Closed
Bug 167818
Opened 23 years ago
Closed 22 years ago
RFE: Implement proposed AES key wrapping mechanism
Categories
(NSS :: Libraries, enhancement, P2)
NSS
Libraries
Tracking
(Not tracked)
RESOLVED
FIXED
3.8
People
(Reporter: thayes0993, Assigned: nelson)
Details
| Reporter | ||
Comment 1•23 years ago
|
||
NIST is developing a key wrapping method that uses AES to "wrap" other secret
data. The wrapped data can be other AES keys or any other secret value, such
as a random number seed, triple-DES key, private key or password.
A proposed definition of the AES key wrap algorithm is found at:
http://csrc.nist.gov/encryption/kms/key-wrap.pdf
In addition, an edited version of this document has been submitted as an
Internet draft to IETF:
http://www.ietf.org/internet-drafts/draft-ietf-smime-aes-keywrap-00.txt
The IETF draft gives proposed OIDs for this algorithm (one for each key size):
aes OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 1 }
id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 }
id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 }
id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 }
Comment 2•23 years ago
|
||
Assigned the bug to Nelson.
Assignee: wtc → nelsonb
Priority: -- → P2
Target Milestone: --- → 3.7
| Assignee | ||
Comment 3•23 years ago
|
||
The Internet Draft above has now become an RFC.
See ftp://ftp.rfc-editor.org/in-notes/rfc3394.txt
Status: NEW → ASSIGNED
Comment 4•23 years ago
|
||
Moved to target milestone 3.8 because the original
NSS 3.7 release has been renamed 3.8.
Target Milestone: 3.7 → 3.8
| Assignee | ||
Comment 5•22 years ago
|
||
status:
The AES Key wrap algorithm was checked into freebl. It was tested against
the test vectors in the RFC, and passes. These test cases have not yet been
added to blapitest.
Two new AES Key wrap mechanisms were added to softoken, using CKM_NETSCAPE
mechanism numbers until a real proposal for those mechanisms is written for
and accepted by the PKCS 11 working group. The code to implement these
mechanisms (on top of freebl) is insufficiently tested.
3 new OIDs and their mappings to the new mechanisms were added to the table
of known secoids.
No additional work has been done to get any higher layer code (such as
libSMIME) to use these new mechanisms. At the moment, I'm not ever sure
what interface one uses to perform a key wrap based on an OID.
This work is now pre-empted by another urgent project. I expect NSS 3.8
will ship with this implementation in essentially this state.
| Assignee | ||
Comment 6•22 years ago
|
||
Terry, what is the proposed use for this algorithm?
Is this to be used in SMIME (CMS)? or XML encryption? or ??
The mechanism is now implemented in softoken.
The secoid table now maps the OIDs to the PKCS 11 mechanisms.
In the absense of a clear definition of where this is going to be used,
I'm not sure what else to do with this.
So, I'm taking the unusual step of marking this RFE fixed, so that the
implementation of these 2 new mechanisms will show up as having been done
in NSS 3.8 in bugzilla. Perhaps another RFE should be filed requesting
additional enhancement to NSS to use these mechanisms, once that work is
well defined.
Status: ASSIGNED → RESOLVED
Closed: 22 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•