洲色图都市小说| 一区二区三区四区蜜桃| 婷婷久久综合九色综合绿巨人 | 9人人澡人人爽人人精品| 91香蕉视频mp4| 在线精品视频免费观看| 欧美日韩高清在线| 日韩三级在线免费观看| 久久天天做天天爱综合色| 日本一区免费视频| 亚洲免费观看在线观看| 亚洲妇女屁股眼交7| 蜜桃av一区二区在线观看| 国产美女视频91| 95精品视频在线| 91精品国产综合久久久久久久久久 | 久久综合久久99| 中文字幕欧美日韩一区| 亚洲免费伊人电影| 日韩电影一二三区| 国产麻豆91精品| 色婷婷久久一区二区三区麻豆| 欧美亚洲日本国产| www日韩大片| 亚洲天堂免费看| 蜜桃久久久久久久| www.爱久久.com| 日韩欧美一卡二卡| 国产精品久99| 日韩电影在线看| 波多野结衣在线一区| 欧美久久久久久蜜桃| 国产亚洲欧美在线| 亚洲制服丝袜av| 国产福利一区二区三区| 欧美日韩中文另类| 国产午夜精品美女毛片视频| 亚洲一区二区av在线| 国产精品18久久久久| 欧美三级韩国三级日本一级| 国产欧美视频一区二区| 亚洲v中文字幕| 成人免费视频视频| 欧美一级xxx| 亚洲激情网站免费观看| 国产精品一区二区91| 宅男噜噜噜66一区二区66| 国产精品久久免费看| 奇米一区二区三区av| 欧美在线色视频| 国产精品久久久久久亚洲伦| 九色综合狠狠综合久久| 欧美性一级生活| 国产精品美女久久久久久久 | 久久99精品久久久| 色婷婷久久综合| 国产精品美日韩| 国内精品伊人久久久久av一坑| 欧美日韩视频在线第一区| 国产精品电影一区二区| 国产精品1区2区3区| 日韩欧美国产午夜精品| 亚洲午夜精品17c| 91色在线porny| 欧美激情中文不卡| 国产精品中文有码| 日韩欧美一级特黄在线播放| 亚洲国产视频直播| 色婷婷av一区二区三区gif| 国产精品美女久久久久aⅴ| 国产一区二区三区黄视频| 欧美一区二区三区在线观看| 亚洲香肠在线观看| 色先锋资源久久综合| 亚洲三级电影网站| 成人av网站免费观看| 国产日韩欧美精品一区| 国产一区欧美日韩| 欧美videos中文字幕| 蜜桃视频在线一区| 日韩一级高清毛片| 美女视频黄免费的久久| 欧美一级欧美三级在线观看| 视频一区欧美精品| 欧美嫩在线观看| 青青草成人在线观看| 欧美成人精品福利| 韩国精品主播一区二区在线观看| 欧美成人欧美edvon| 极品尤物av久久免费看| 精品福利在线导航| 激情小说欧美图片| 久久先锋资源网| 成人午夜激情视频| 亚洲丝袜精品丝袜在线| 色婷婷香蕉在线一区二区| 亚洲风情在线资源站| 3751色影院一区二区三区| 蜜桃视频在线观看一区| 久久久久久久久久美女| 不卡的av在线播放| 亚洲一二三区不卡| 91麻豆精品国产91久久久| 韩国av一区二区三区在线观看| 久久影院午夜论| 91原创在线视频| 午夜激情久久久| 2023国产精品| a在线欧美一区| 亚洲高清中文字幕| 精品国产一区二区亚洲人成毛片 | 国产欧美日韩在线| 99在线热播精品免费| 亚洲成人动漫一区| 日韩精品一区二区三区在线| 国产成人在线视频网站| 亚洲天天做日日做天天谢日日欢 | 日韩一区在线免费观看| 欧美私人免费视频| 黄色日韩三级电影| 日韩伦理免费电影| 欧美成人aa大片| 91一区一区三区| 另类小说综合欧美亚洲| 中文字幕永久在线不卡| 欧美日韩另类国产亚洲欧美一级| 精品一区二区综合| 亚洲日本护士毛茸茸| 91麻豆精品国产91久久久资源速度 | 国产精品99久久久久久久vr| 亚洲免费观看高清完整版在线观看 | 欧美在线观看视频一区二区| 免费高清在线一区| 国产精品久久777777| 日韩一区二区精品| 成人av动漫在线| 热久久国产精品| 一区二区三区中文在线| 精品久久久久久综合日本欧美| 色综合久久六月婷婷中文字幕| 美日韩一级片在线观看| 自拍偷拍亚洲欧美日韩| 久久香蕉国产线看观看99| 欧美日韩精品系列| 99re这里都是精品| 精品制服美女丁香| 亚洲观看高清完整版在线观看| 国产精品久久久久久久久动漫| 日韩精品专区在线影院重磅| 色综合久久久久综合99|