diff options
Diffstat (limited to 'doc/rfc/rfc5652.txt')
-rw-r--r-- | doc/rfc/rfc5652.txt | 3139 |
1 files changed, 3139 insertions, 0 deletions
diff --git a/doc/rfc/rfc5652.txt b/doc/rfc/rfc5652.txt new file mode 100644 index 0000000..71f61de --- /dev/null +++ b/doc/rfc/rfc5652.txt @@ -0,0 +1,3139 @@ + + + + + + +Network Working Group R. Housley +Request for Comments: 5652 Vigil Security +Obsoletes: 3852 September 2009 +Category: Standards Track + + + Cryptographic Message Syntax (CMS) + +Abstract + + This document describes the Cryptographic Message Syntax (CMS). This + syntax is used to digitally sign, digest, authenticate, or encrypt + arbitrary message content. + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright and License Notice + + Copyright (c) 2009 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the BSD License. + + This document may contain material from IETF Documents or IETF + Contributions published or made publicly available before November + 10, 2008. The person(s) controlling the copyright in some of this + material may not have granted the IETF Trust the right to allow + modifications of such material outside the IETF Standards Process. + Without obtaining an adequate license from the person(s) controlling + the copyright in such materials, this document may not be modified + outside the IETF Standards Process, and derivative works of it may + not be created outside the IETF Standards Process, except to format + it for publication as an RFC or to translate it into languages other + than English. + + + +Housley Standards Track [Page 1] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Evolution of the CMS .......................................4 + 1.1.1. Changes Since PKCS #7 Version 1.5 ...................4 + 1.1.2. Changes Since RFC 2630 ..............................4 + 1.1.3. Changes Since RFC 3369 ..............................5 + 1.1.4. Changes Since RFC 3852 ..............................5 + 1.2. Terminology ................................................5 + 1.3. Version Numbers ............................................6 + 2. General Overview ................................................6 + 3. General Syntax ..................................................7 + 4. Data Content Type ...............................................7 + 5. Signed-data Content Type ........................................8 + 5.1. SignedData Type ............................................9 + 5.2. EncapsulatedContentInfo Type ..............................11 + 5.2.1. Compatibility with PKCS #7 .........................12 + 5.3. SignerInfo Type ...........................................13 + 5.4. Message Digest Calculation Process ........................16 + 5.5. Signature Generation Process ..............................16 + 5.6. Signature Verification Process ............................17 + 6. Enveloped-Data Content Type ....................................17 + 6.1. EnvelopedData Type ........................................18 + 6.2. RecipientInfo Type ........................................21 + 6.2.1. KeyTransRecipientInfo Type .........................22 + 6.2.2. KeyAgreeRecipientInfo Type .........................23 + 6.2.3. KEKRecipientInfo Type ..............................25 + 6.2.4. PasswordRecipientInfo Type .........................26 + 6.2.5. OtherRecipientInfo Type ............................27 + 6.3. Content-encryption Process ................................27 + 6.4. Key-Encryption Process ....................................28 + 7. Digested-Data Content Type .....................................28 + 8. Encrypted-Data Content Type ....................................29 + 9. Authenticated-Data Content Type ................................30 + 9.1. AuthenticatedData Type ....................................31 + 9.2. MAC Generation ............................................33 + 9.3. MAC Verification ..........................................34 + 10. Useful Types ..................................................34 + 10.1. Algorithm Identifier Types ...............................35 + 10.1.1. DigestAlgorithmIdentifier .........................35 + 10.1.2. SignatureAlgorithmIdentifier ......................35 + 10.1.3. KeyEncryptionAlgorithmIdentifier ..................35 + 10.1.4. ContentEncryptionAlgorithmIdentifier ..............36 + 10.1.5. MessageAuthenticationCodeAlgorithm ................36 + 10.1.6. KeyDerivationAlgorithmIdentifier ..................36 + 10.2. Other Useful Types .......................................36 + 10.2.1. RevocationInfoChoices .............................36 + 10.2.2. CertificateChoices ................................37 + + + +Housley Standards Track [Page 2] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + 10.2.3. CertificateSet ....................................38 + 10.2.4. IssuerAndSerialNumber .............................38 + 10.2.5. CMSVersion ........................................39 + 10.2.6. UserKeyingMaterial ................................39 + 10.2.7. OtherKeyAttribute .................................39 + 11. Useful Attributes .............................................39 + 11.1. Content Type .............................................40 + 11.2. Message Digest ...........................................40 + 11.3. Signing Time .............................................41 + 11.4. Countersignature .........................................42 + 12. ASN.1 Modules .................................................43 + 12.1. CMS ASN.1 Module .........................................44 + 12.2. Version 1 Attribute Certificate ASN.1 Module .............51 + 13. References ....................................................52 + 13.1. Normative References .....................................52 + 13.2. Informative References ...................................53 + 14. Security Considerations .......................................54 + 15. Acknowledgments ...............................................56 + +1. Introduction + + This document describes the Cryptographic Message Syntax (CMS). This + syntax is used to digitally sign, digest, authenticate, or encrypt + arbitrary message content. + + The CMS describes an encapsulation syntax for data protection. It + supports digital signatures and encryption. The syntax allows + multiple encapsulations; one encapsulation envelope can be nested + inside another. Likewise, one party can digitally sign some + previously encapsulated data. It also allows arbitrary attributes, + such as signing time, to be signed along with the message content, + and it provides for other attributes such as countersignatures to be + associated with a signature. + + The CMS can support a variety of architectures for certificate-based + key management, such as the one defined by the PKIX (Public Key + Infrastructure using X.509) working group [PROFILE]. + + The CMS values are generated using ASN.1 [X.208-88], using BER- + encoding (Basic Encoding Rules) [X.209-88]. Values are typically + represented as octet strings. While many systems are capable of + transmitting arbitrary octet strings reliably, it is well known that + many electronic mail systems are not. This document does not address + mechanisms for encoding octet strings for reliable transmission in + such environments. + + + + + + +Housley Standards Track [Page 3] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +1.1. Evolution of the CMS + + The CMS is derived from PKCS #7 version 1.5, which is documented in + RFC 2315 [PKCS#7]. PKCS #7 version 1.5 was developed outside of the + IETF; it was originally published as an RSA Laboratories Technical + Note in November 1993. Since that time, the IETF has taken + responsibility for the development and maintenance of the CMS. + Today, several important IETF Standards-Track protocols make use of + the CMS. + + This section describes that changes that the IETF has made to the CMS + in each of the published versions. + +1.1.1. Changes Since PKCS #7 Version 1.5 + + RFC 2630 [CMS1] was the first version of the CMS on the IETF + Standards Track. Wherever possible, backward compatibility with PKCS + #7 version 1.5 is preserved; however, changes were made to + accommodate version 1 attribute certificate transfer and to support + algorithm-independent key management. PKCS #7 version 1.5 included + support only for key transport. RFC 2630 adds support for key + agreement and previously distributed symmetric key-encryption key + techniques. + +1.1.2. Changes Since RFC 2630 + + RFC 3369 [CMS2] obsoletes RFC 2630 [CMS1] and RFC 3211 [PWRI]. + Password-based key management is included in the CMS specification, + and an extension mechanism to support new key management schemes + without further changes to the CMS is specified. Backward + compatibility with RFC 2630 and RFC 3211 is preserved; however, + version 2 attribute certificate transfer is added, and the use of + version 1 attribute certificates is deprecated. + + Secure/Multipurpose Internet Mail Extensions (S/MIME) v2 signatures + [MSG2], which are based on PKCS #7 version 1.5, are compatible with + S/MIME v3 signatures [MSG3]and S/MIME v3.1 signatures [MSG3.1]. + However, there are some subtle compatibility issues with signatures + based on PKCS #7 version 1.5. These issues are discussed in Section + 5.2.1. These issues remain with the current version of the CMS. + + Specific cryptographic algorithms are not discussed in this document, + but they were discussed in RFC 2630. The discussion of specific + cryptographic algorithms has been moved to a separate document + [CMSALG]. Separation of the protocol and algorithm specifications + allows the IETF to update each document independently. This + specification does not require the implementation of any particular + + + + +Housley Standards Track [Page 4] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + algorithms. Rather, protocols that rely on the CMS are expected to + choose appropriate algorithms for their environment. The algorithms + may be selected from [CMSALG] or elsewhere. + +1.1.3. Changes Since RFC 3369 + + RFC 3852 [CMS3] obsoletes RFC 3369 [CMS2]. As discussed in the + previous section, RFC 3369 introduced an extension mechanism to + support new key management schemes without further changes to the + CMS. RFC 3852 introduces a similar extension mechanism to support + additional certificate formats and revocation status information + formats without further changes to the CMS. These extensions are + primarily documented in Sections 10.2.1 and 10.2.2. Backward + compatibility with earlier versions of the CMS is preserved. + + The use of version numbers is described in Section 1.3. + + Since the publication of RFC 3369, a few errata have been noted. + These errata are posted on the RFC Editor web site. These errors + have been corrected in this document. + + The text in Section 11.4 that describes the counter signature + unsigned attribute is clarified. Hopefully, the revised text is + clearer about the portion of the SignerInfo signature that is covered + by a countersignature. + +1.1.4. Changes Since RFC 3852 + + This document obsoletes RFC 3852 [CMS3]. The primary reason for the + publication of this document is to advance the CMS along the + standards maturity ladder. + + This document includes the clarifications that were originally + published in RFC 4853 [CMSMSIG] regarding the proper handling of the + SignedData protected content type when more than one digital + signature is present. + + Since the publication of RFC 3852, a few errata have been noted. + These errata are posted on the RFC Editor web site. These errors + have been corrected in this document. + +1.2. Terminology + + In this document, the key words MUST, MUST NOT, REQUIRED, SHOULD, + SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL are to be interpreted as + described in [STDWORDS]. + + + + + +Housley Standards Track [Page 5] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +1.3. Version Numbers + + Each of the major data structures includes a version number as the + first item in the data structure. The version numbers are intended + to avoid ASN.1 decode errors. Some implementations do not check the + version number prior to attempting a decode, and if a decode error + occurs, then the version number is checked as part of the error + handling routine. This is a reasonable approach; it places error + processing outside of the fast path. This approach is also forgiving + when an incorrect version number is used by the sender. + + Most of the initial version numbers were assigned in PKCS #7 version + 1.5. Others were assigned when the structure was initially created. + Whenever a structure is updated, a higher version number is assigned. + However, to ensure maximum interoperability, the higher version + number is only used when the new syntax feature is employed. That + is, the lowest version number that supports the generated syntax is + used. + +2. General Overview + + The CMS is general enough to support many different content types. + This document defines one protection content, ContentInfo. + ContentInfo encapsulates a single identified content type, and the + identified type may provide further encapsulation. This document + defines six content types: data, signed-data, enveloped-data, + digested-data, encrypted-data, and authenticated-data. Additional + content types can be defined outside this document. + + An implementation that conforms to this specification MUST implement + the protection content, ContentInfo, and MUST implement the data, + signed-data, and enveloped-data content types. The other content + types MAY be implemented. + + As a general design philosophy, each content type permits single pass + processing using indefinite-length Basic Encoding Rules (BER) + encoding. Single-pass operation is especially helpful if content is + large, stored on tapes, or is "piped" from another process. Single- + pass operation has one significant drawback: it is difficult to + perform encode operations using the Distinguished Encoding Rules + (DER) [X.509-88] encoding in a single pass since the lengths of the + various components may not be known in advance. However, signed + attributes within the signed-data content type and authenticated + attributes within the authenticated-data content type need to be + transmitted in DER form to ensure that recipients can verify a + content that contains one or more unrecognized attributes. Signed + attributes and authenticated attributes are the only data types used + in the CMS that require DER encoding. + + + +Housley Standards Track [Page 6] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +3. General Syntax + + The following object identifier identifies the content information + type: + + id-ct-contentInfo OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) ct(1) 6 } + + The CMS associates a content type identifier with a content. The + syntax MUST have ASN.1 type ContentInfo: + + ContentInfo ::= SEQUENCE { + contentType ContentType, + content [0] EXPLICIT ANY DEFINED BY contentType } + + ContentType ::= OBJECT IDENTIFIER + + The fields of ContentInfo have the following meanings: + + contentType indicates the type of the associated content. It is + an object identifier; it is a unique string of integers assigned + by an authority that defines the content type. + + content is the associated content. The type of content can be + determined uniquely by contentType. Content types for data, + signed-data, enveloped-data, digested-data, encrypted-data, and + authenticated-data are defined in this document. If additional + content types are defined in other documents, the ASN.1 type + defined SHOULD NOT be a CHOICE type. + +4. Data Content Type + + The following object identifier identifies the data content type: + + id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 1 } + + The data content type is intended to refer to arbitrary octet + strings, such as ASCII text files; the interpretation is left to the + application. Such strings need not have any internal structure + (although they could have their own ASN.1 definition or other + structure). + + S/MIME uses id-data to identify MIME-encoded content. The use of + this content identifier is specified in RFC 2311 for S/MIME v2 + [MSG2], RFC 2633 for S/MIME v3 [MSG3], and RFC 3851 for S/MIME v3.1 + [MSG3.1]. + + + + +Housley Standards Track [Page 7] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The data content type is generally encapsulated in the signed-data, + enveloped-data, digested-data, encrypted-data, or authenticated-data + content type. + +5. Signed-data Content Type + + The signed-data content type consists of a content of any type and + zero or more signature values. Any number of signers in parallel can + sign any type of content. + + The typical application of the signed-data content type represents + one signer's digital signature on content of the data content type. + Another typical application disseminates certificates and certificate + revocation lists (CRLs). + + The process by which signed-data is constructed involves the + following steps: + + 1. For each signer, a message digest, or hash value, is computed on + the content with a signer-specific message-digest algorithm. If + the signer is signing any information other than the content, the + message digest of the content and the other information are + digested with the signer's message digest algorithm (see Section + 5.4), and the result becomes the "message digest." + + 2. For each signer, the message digest is digitally signed using the + signer's private key. + + 3. For each signer, the signature value and other signer-specific + information are collected into a SignerInfo value, as defined in + Section 5.3. Certificates and CRLs for each signer, and those + not corresponding to any signer, are collected in this step. + + 4. The message digest algorithms for all the signers and the + SignerInfo values for all the signers are collected together with + the content into a SignedData value, as defined in Section 5.1. + + A recipient independently computes the message digest. This message + digest and the signer's public key are used to verify the signature + value. The signer's public key is referenced in one of two ways. It + can be referenced by an issuer distinguished name along with an + issuer-specific serial number to uniquely identify the certificate + that contains the public key. Alternatively, it can be referenced by + a subject key identifier, which accommodates both certified and + uncertified public keys. While not required, the signer's + certificate can be included in the SignedData certificates field. + + + + + +Housley Standards Track [Page 8] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + When more than one signature is present, the successful validation of + one signature associated with a given signer is usually treated as a + successful signature by that signer. However, there are some + application environments where other rules are needed. An + application that employs a rule other than one valid signature for + each signer must specify those rules. Also, where simple matching of + the signer identifier is not sufficient to determine whether the + signatures were generated by the same signer, the application + specification must describe how to determine which signatures were + generated by the same signer. Support of different communities of + recipients is the primary reason that signers choose to include more + than one signature. For example, the signed-data content type might + include signatures generated with the RSA signature algorithm and + with the Elliptic Curve Digital Signature Algorithm (ECDSA) signature + algorithm. This allows recipients to verify the signature associated + with one algorithm or the other. + + This section is divided into six parts. The first part describes the + top-level type SignedData, the second part describes + EncapsulatedContentInfo, the third part describes the per-signer + information type SignerInfo, and the fourth, fifth, and sixth parts + describe the message digest calculation, signature generation, and + signature verification processes, respectively. + +5.1. SignedData Type + + The following object identifier identifies the signed-data content + type: + + id-signedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 2 } + + The signed-data content type shall have ASN.1 type SignedData: + + SignedData ::= SEQUENCE { + version CMSVersion, + digestAlgorithms DigestAlgorithmIdentifiers, + encapContentInfo EncapsulatedContentInfo, + certificates [0] IMPLICIT CertificateSet OPTIONAL, + crls [1] IMPLICIT RevocationInfoChoices OPTIONAL, + signerInfos SignerInfos } + + DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier + + SignerInfos ::= SET OF SignerInfo + + + + + + +Housley Standards Track [Page 9] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The fields of type SignedData have the following meanings: + + version is the syntax version number. The appropriate value + depends on certificates, eContentType, and SignerInfo. The + version MUST be assigned as follows: + + IF ((certificates is present) AND + (any certificates with a type of other are present)) OR + ((crls is present) AND + (any crls with a type of other are present)) + THEN version MUST be 5 + ELSE + IF (certificates is present) AND + (any version 2 attribute certificates are present) + THEN version MUST be 4 + ELSE + IF ((certificates is present) AND + (any version 1 attribute certificates are present)) OR + (any SignerInfo structures are version 3) OR + (encapContentInfo eContentType is other than id-data) + THEN version MUST be 3 + ELSE version MUST be 1 + + digestAlgorithms is a collection of message digest algorithm + identifiers. There MAY be any number of elements in the + collection, including zero. Each element identifies the message + digest algorithm, along with any associated parameters, used by + one or more signer. The collection is intended to list the + message digest algorithms employed by all of the signers, in any + order, to facilitate one-pass signature verification. + Implementations MAY fail to validate signatures that use a digest + algorithm that is not included in this set. The message digesting + process is described in Section 5.4. + + encapContentInfo is the signed content, consisting of a content + type identifier and the content itself. Details of the + EncapsulatedContentInfo type are discussed in Section 5.2. + + certificates is a collection of certificates. It is intended that + the set of certificates be sufficient to contain certification + paths from a recognized "root" or "top-level certification + authority" to all of the signers in the signerInfos field. There + may be more certificates than necessary, and there may be + certificates sufficient to contain certification paths from two or + more independent top-level certification authorities. There may + also be fewer certificates than necessary, if it is expected that + recipients have an alternate means of obtaining necessary + + + + +Housley Standards Track [Page 10] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + certificates (e.g., from a previous set of certificates). The + signer's certificate MAY be included. The use of version 1 + attribute certificates is strongly discouraged. + + crls is a collection of revocation status information. It is + intended that the collection contain information sufficient to + determine whether the certificates in the certificates field are + valid, but such correspondence is not necessary. Certificate + revocation lists (CRLs) are the primary source of revocation + status information. There MAY be more CRLs than necessary, and + there MAY also be fewer CRLs than necessary. + + signerInfos is a collection of per-signer information. There MAY + be any number of elements in the collection, including zero. When + the collection represents more than one signature, the successful + validation of one of signature from a given signer ought to be + treated as a successful signature by that signer. However, there + are some application environments where other rules are needed. + The details of the SignerInfo type are discussed in Section 5.3. + Since each signer can employ a different digital signature + technique, and future specifications could update the syntax, all + implementations MUST gracefully handle unimplemented versions of + SignerInfo. Further, since all implementations will not support + every possible signature algorithm, all implementations MUST + gracefully handle unimplemented signature algorithms when they are + encountered. + +5.2. EncapsulatedContentInfo Type + + The content is represented in the type EncapsulatedContentInfo: + + EncapsulatedContentInfo ::= SEQUENCE { + eContentType ContentType, + eContent [0] EXPLICIT OCTET STRING OPTIONAL } + + ContentType ::= OBJECT IDENTIFIER + + The fields of type EncapsulatedContentInfo have the following + meanings: + + eContentType is an object identifier. The object identifier + uniquely specifies the content type. + + eContent is the content itself, carried as an octet string. The + eContent need not be DER encoded. + + + + + + +Housley Standards Track [Page 11] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The optional omission of the eContent within the + EncapsulatedContentInfo field makes it possible to construct + "external signatures". In the case of external signatures, the + content being signed is absent from the EncapsulatedContentInfo value + included in the signed-data content type. If the eContent value + within EncapsulatedContentInfo is absent, then the signatureValue is + calculated and the eContentType is assigned as though the eContent + value was present. + + In the degenerate case where there are no signers, the + EncapsulatedContentInfo value being "signed" is irrelevant. In this + case, the content type within the EncapsulatedContentInfo value being + "signed" MUST be id-data (as defined in Section 4), and the content + field of the EncapsulatedContentInfo value MUST be omitted. + +5.2.1. Compatibility with PKCS #7 + + This section contains a word of warning to implementers that wish to + support both the CMS and PKCS #7 [PKCS#7] SignedData content types. + Both the CMS and PKCS #7 identify the type of the encapsulated + content with an object identifier, but the ASN.1 type of the content + itself is variable in PKCS #7 SignedData content type. + + PKCS #7 defines content as: + + content [0] EXPLICIT ANY DEFINED BY contentType OPTIONAL + + The CMS defines eContent as: + + eContent [0] EXPLICIT OCTET STRING OPTIONAL + + The CMS definition is much easier to use in most applications, and it + is compatible with both S/MIME v2 and S/MIME v3. S/MIME signed + messages using the CMS and PKCS #7 are compatible because identical + signed message formats are specified in RFC 2311 for S/MIME v2 + [MSG2], RFC 2633 for S/MIME v3 [MSG3], and RFC 3851 for S/MIME v3.1 + [MSG3.1]. S/MIME v2 encapsulates the MIME content in a Data type + (that is, an OCTET STRING) carried in the SignedData contentInfo + content ANY field, and S/MIME v3 carries the MIME content in the + SignedData encapContentInfo eContent OCTET STRING. Therefore, in + S/MIME v2, S/MIME v3, and S/MIME v3.1, the MIME content is placed in + an OCTET STRING and the message digest is computed over the identical + portions of the content. That is, the message digest is computed + over the octets comprising the value of the OCTET STRING, neither the + tag nor length octets are included. + + + + + + +Housley Standards Track [Page 12] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + There are incompatibilities between the CMS and PKCS #7 SignedData + types when the encapsulated content is not formatted using the Data + type. For example, when an RFC 2634 signed receipt [ESS] is + encapsulated in the CMS SignedData type, then the Receipt SEQUENCE is + encoded in the SignedData encapContentInfo eContent OCTET STRING and + the message digest is computed using the entire Receipt SEQUENCE + encoding (including tag, length and value octets). However, if an + RFC 2634 signed receipt is encapsulated in the PKCS #7 SignedData + type, then the Receipt SEQUENCE is DER encoded [X.509-88] in the + SignedData contentInfo content ANY field (a SEQUENCE, not an OCTET + STRING). Therefore, the message digest is computed using only the + value octets of the Receipt SEQUENCE encoding. + + The following strategy can be used to achieve backward compatibility + with PKCS #7 when processing SignedData content types. If the + implementation is unable to ASN.1 decode the SignedData type using + the CMS SignedData encapContentInfo eContent OCTET STRING syntax, + then the implementation MAY attempt to decode the SignedData type + using the PKCS #7 SignedData contentInfo content ANY syntax and + compute the message digest accordingly. + + The following strategy can be used to achieve backward compatibility + with PKCS #7 when creating a SignedData content type in which the + encapsulated content is not formatted using the Data type. + Implementations MAY examine the value of the eContentType, and then + adjust the expected DER encoding of eContent based on the object + identifier value. For example, to support Microsoft Authenticode + [MSAC], the following information MAY be included: + + eContentType Object Identifier is set to { 1 3 6 1 4 1 311 2 1 4 } + + eContent contains DER-encoded Authenticode signing information + +5.3. SignerInfo Type + + Per-signer information is represented in the type SignerInfo: + + SignerInfo ::= SEQUENCE { + version CMSVersion, + sid SignerIdentifier, + digestAlgorithm DigestAlgorithmIdentifier, + signedAttrs [0] IMPLICIT SignedAttributes OPTIONAL, + signatureAlgorithm SignatureAlgorithmIdentifier, + signature SignatureValue, + unsignedAttrs [1] IMPLICIT UnsignedAttributes OPTIONAL } + + + + + + +Housley Standards Track [Page 13] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + SignerIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier } + + SignedAttributes ::= SET SIZE (1..MAX) OF Attribute + + UnsignedAttributes ::= SET SIZE (1..MAX) OF Attribute + + Attribute ::= SEQUENCE { + attrType OBJECT IDENTIFIER, + attrValues SET OF AttributeValue } + + AttributeValue ::= ANY + + SignatureValue ::= OCTET STRING + + The fields of type SignerInfo have the following meanings: + + version is the syntax version number. If the SignerIdentifier is + the CHOICE issuerAndSerialNumber, then the version MUST be 1. If + the SignerIdentifier is subjectKeyIdentifier, then the version + MUST be 3. + + sid specifies the signer's certificate (and thereby the signer's + public key). The signer's public key is needed by the recipient + to verify the signature. SignerIdentifier provides two + alternatives for specifying the signer's public key. The + issuerAndSerialNumber alternative identifies the signer's + certificate by the issuer's distinguished name and the certificate + serial number; the subjectKeyIdentifier identifies the signer's + certificate by a key identifier. When an X.509 certificate is + referenced, the key identifier matches the X.509 + subjectKeyIdentifier extension value. When other certificate + formats are referenced, the documents that specify the certificate + format and their use with the CMS must include details on matching + the key identifier to the appropriate certificate field. + Implementations MUST support the reception of the + issuerAndSerialNumber and subjectKeyIdentifier forms of + SignerIdentifier. When generating a SignerIdentifier, + implementations MAY support one of the forms (either + issuerAndSerialNumber or subjectKeyIdentifier) and always use it, + or implementations MAY arbitrarily mix the two forms. However, + subjectKeyIdentifier MUST be used to refer to a public key + contained in a non-X.509 certificate. + + digestAlgorithm identifies the message digest algorithm, and any + associated parameters, used by the signer. The message digest is + computed on either the content being signed or the content + + + +Housley Standards Track [Page 14] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + together with the signed attributes using the process described in + Section 5.4. The message digest algorithm SHOULD be among those + listed in the digestAlgorithms field of the associated SignerData. + Implementations MAY fail to validate signatures that use a digest + algorithm that is not included in the SignedData digestAlgorithms + set. + + signedAttrs is a collection of attributes that are signed. The + field is optional, but it MUST be present if the content type of + the EncapsulatedContentInfo value being signed is not id-data. + SignedAttributes MUST be DER encoded, even if the rest of the + structure is BER encoded. Useful attribute types, such as signing + time, are defined in Section 11. If the field is present, it MUST + contain, at a minimum, the following two attributes: + + A content-type attribute having as its value the content type + of the EncapsulatedContentInfo value being signed. Section + 11.1 defines the content-type attribute. However, the + content-type attribute MUST NOT be used as part of a + countersignature unsigned attribute as defined in Section 11.4. + + A message-digest attribute, having as its value the message + digest of the content. Section 11.2 defines the message-digest + attribute. + + signatureAlgorithm identifies the signature algorithm, and any + associated parameters, used by the signer to generate the digital + signature. + + signature is the result of digital signature generation, using the + message digest and the signer's private key. The details of the + signature depend on the signature algorithm employed. + + unsignedAttrs is a collection of attributes that are not signed. + The field is optional. Useful attribute types, such as + countersignatures, are defined in Section 11. + + The fields of type SignedAttribute and UnsignedAttribute have the + following meanings: + + attrType indicates the type of attribute. It is an object + identifier. + + attrValues is a set of values that comprise the attribute. The + type of each value in the set can be determined uniquely by + attrType. The attrType can impose restrictions on the number of + items in the set. + + + + +Housley Standards Track [Page 15] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +5.4. Message Digest Calculation Process + + The message digest calculation process computes a message digest on + either the content being signed or the content together with the + signed attributes. In either case, the initial input to the message + digest calculation process is the "value" of the encapsulated content + being signed. Specifically, the initial input is the + encapContentInfo eContent OCTET STRING to which the signing process + is applied. Only the octets comprising the value of the eContent + OCTET STRING are input to the message digest algorithm, not the tag + or the length octets. + + The result of the message digest calculation process depends on + whether the signedAttrs field is present. When the field is absent, + the result is just the message digest of the content as described + above. When the field is present, however, the result is the message + digest of the complete DER encoding of the SignedAttrs value + contained in the signedAttrs field. Since the SignedAttrs value, + when present, must contain the content-type and the message-digest + attributes, those values are indirectly included in the result. The + content-type attribute MUST NOT be included in a countersignature + unsigned attribute as defined in Section 11.4. A separate encoding + of the signedAttrs field is performed for message digest calculation. + The IMPLICIT [0] tag in the signedAttrs is not used for the DER + encoding, rather an EXPLICIT SET OF tag is used. That is, the DER + encoding of the EXPLICIT SET OF tag, rather than of the IMPLICIT [0] + tag, MUST be included in the message digest calculation along with + the length and content octets of the SignedAttributes value. + + When the signedAttrs field is absent, only the octets comprising the + value of the SignedData encapContentInfo eContent OCTET STRING (e.g., + the contents of a file) are input to the message digest calculation. + This has the advantage that the length of the content being signed + need not be known in advance of the signature generation process. + + Although the encapContentInfo eContent OCTET STRING tag and length + octets are not included in the message digest calculation, they are + protected by other means. The length octets are protected by the + nature of the message digest algorithm since it is computationally + infeasible to find any two distinct message contents of any length + that have the same message digest. + +5.5. Signature Generation Process + + The input to the signature generation process includes the result of + the message digest calculation process and the signer's private key. + The details of the signature generation depend on the signature + algorithm employed. The object identifier, along with any + + + +Housley Standards Track [Page 16] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + parameters, that specifies the signature algorithm employed by the + signer is carried in the signatureAlgorithm field. The signature + value generated by the signer MUST be encoded as an OCTET STRING and + carried in the signature field. + +5.6. Signature Verification Process + + The input to the signature verification process includes the result + of the message digest calculation process and the signer's public + key. The recipient MAY obtain the correct public key for the signer + by any means, but the preferred method is from a certificate obtained + from the SignedData certificates field. The selection and validation + of the signer's public key MAY be based on certification path + validation (see [PROFILE]) as well as other external context, but is + beyond the scope of this document. The details of the signature + verification depend on the signature algorithm employed. + + The recipient MUST NOT rely on any message digest values computed by + the originator. If the SignedData signerInfo includes + signedAttributes, then the content message digest MUST be calculated + as described in Section 5.4. For the signature to be valid, the + message digest value calculated by the recipient MUST be the same as + the value of the messageDigest attribute included in the + signedAttributes of the SignedData signerInfo. + + If the SignedData signerInfo includes signedAttributes, then the + content-type attribute value MUST match the SignedData + encapContentInfo eContentType value. + +6. Enveloped-data Content Type + + The enveloped-data content type consists of an encrypted content of + any type and encrypted content-encryption keys for one or more + recipients. The combination of the encrypted content and one + encrypted content-encryption key for a recipient is a "digital + envelope" for that recipient. Any type of content can be enveloped + for an arbitrary number of recipients using any of the supported key + management techniques for each recipient. + + The typical application of the enveloped-data content type will + represent one or more recipients' digital envelopes on content of the + data or signed-data content types. + + Enveloped-data is constructed by the following steps: + + 1. A content-encryption key for a particular content-encryption + algorithm is generated at random. + + + + +Housley Standards Track [Page 17] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + 2. The content-encryption key is encrypted for each recipient. The + details of this encryption depend on the key management algorithm + used, but four general techniques are supported: + + key transport: the content-encryption key is encrypted in the + recipient's public key; + + key agreement: the recipient's public key and the sender's + private key are used to generate a pairwise symmetric key, then + the content-encryption key is encrypted in the pairwise + symmetric key; + + symmetric key-encryption keys: the content-encryption key is + encrypted in a previously distributed symmetric key-encryption + key; and + + passwords: the content-encryption key is encrypted in a key- + encryption key that is derived from a password or other shared + secret value. + + 3. For each recipient, the encrypted content-encryption key and + other recipient-specific information are collected into a + RecipientInfo value, defined in Section 6.2. + + 4. The content is encrypted with the content-encryption key. + Content encryption may require that the content be padded to a + multiple of some block size; see Section 6.3. + + 5. The RecipientInfo values for all the recipients are collected + together with the encrypted content to form an EnvelopedData + value as defined in Section 6.1. + + A recipient opens the digital envelope by decrypting one of the + encrypted content-encryption keys and then decrypting the encrypted + content with the recovered content-encryption key. + + This section is divided into four parts. The first part describes + the top-level type EnvelopedData, the second part describes the per- + recipient information type RecipientInfo, and the third and fourth + parts describe the content-encryption and key-encryption processes. + +6.1. EnvelopedData Type + + The following object identifier identifies the enveloped-data content + type: + + id-envelopedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 3 } + + + +Housley Standards Track [Page 18] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The enveloped-data content type shall have ASN.1 type EnvelopedData: + + EnvelopedData ::= SEQUENCE { + version CMSVersion, + originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, + recipientInfos RecipientInfos, + encryptedContentInfo EncryptedContentInfo, + unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL } + + OriginatorInfo ::= SEQUENCE { + certs [0] IMPLICIT CertificateSet OPTIONAL, + crls [1] IMPLICIT RevocationInfoChoices OPTIONAL } + + RecipientInfos ::= SET SIZE (1..MAX) OF RecipientInfo + + EncryptedContentInfo ::= SEQUENCE { + contentType ContentType, + contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier, + encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL } + + EncryptedContent ::= OCTET STRING + + UnprotectedAttributes ::= SET SIZE (1..MAX) OF Attribute + + The fields of type EnvelopedData have the following meanings: + + version is the syntax version number. The appropriate value + depends on originatorInfo, RecipientInfo, and unprotectedAttrs. + The version MUST be assigned as follows: + + IF (originatorInfo is present) AND + ((any certificates with a type of other are present) OR + (any crls with a type of other are present)) + THEN version is 4 + ELSE + IF ((originatorInfo is present) AND + (any version 2 attribute certificates are present)) OR + (any RecipientInfo structures include pwri) OR + (any RecipientInfo structures include ori) + THEN version is 3 + ELSE + IF (originatorInfo is absent) AND + (unprotectedAttrs is absent) AND + (all RecipientInfo structures are version 0) + THEN version is 0 + ELSE version is 2 + + + + + +Housley Standards Track [Page 19] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + originatorInfo optionally provides information about the + originator. It is present only if required by the key management + algorithm. It may contain certificates and CRLs: + + certs is a collection of certificates. certs may contain + originator certificates associated with several different key + management algorithms. certs may also contain attribute + certificates associated with the originator. The certificates + contained in certs are intended to be sufficient for all + recipients to build certification paths from a recognized + "root" or "top-level certification authority". However, certs + may contain more certificates than necessary, and there may be + certificates sufficient to make certification paths from two or + more independent top-level certification authorities. + Alternatively, certs may contain fewer certificates than + necessary, if it is expected that recipients have an alternate + means of obtaining necessary certificates (e.g., from a + previous set of certificates). + + crls is a collection of CRLs. It is intended that the set + contain information sufficient to determine whether or not the + certificates in the certs field are valid, but such + correspondence is not necessary. There MAY be more CRLs than + necessary, and there MAY also be fewer CRLs than necessary. + + recipientInfos is a collection of per-recipient information. + There MUST be at least one element in the collection. + + encryptedContentInfo is the encrypted content information. + + unprotectedAttrs is a collection of attributes that are not + encrypted. The field is optional. Useful attribute types are + defined in Section 11. + + The fields of type EncryptedContentInfo have the following meanings: + + contentType indicates the type of content. + + contentEncryptionAlgorithm identifies the content-encryption + algorithm, and any associated parameters, used to encrypt the + content. The content-encryption process is described in Section + 6.3. The same content-encryption algorithm and content-encryption + key are used for all recipients. + + encryptedContent is the result of encrypting the content. The + field is optional, and if the field is not present, its intended + value must be supplied by other means. + + + + +Housley Standards Track [Page 20] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The recipientInfos field comes before the encryptedContentInfo field + so that an EnvelopedData value may be processed in a single pass. + +6.2. RecipientInfo Type + + Per-recipient information is represented in the type RecipientInfo. + RecipientInfo has a different format for each of the supported key + management techniques. Any of the key management techniques can be + used for each recipient of the same encrypted content. In all cases, + the encrypted content-encryption key is transferred to one or more + recipients. + + Since all implementations will not support every possible key + management algorithm, all implementations MUST gracefully handle + unimplemented algorithms when they are encountered. For example, if + a recipient receives a content-encryption key encrypted in their RSA + public key using RSA-OAEP (Optimal Asymmetric Encryption Padding) and + the implementation only supports RSA PKCS #1 v1.5, then a graceful + failure must be implemented. + + Implementations MUST support key transport, key agreement, and + previously distributed symmetric key-encryption keys, as represented + by ktri, kari, and kekri, respectively. Implementations MAY support + the password-based key management as represented by pwri. + Implementations MAY support any other key management technique as + represented by ori. Since each recipient can employ a different key + management technique and future specifications could define + additional key management techniques, all implementations MUST + gracefully handle unimplemented alternatives within the RecipientInfo + CHOICE, all implementations MUST gracefully handle unimplemented + versions of otherwise supported alternatives within the RecipientInfo + CHOICE, and all implementations MUST gracefully handle unimplemented + or unknown ori alternatives. + + RecipientInfo ::= CHOICE { + ktri KeyTransRecipientInfo, + kari [1] KeyAgreeRecipientInfo, + kekri [2] KEKRecipientInfo, + pwri [3] PasswordRecipientinfo, + ori [4] OtherRecipientInfo } + + EncryptedKey ::= OCTET STRING + + + + + + + + + +Housley Standards Track [Page 21] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +6.2.1. KeyTransRecipientInfo Type + + Per-recipient information using key transport is represented in the + type KeyTransRecipientInfo. Each instance of KeyTransRecipientInfo + transfers the content-encryption key to one recipient. + + KeyTransRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 0 or 2 + rid RecipientIdentifier, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + RecipientIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier } + + The fields of type KeyTransRecipientInfo have the following meanings: + + version is the syntax version number. If the RecipientIdentifier + is the CHOICE issuerAndSerialNumber, then the version MUST be 0. + If the RecipientIdentifier is subjectKeyIdentifier, then the + version MUST be 2. + + rid specifies the recipient's certificate or key that was used by + the sender to protect the content-encryption key. The content- + encryption key is encrypted with the recipient's public key. The + RecipientIdentifier provides two alternatives for specifying the + recipient's certificate, and thereby the recipient's public key. + The recipient's certificate must contain a key transport public + key. Therefore, a recipient X.509 version 3 certificate that + contains a key usage extension MUST assert the keyEncipherment + bit. The issuerAndSerialNumber alternative identifies the + recipient's certificate by the issuer's distinguished name and the + certificate serial number; the subjectKeyIdentifier identifies the + recipient's certificate by a key identifier. When an X.509 + certificate is referenced, the key identifier matches the X.509 + subjectKeyIdentifier extension value. When other certificate + formats are referenced, the documents that specify the certificate + format and their use with the CMS must include details on matching + the key identifier to the appropriate certificate field. For + recipient processing, implementations MUST support both of these + alternatives for specifying the recipient's certificate. For + sender processing, implementations MUST support at least one of + these alternatives. + + + + + + + +Housley Standards Track [Page 22] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + keyEncryptionAlgorithm identifies the key-encryption algorithm, + and any associated parameters, used to encrypt the content- + encryption key for the recipient. The key-encryption process is + described in Section 6.4. + + encryptedKey is the result of encrypting the content-encryption + key for the recipient. + +6.2.2. KeyAgreeRecipientInfo Type + + Recipient information using key agreement is represented in the type + KeyAgreeRecipientInfo. Each instance of KeyAgreeRecipientInfo will + transfer the content-encryption key to one or more recipients that + use the same key agreement algorithm and domain parameters for that + algorithm. + + KeyAgreeRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 3 + originator [0] EXPLICIT OriginatorIdentifierOrKey, + ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + recipientEncryptedKeys RecipientEncryptedKeys } + + OriginatorIdentifierOrKey ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier, + originatorKey [1] OriginatorPublicKey } + + OriginatorPublicKey ::= SEQUENCE { + algorithm AlgorithmIdentifier, + publicKey BIT STRING } + + RecipientEncryptedKeys ::= SEQUENCE OF RecipientEncryptedKey + + RecipientEncryptedKey ::= SEQUENCE { + rid KeyAgreeRecipientIdentifier, + encryptedKey EncryptedKey } + + KeyAgreeRecipientIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + rKeyId [0] IMPLICIT RecipientKeyIdentifier } + + RecipientKeyIdentifier ::= SEQUENCE { + subjectKeyIdentifier SubjectKeyIdentifier, + date GeneralizedTime OPTIONAL, + other OtherKeyAttribute OPTIONAL } + + SubjectKeyIdentifier ::= OCTET STRING + + + +Housley Standards Track [Page 23] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The fields of type KeyAgreeRecipientInfo have the following meanings: + + version is the syntax version number. It MUST always be 3. + + originator is a CHOICE with three alternatives specifying the + sender's key agreement public key. The sender uses the + corresponding private key and the recipient's public key to + generate a pairwise key. The content-encryption key is encrypted + in the pairwise key. The issuerAndSerialNumber alternative + identifies the sender's certificate, and thereby the sender's + public key, by the issuer's distinguished name and the certificate + serial number. The subjectKeyIdentifier alternative identifies + the sender's certificate, and thereby the sender's public key, by + a key identifier. When an X.509 certificate is referenced, the + key identifier matches the X.509 subjectKeyIdentifier extension + value. When other certificate formats are referenced, the + documents that specify the certificate format and their use with + the CMS must include details on matching the key identifier to the + appropriate certificate field. The originatorKey alternative + includes the algorithm identifier and sender's key agreement + public key. This alternative permits originator anonymity since + the public key is not certified. Implementations MUST support all + three alternatives for specifying the sender's public key. + + ukm is optional. With some key agreement algorithms, the sender + provides a User Keying Material (UKM) to ensure that a different + key is generated each time the same two parties generate a + pairwise key. Implementations MUST accept a KeyAgreeRecipientInfo + SEQUENCE that includes a ukm field. Implementations that do not + support key agreement algorithms that make use of UKMs MUST + gracefully handle the presence of UKMs. + + keyEncryptionAlgorithm identifies the key-encryption algorithm, + and any associated parameters, used to encrypt the content- + encryption key with the key-encryption key. The key-encryption + process is described in Section 6.4. + + recipientEncryptedKeys includes a recipient identifier and + encrypted key for one or more recipients. The + KeyAgreeRecipientIdentifier is a CHOICE with two alternatives + specifying the recipient's certificate, and thereby the + recipient's public key, that was used by the sender to generate a + pairwise key-encryption key. The recipient's certificate must + contain a key agreement public key. Therefore, a recipient X.509 + version 3 certificate that contains a key usage extension MUST + assert the keyAgreement bit. The content-encryption key is + encrypted in the pairwise key-encryption key. The + issuerAndSerialNumber alternative identifies the recipient's + + + +Housley Standards Track [Page 24] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + certificate by the issuer's distinguished name and the certificate + serial number; the RecipientKeyIdentifier is described below. The + encryptedKey is the result of encrypting the content-encryption + key in the pairwise key-encryption key generated using the key + agreement algorithm. Implementations MUST support both + alternatives for specifying the recipient's certificate. + + The fields of type RecipientKeyIdentifier have the following + meanings: + + subjectKeyIdentifier identifies the recipient's certificate by a + key identifier. When an X.509 certificate is referenced, the key + identifier matches the X.509 subjectKeyIdentifier extension value. + When other certificate formats are referenced, the documents that + specify the certificate format and their use with the CMS must + include details on matching the key identifier to the appropriate + certificate field. + + date is optional. When present, the date specifies which of the + recipient's previously distributed UKMs was used by the sender. + + other is optional. When present, this field contains additional + information used by the recipient to locate the public keying + material used by the sender. + +6.2.3. KEKRecipientInfo Type + + Recipient information using previously distributed symmetric keys is + represented in the type KEKRecipientInfo. Each instance of + KEKRecipientInfo will transfer the content-encryption key to one or + more recipients who have the previously distributed key-encryption + key. + + KEKRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 4 + kekid KEKIdentifier, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + KEKIdentifier ::= SEQUENCE { + keyIdentifier OCTET STRING, + date GeneralizedTime OPTIONAL, + other OtherKeyAttribute OPTIONAL } + + + + + + + + +Housley Standards Track [Page 25] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The fields of type KEKRecipientInfo have the following meanings: + + version is the syntax version number. It MUST always be 4. + + kekid specifies a symmetric key-encryption key that was previously + distributed to the sender and one or more recipients. + + keyEncryptionAlgorithm identifies the key-encryption algorithm, + and any associated parameters, used to encrypt the content- + encryption key with the key-encryption key. The key-encryption + process is described in Section 6.4. + + encryptedKey is the result of encrypting the content-encryption + key in the key-encryption key. + + The fields of type KEKIdentifier have the following meanings: + + keyIdentifier identifies the key-encryption key that was + previously distributed to the sender and one or more recipients. + + date is optional. When present, the date specifies a single key- + encryption key from a set that was previously distributed. + + other is optional. When present, this field contains additional + information used by the recipient to determine the key-encryption + key used by the sender. + +6.2.4. PasswordRecipientInfo Type + + Recipient information using a password or shared secret value is + represented in the type PasswordRecipientInfo. Each instance of + PasswordRecipientInfo will transfer the content-encryption key to one + or more recipients who possess the password or shared secret value. + + The PasswordRecipientInfo Type is specified in RFC 3211 [PWRI]. The + PasswordRecipientInfo structure is repeated here for completeness. + + PasswordRecipientInfo ::= SEQUENCE { + version CMSVersion, -- Always set to 0 + keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier + OPTIONAL, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + + + + + + + +Housley Standards Track [Page 26] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The fields of type PasswordRecipientInfo have the following meanings: + + version is the syntax version number. It MUST always be 0. + + keyDerivationAlgorithm identifies the key-derivation algorithm, + and any associated parameters, used to derive the key-encryption + key from the password or shared secret value. If this field is + absent, the key-encryption key is supplied from an external + source, for example a hardware crypto token such as a smart card. + + keyEncryptionAlgorithm identifies the encryption algorithm, and + any associated parameters, used to encrypt the content-encryption + key with the key-encryption key. + + encryptedKey is the result of encrypting the content-encryption + key with the key-encryption key. + +6.2.5. OtherRecipientInfo Type + + Recipient information for additional key management techniques are + represented in the type OtherRecipientInfo. The OtherRecipientInfo + type allows key management techniques beyond key transport, key + agreement, previously distributed symmetric key-encryption keys, and + password-based key management to be specified in future documents. + An object identifier uniquely identifies such key management + techniques. + + OtherRecipientInfo ::= SEQUENCE { + oriType OBJECT IDENTIFIER, + oriValue ANY DEFINED BY oriType } + + The fields of type OtherRecipientInfo have the following meanings: + + oriType identifies the key management technique. + + oriValue contains the protocol data elements needed by a recipient + using the identified key management technique. + +6.3. Content-encryption Process + + The content-encryption key for the desired content-encryption + algorithm is randomly generated. The data to be protected is padded + as described below, then the padded data is encrypted using the + content-encryption key. The encryption operation maps an arbitrary + string of octets (the data) to another string of octets (the + ciphertext) under control of a content-encryption key. The encrypted + data is included in the EnvelopedData encryptedContentInfo + encryptedContent OCTET STRING. + + + +Housley Standards Track [Page 27] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + Some content-encryption algorithms assume the input length is a + multiple of k octets, where k is greater than one. For such + algorithms, the input shall be padded at the trailing end with + k-(lth mod k) octets all having value k-(lth mod k), where lth is + the length of the input. In other words, the input is padded at + the trailing end with one of the following strings: + + 01 -- if lth mod k = k-1 + 02 02 -- if lth mod k = k-2 + . + . + . + k k ... k k -- if lth mod k = 0 + + The padding can be removed unambiguously since all input is padded, + including input values that are already a multiple of the block size, + and no padding string is a suffix of another. This padding method is + well defined if and only if k is less than 256. + +6.4. Key-encryption Process + + The input to the key-encryption process -- the value supplied to the + recipient's key-encryption algorithm -- is just the "value" of the + content-encryption key. + + Any of the aforementioned key management techniques can be used for + each recipient of the same encrypted content. + +7. Digested-data Content Type + + The digested-data content type consists of content of any type and a + message digest of the content. + + Typically, the digested-data content type is used to provide content + integrity, and the result generally becomes an input to the + enveloped-data content type. + + The following steps construct digested-data: + + 1. A message digest is computed on the content with a message-digest + algorithm. + + 2. The message-digest algorithm and the message digest are collected + together with the content into a DigestedData value. + + A recipient verifies the message digest by comparing the message + digest to an independently computed message digest. + + + + +Housley Standards Track [Page 28] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The following object identifier identifies the digested-data content + type: + + id-digestedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 5 } + + The digested-data content type shall have ASN.1 type DigestedData: + + DigestedData ::= SEQUENCE { + version CMSVersion, + digestAlgorithm DigestAlgorithmIdentifier, + encapContentInfo EncapsulatedContentInfo, + digest Digest } + + Digest ::= OCTET STRING + + The fields of type DigestedData have the following meanings: + + version is the syntax version number. If the encapsulated content + type is id-data, then the value of version MUST be 0; however, if + the encapsulated content type is other than id-data, then the + value of version MUST be 2. + + digestAlgorithm identifies the message digest algorithm, and any + associated parameters, under which the content is digested. The + message-digesting process is the same as in Section 5.4 in the + case when there are no signed attributes. + + encapContentInfo is the content that is digested, as defined in + Section 5.2. + + digest is the result of the message-digesting process. + + The ordering of the digestAlgorithm field, the encapContentInfo + field, and the digest field makes it possible to process a + DigestedData value in a single pass. + +8. Encrypted-data Content Type + + The encrypted-data content type consists of encrypted content of any + type. Unlike the enveloped-data content type, the encrypted-data + content type has neither recipients nor encrypted content-encryption + keys. Keys MUST be managed by other means. + + The typical application of the encrypted-data content type will be to + encrypt the content of the data content type for local storage, + perhaps where the encryption key is derived from a password. + + + + +Housley Standards Track [Page 29] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The following object identifier identifies the encrypted-data content + type: + + id-encryptedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 6 } + + The encrypted-data content type shall have ASN.1 type EncryptedData: + + EncryptedData ::= SEQUENCE { + version CMSVersion, + encryptedContentInfo EncryptedContentInfo, + unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL } + + The fields of type EncryptedData have the following meanings: + + version is the syntax version number. If unprotectedAttrs is + present, then the version MUST be 2. If unprotectedAttrs is + absent, then version MUST be 0. + + encryptedContentInfo is the encrypted content information, as + defined in Section 6.1. + + unprotectedAttrs is a collection of attributes that are not + encrypted. The field is optional. Useful attribute types are + defined in Section 11. + +9. Authenticated-data Content Type + + The authenticated-data content type consists of content of any type, + a message authentication code (MAC), and encrypted authentication + keys for one or more recipients. The combination of the MAC and one + encrypted authentication key for a recipient is necessary for that + recipient to verify the integrity of the content. Any type of + content can be integrity protected for an arbitrary number of + recipients. + + The process by which authenticated-data is constructed involves the + following steps: + + 1. A message-authentication key for a particular message- + authentication algorithm is generated at random. + + 2. The message-authentication key is encrypted for each recipient. + The details of this encryption depend on the key management + algorithm used. + + + + + + +Housley Standards Track [Page 30] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + 3. For each recipient, the encrypted message-authentication key and + other recipient-specific information are collected into a + RecipientInfo value, defined in Section 6.2. + + 4. Using the message-authentication key, the originator computes a + MAC value on the content. If the originator is authenticating + any information in addition to the content (see Section 9.2), a + message digest is calculated on the content, the message digest + of the content and the other information are authenticated using + the message-authentication key, and the result becomes the "MAC + value". + +9.1. AuthenticatedData Type + + The following object identifier identifies the authenticated-data + content type: + + id-ct-authData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) + ct(1) 2 } + + The authenticated-data content type shall have ASN.1 type + AuthenticatedData: + + AuthenticatedData ::= SEQUENCE { + version CMSVersion, + originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, + recipientInfos RecipientInfos, + macAlgorithm MessageAuthenticationCodeAlgorithm, + digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL, + encapContentInfo EncapsulatedContentInfo, + authAttrs [2] IMPLICIT AuthAttributes OPTIONAL, + mac MessageAuthenticationCode, + unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL } + + AuthAttributes ::= SET SIZE (1..MAX) OF Attribute + + UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute + + MessageAuthenticationCode ::= OCTET STRING + + The fields of type AuthenticatedData have the following meanings: + + version is the syntax version number. The version MUST be + assigned as follows: + + + + + + +Housley Standards Track [Page 31] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + IF (originatorInfo is present) AND + ((any certificates with a type of other are present) OR + (any crls with a type of other are present)) + THEN version is 3 + ELSE + IF ((originatorInfo is present) AND + (any version 2 attribute certificates are present)) + THEN version is 1 + ELSE version is 0 + + originatorInfo optionally provides information about the + originator. It is present only if required by the key management + algorithm. It MAY contain certificates, attribute certificates, + and CRLs, as defined in Section 6.1. + + recipientInfos is a collection of per-recipient information, as + defined in Section 6.1. There MUST be at least one element in the + collection. + + macAlgorithm is a message authentication code (MAC) algorithm + identifier. It identifies the MAC algorithm, along with any + associated parameters, used by the originator. Placement of the + macAlgorithm field facilitates one-pass processing by the + recipient. + + digestAlgorithm identifies the message digest algorithm, and any + associated parameters, used to compute a message digest on the + encapsulated content if authenticated attributes are present. The + message digesting process is described in Section 9.2. Placement + of the digestAlgorithm field facilitates one-pass processing by + the recipient. If the digestAlgorithm field is present, then the + authAttrs field MUST also be present. + + encapContentInfo is the content that is authenticated, as defined + in Section 5.2. + + authAttrs is a collection of authenticated attributes. The + authAttrs structure is optional, but it MUST be present if the + content type of the EncapsulatedContentInfo value being + authenticated is not id-data. If the authAttrs field is present, + then the digestAlgorithm field MUST also be present. The + AuthAttributes structure MUST be DER encoded, even if the rest of + the structure is BER encoded. Useful attribute types are defined + in Section 11. If the authAttrs field is present, it MUST + contain, at a minimum, the following two attributes: + + + + + + +Housley Standards Track [Page 32] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + A content-type attribute having as its value the content type + of the EncapsulatedContentInfo value being authenticated. + Section 11.1 defines the content-type attribute. + + A message-digest attribute, having as its value the message + digest of the content. Section 11.2 defines the message-digest + attribute. + + mac is the message authentication code. + + unauthAttrs is a collection of attributes that are not + authenticated. The field is optional. To date, no attributes + have been defined for use as unauthenticated attributes, but other + useful attribute types are defined in Section 11. + +9.2. MAC Generation + + The MAC calculation process computes a message authentication code + (MAC) on either the content being authenticated or a message digest + of content being authenticated together with the originator's + authenticated attributes. + + If the authAttrs field is absent, the input to the MAC calculation + process is the value of the encapContentInfo eContent OCTET STRING. + Only the octets comprising the value of the eContent OCTET STRING are + input to the MAC algorithm; the tag and the length octets are + omitted. This has the advantage that the length of the content being + authenticated need not be known in advance of the MAC generation + process. + + If the authAttrs field is present, the content-type attribute (as + described in Section 11.1) and the message-digest attribute (as + described in Section 11.2) MUST be included, and the input to the MAC + calculation process is the DER encoding of authAttrs. A separate + encoding of the authAttrs field is performed for message digest + calculation. The IMPLICIT [2] tag in the authAttrs field is not used + for the DER encoding, rather an EXPLICIT SET OF tag is used. That + is, the DER encoding of the SET OF tag, rather than of the IMPLICIT + [2] tag, is to be included in the message digest calculation along + with the length and content octets of the authAttrs value. + + The message digest calculation process computes a message digest on + the content being authenticated. The initial input to the message + digest calculation process is the "value" of the encapsulated content + being authenticated. Specifically, the input is the encapContentInfo + eContent OCTET STRING to which the authentication process is applied. + Only the octets comprising the value of the encapContentInfo eContent + OCTET STRING are input to the message digest algorithm, not the tag + + + +Housley Standards Track [Page 33] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + or the length octets. This has the advantage that the length of the + content being authenticated need not be known in advance. Although + the encapContentInfo eContent OCTET STRING tag and length octets are + not included in the message digest calculation, they are still + protected by other means. The length octets are protected by the + nature of the message digest algorithm since it is computationally + infeasible to find any two distinct contents of any length that have + the same message digest. + + The input to the MAC calculation process includes the MAC input data, + defined above, and an authentication key conveyed in a recipientInfo + structure. The details of MAC calculation depend on the MAC + algorithm employed (e.g., Hashed Message Authentication Code (HMAC)). + The object identifier, along with any parameters, that specifies the + MAC algorithm employed by the originator is carried in the + macAlgorithm field. The MAC value generated by the originator is + encoded as an OCTET STRING and carried in the mac field. + +9.3. MAC Verification + + The input to the MAC verification process includes the input data + (determined based on the presence or absence of the authAttrs field, + as defined in 9.2), and the authentication key conveyed in + recipientInfo. The details of the MAC verification process depend on + the MAC algorithm employed. + + The recipient MUST NOT rely on any MAC values or message digest + values computed by the originator. The content is authenticated as + described in Section 9.2. If the originator includes authenticated + attributes, then the content of the authAttrs is authenticated as + described in Section 9.2. For authentication to succeed, the MAC + value calculated by the recipient MUST be the same as the value of + the mac field. Similarly, for authentication to succeed when the + authAttrs field is present, the content message digest value + calculated by the recipient MUST be the same as the message digest + value included in the authAttrs message-digest attribute. + + If the AuthenticatedData includes authAttrs, then the content-type + attribute value MUST match the AuthenticatedData encapContentInfo + eContentType value. + +10. Useful Types + + This section is divided into two parts. The first part defines + algorithm identifiers, and the second part defines other useful + types. + + + + + +Housley Standards Track [Page 34] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +10.1. Algorithm Identifier Types + + All of the algorithm identifiers have the same type: + AlgorithmIdentifier. The definition of AlgorithmIdentifier is taken + from X.509 [X.509-88]. + + There are many alternatives for each algorithm type. + +10.1.1. DigestAlgorithmIdentifier + + The DigestAlgorithmIdentifier type identifies a message-digest + algorithm. Examples include SHA-1, MD2, and MD5. A message-digest + algorithm maps an octet string (the content) to another octet string + (the message digest). + + DigestAlgorithmIdentifier ::= AlgorithmIdentifier + +10.1.2. SignatureAlgorithmIdentifier + + The SignatureAlgorithmIdentifier type identifies a signature + algorithm, and it can also identify a message digest algorithm. + Examples include RSA, DSA, DSA with SHA-1, ECDSA, and ECDSA with + SHA-256. A signature algorithm supports signature generation and + verification operations. The signature generation operation uses the + message digest and the signer's private key to generate a signature + value. The signature verification operation uses the message digest + and the signer's public key to determine whether or not a signature + value is valid. Context determines which operation is intended. + + SignatureAlgorithmIdentifier ::= AlgorithmIdentifier + +10.1.3. KeyEncryptionAlgorithmIdentifier + + The KeyEncryptionAlgorithmIdentifier type identifies a key-encryption + algorithm used to encrypt a content-encryption key. The encryption + operation maps an octet string (the key) to another octet string (the + encrypted key) under control of a key-encryption key. The decryption + operation is the inverse of the encryption operation. Context + determines which operation is intended. + + The details of encryption and decryption depend on the key management + algorithm used. Key transport, key agreement, previously distributed + symmetric key-encrypting keys, and symmetric key-encrypting keys + derived from passwords are supported. + + KeyEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier + + + + + +Housley Standards Track [Page 35] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +10.1.4. ContentEncryptionAlgorithmIdentifier + + The ContentEncryptionAlgorithmIdentifier type identifies a content- + encryption algorithm. Examples include Triple-DES and RC2. A + content-encryption algorithm supports encryption and decryption + operations. The encryption operation maps an octet string (the + plaintext) to another octet string (the ciphertext) under control of + a content-encryption key. The decryption operation is the inverse of + the encryption operation. Context determines which operation is + intended. + + ContentEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier + +10.1.5. MessageAuthenticationCodeAlgorithm + + The MessageAuthenticationCodeAlgorithm type identifies a message + authentication code (MAC) algorithm. Examples include DES-MAC and + HMAC-SHA-1. A MAC algorithm supports generation and verification + operations. The MAC generation and verification operations use the + same symmetric key. Context determines which operation is intended. + + MessageAuthenticationCodeAlgorithm ::= AlgorithmIdentifier + +10.1.6. KeyDerivationAlgorithmIdentifier + + The KeyDerivationAlgorithmIdentifier type is specified in RFC 3211 + [PWRI]. The KeyDerivationAlgorithmIdentifier definition is repeated + here for completeness. + + Key derivation algorithms convert a password or shared secret value + into a key-encryption key. + + KeyDerivationAlgorithmIdentifier ::= AlgorithmIdentifier + +10.2. Other Useful Types + + This section defines types that are used other places in the + document. The types are not listed in any particular order. + +10.2.1. RevocationInfoChoices + + The RevocationInfoChoices type gives a set of revocation status + information alternatives. It is intended that the set contain + information sufficient to determine whether the certificates and + attribute certificates with which the set is associated are revoked. + However, there MAY be more revocation status information than + necessary or there MAY be less revocation status information than + necessary. X.509 Certificate revocation lists (CRLs) [X.509-97] are + + + +Housley Standards Track [Page 36] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + the primary source of revocation status information, but any other + revocation information format can be supported. The + OtherRevocationInfoFormat alternative is provided to support any + other revocation information format without further modifications to + the CMS. For example, Online Certificate Status Protocol (OCSP) + Responses [OCSP] can be supported using the + OtherRevocationInfoFormat. + + The CertificateList may contain a CRL, an Authority Revocation List + (ARL), a Delta CRL, or an Attribute Certificate Revocation List. All + of these lists share a common syntax. + + The CertificateList type gives a certificate revocation list (CRL). + CRLs are specified in X.509 [X.509-97], and they are profiled for use + in the Internet in RFC 5280 [PROFILE]. + + The definition of CertificateList is taken from X.509. + + RevocationInfoChoices ::= SET OF RevocationInfoChoice + + RevocationInfoChoice ::= CHOICE { + crl CertificateList, + other [1] IMPLICIT OtherRevocationInfoFormat } + + OtherRevocationInfoFormat ::= SEQUENCE { + otherRevInfoFormat OBJECT IDENTIFIER, + otherRevInfo ANY DEFINED BY otherRevInfoFormat } + +10.2.2. CertificateChoices + + The CertificateChoices type gives either a PKCS #6 extended + certificate [PKCS#6], an X.509 certificate, a version 1 X.509 + attribute certificate (ACv1) [X.509-97], a version 2 X.509 attribute + certificate (ACv2) [X.509-00], or any other certificate format. The + PKCS #6 extended certificate is obsolete. The PKCS #6 certificate is + included for backward compatibility, and PKCS #6 certificates SHOULD + NOT be used. The ACv1 is also obsolete. ACv1 is included for + backward compatibility, and ACv1 SHOULD NOT be used. The Internet + profile of X.509 certificates is specified in the "Internet X.509 + Public Key Infrastructure: Certificate and CRL Profile" [PROFILE]. + The Internet profile of ACv2 is specified in the "An Internet + Attribute Certificate Profile for Authorization" [ACPROFILE]. The + OtherCertificateFormat alternative is provided to support any other + certificate format without further modifications to the CMS. + + The definition of Certificate is taken from X.509. + + + + + +Housley Standards Track [Page 37] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The definitions of AttributeCertificate are taken from X.509-1997 and + X.509-2000. The definition from X.509-1997 is assigned to + AttributeCertificateV1 (see Section 12.2), and the definition from + X.509-2000 is assigned to AttributeCertificateV2. + + CertificateChoices ::= CHOICE { + certificate Certificate, + extendedCertificate [0] IMPLICIT ExtendedCertificate, -- Obsolete + v1AttrCert [1] IMPLICIT AttributeCertificateV1, -- Obsolete + v2AttrCert [2] IMPLICIT AttributeCertificateV2, + other [3] IMPLICIT OtherCertificateFormat } + + OtherCertificateFormat ::= SEQUENCE { + otherCertFormat OBJECT IDENTIFIER, + otherCert ANY DEFINED BY otherCertFormat } + +10.2.3. CertificateSet + + The CertificateSet type provides a set of certificates. It is + intended that the set be sufficient to contain certification paths + from a recognized "root" or "top-level certification authority" to + all of the sender certificates with which the set is associated. + However, there may be more certificates than necessary, or there MAY + be fewer than necessary. + + The precise meaning of a "certification path" is outside the scope of + this document. However, [PROFILE] provides a definition for X.509 + certificates. Some applications may impose upper limits on the + length of a certification path; others may enforce certain + relationships between the subjects and issuers of certificates within + a certification path. + + CertificateSet ::= SET OF CertificateChoices + +10.2.4. IssuerAndSerialNumber + + The IssuerAndSerialNumber type identifies a certificate, and thereby + an entity and a public key, by the distinguished name of the + certificate issuer and an issuer-specific certificate serial number. + + The definition of Name is taken from X.501 [X.501-88], and the + definition of CertificateSerialNumber is taken from X.509 [X.509-97]. + + IssuerAndSerialNumber ::= SEQUENCE { + issuer Name, + serialNumber CertificateSerialNumber } + + CertificateSerialNumber ::= INTEGER + + + +Housley Standards Track [Page 38] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +10.2.5. CMSVersion + + The CMSVersion type gives a syntax version number, for compatibility + with future revisions of this specification. + + CMSVersion ::= INTEGER + { v0(0), v1(1), v2(2), v3(3), v4(4), v5(5) } + +10.2.6. UserKeyingMaterial + + The UserKeyingMaterial type gives a syntax for user keying material + (UKM). Some key agreement algorithms require UKMs to ensure that a + different key is generated each time the same two parties generate a + pairwise key. The sender provides a UKM for use with a specific key + agreement algorithm. + + UserKeyingMaterial ::= OCTET STRING + +10.2.7. OtherKeyAttribute + + The OtherKeyAttribute type gives a syntax for the inclusion of other + key attributes that permit the recipient to select the key used by + the sender. The attribute object identifier must be registered along + with the syntax of the attribute itself. Use of this structure + should be avoided since it might impede interoperability. + + OtherKeyAttribute ::= SEQUENCE { + keyAttrId OBJECT IDENTIFIER, + keyAttr ANY DEFINED BY keyAttrId OPTIONAL } + +11. Useful Attributes + + This section defines attributes that may be used with signed-data, + enveloped-data, encrypted-data, or authenticated-data. The syntax of + Attribute is compatible with X.501 [X.501-88] and RFC 5280 [PROFILE]. + Some of the attributes defined in this section were originally + defined in PKCS #9 [PKCS#9]; others were originally defined in a + previous version of this specification [CMS1]. The attributes are + not listed in any particular order. + + Additional attributes are defined in many places, notably the S/MIME + Version 3.1 Message Specification [MSG3.1] and the Enhanced Security + Services for S/MIME [ESS], which also include recommendations on the + placement of these attributes. + + + + + + + +Housley Standards Track [Page 39] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +11.1. Content Type + + The content-type attribute type specifies the content type of the + ContentInfo within signed-data or authenticated-data. The content- + type attribute type MUST be present whenever signed attributes are + present in signed-data or authenticated attributes present in + authenticated-data. The content-type attribute value MUST match the + encapContentInfo eContentType value in the signed-data or + authenticated-data. + + The content-type attribute MUST be a signed attribute or an + authenticated attribute; it MUST NOT be an unsigned attribute, + unauthenticated attribute, or unprotected attribute. + + The following object identifier identifies the content-type + attribute: + + id-contentType OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 3 } + + Content-type attribute values have ASN.1 type ContentType: + + ContentType ::= OBJECT IDENTIFIER + + Even though the syntax is defined as a SET OF AttributeValue, a + content-type attribute MUST have a single attribute value; zero or + multiple instances of AttributeValue are not permitted. + + The SignedAttributes and AuthAttributes syntaxes are each defined as + a SET OF Attributes. The SignedAttributes in a signerInfo MUST NOT + include multiple instances of the content-type attribute. Similarly, + the AuthAttributes in an AuthenticatedData MUST NOT include multiple + instances of the content-type attribute. + +11.2. Message Digest + + The message-digest attribute type specifies the message digest of the + encapContentInfo eContent OCTET STRING being signed in signed-data + (see Section 5.4) or authenticated in authenticated-data (see Section + 9.2). For signed-data, the message digest is computed using the + signer's message digest algorithm. For authenticated-data, the + message digest is computed using the originator's message digest + algorithm. + + Within signed-data, the message-digest signed attribute type MUST be + present when there are any signed attributes present. Within + authenticated-data, the message-digest authenticated attribute type + MUST be present when there are any authenticated attributes present. + + + +Housley Standards Track [Page 40] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The message-digest attribute MUST be a signed attribute or an + authenticated attribute; it MUST NOT be an unsigned attribute, + unauthenticated attribute, or unprotected attribute. + + The following object identifier identifies the message-digest + attribute: + + id-messageDigest OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 4 } + + Message-digest attribute values have ASN.1 type MessageDigest: + + MessageDigest ::= OCTET STRING + + A message-digest attribute MUST have a single attribute value, even + though the syntax is defined as a SET OF AttributeValue. There MUST + NOT be zero or multiple instances of AttributeValue present. + + The SignedAttributes syntax and AuthAttributes syntax are each + defined as a SET OF Attributes. The SignedAttributes in a signerInfo + MUST include only one instance of the message-digest attribute. + Similarly, the AuthAttributes in an AuthenticatedData MUST include + only one instance of the message-digest attribute. + +11.3. Signing Time + + The signing-time attribute type specifies the time at which the + signer (purportedly) performed the signing process. The signing-time + attribute type is intended for use in signed-data. + + The signing-time attribute MUST be a signed attribute or an + authenticated attribute; it MUST NOT be an unsigned attribute, + unauthenticated attribute, or unprotected attribute. + + The following object identifier identifies the signing-time + attribute: + + id-signingTime OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 5 } + + Signing-time attribute values have ASN.1 type SigningTime: + + SigningTime ::= Time + + Time ::= CHOICE { + utcTime UTCTime, + generalizedTime GeneralizedTime } + + + + +Housley Standards Track [Page 41] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + Note: The definition of Time matches the one specified in the 1997 + version of X.509 [X.509-97]. + + Dates between 1 January 1950 and 31 December 2049 (inclusive) MUST be + encoded as UTCTime. Any dates with year values before 1950 or after + 2049 MUST be encoded as GeneralizedTime. + + UTCTime values MUST be expressed in Coordinated Universal Time + (formerly known as Greenwich Mean Time (GMT) and Zulu clock time) and + MUST include seconds (i.e., times are YYMMDDHHMMSSZ), even where the + number of seconds is zero. Midnight MUST be represented as + "YYMMDD000000Z". Century information is implicit, and the century + MUST be determined as follows: + + Where YY is greater than or equal to 50, the year MUST be + interpreted as 19YY; and + + Where YY is less than 50, the year MUST be interpreted as 20YY. + + GeneralizedTime values MUST be expressed in Coordinated Universal + Time and MUST include seconds (i.e., times are YYYYMMDDHHMMSSZ), even + where the number of seconds is zero. GeneralizedTime values MUST NOT + include fractional seconds. + + A signing-time attribute MUST have a single attribute value, even + though the syntax is defined as a SET OF AttributeValue. There MUST + NOT be zero or multiple instances of AttributeValue present. + + The SignedAttributes syntax and the AuthAttributes syntax are each + defined as a SET OF Attributes. The SignedAttributes in a signerInfo + MUST NOT include multiple instances of the signing-time attribute. + Similarly, the AuthAttributes in an AuthenticatedData MUST NOT + include multiple instances of the signing-time attribute. + + No requirement is imposed concerning the correctness of the signing + time, and acceptance of a purported signing time is a matter of a + recipient's discretion. It is expected, however, that some signers, + such as time-stamp servers, will be trusted implicitly. + +11.4. Countersignature + + The countersignature attribute type specifies one or more signatures + on the contents octets of the signature OCTET STRING in a SignerInfo + value of the signed-data. That is, the message digest is computed + over the octets comprising the value of the OCTET STRING, neither the + tag nor length octets are included. Thus, the countersignature + attribute type countersigns (signs in serial) another signature. + + + + +Housley Standards Track [Page 42] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The countersignature attribute MUST be an unsigned attribute; it MUST + NOT be a signed attribute, an authenticated attribute, an + unauthenticated attribute, or an unprotected attribute. + + The following object identifier identifies the countersignature + attribute: + + id-countersignature OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 6 } + + Countersignature attribute values have ASN.1 type Countersignature: + + Countersignature ::= SignerInfo + + Countersignature values have the same meaning as SignerInfo values + for ordinary signatures, except that: + + 1. The signedAttributes field MUST NOT contain a content-type + attribute; there is no content type for countersignatures. + + 2. The signedAttributes field MUST contain a message-digest + attribute if it contains any other attributes. + + 3. The input to the message-digesting process is the contents octets + of the DER encoding of the signatureValue field of the SignerInfo + value with which the attribute is associated. + + A countersignature attribute can have multiple attribute values. The + syntax is defined as a SET OF AttributeValue, and there MUST be one + or more instances of AttributeValue present. + + The UnsignedAttributes syntax is defined as a SET OF Attributes. The + UnsignedAttributes in a signerInfo may include multiple instances of + the countersignature attribute. + + A countersignature, since it has type SignerInfo, can itself contain + a countersignature attribute. Thus, it is possible to construct an + arbitrarily long series of countersignatures. + +12. ASN.1 Modules + + Section 12.1 contains the ASN.1 module for the CMS, and Section 12.2 + contains the ASN.1 module for the Version 1 Attribute Certificate. + + + + + + + + +Housley Standards Track [Page 43] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +12.1. CMS ASN.1 Module + + CryptographicMessageSyntax2004 + { iso(1) member-body(2) us(840) rsadsi(113549) + pkcs(1) pkcs-9(9) smime(16) modules(0) cms-2004(24) } + + DEFINITIONS IMPLICIT TAGS ::= + BEGIN + + -- EXPORTS All + -- The types and values defined in this module are exported for use + -- in the other ASN.1 modules. Other applications may use them for + -- their own purposes. + + IMPORTS + + -- Imports from RFC 5280 [PROFILE], Appendix A.1 + AlgorithmIdentifier, Certificate, CertificateList, + CertificateSerialNumber, Name + FROM PKIX1Explicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + mod(0) pkix1-explicit(18) } + + -- Imports from RFC 3281 [ACPROFILE], Appendix B + AttributeCertificate + FROM PKIXAttributeCertificate + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + mod(0) attribute-cert(12) } + + -- Imports from Appendix B of this document + AttributeCertificateV1 + FROM AttributeCertificateVersion1 + { iso(1) member-body(2) us(840) rsadsi(113549) + pkcs(1) pkcs-9(9) smime(16) modules(0) + v1AttrCert(15) } ; + + -- Cryptographic Message Syntax + + ContentInfo ::= SEQUENCE { + contentType ContentType, + content [0] EXPLICIT ANY DEFINED BY contentType } + + ContentType ::= OBJECT IDENTIFIER + + + + + + +Housley Standards Track [Page 44] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + SignedData ::= SEQUENCE { + version CMSVersion, + digestAlgorithms DigestAlgorithmIdentifiers, + encapContentInfo EncapsulatedContentInfo, + certificates [0] IMPLICIT CertificateSet OPTIONAL, + crls [1] IMPLICIT RevocationInfoChoices OPTIONAL, + signerInfos SignerInfos } + + DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier + + SignerInfos ::= SET OF SignerInfo + + EncapsulatedContentInfo ::= SEQUENCE { + eContentType ContentType, + eContent [0] EXPLICIT OCTET STRING OPTIONAL } + + SignerInfo ::= SEQUENCE { + version CMSVersion, + sid SignerIdentifier, + digestAlgorithm DigestAlgorithmIdentifier, + signedAttrs [0] IMPLICIT SignedAttributes OPTIONAL, + signatureAlgorithm SignatureAlgorithmIdentifier, + signature SignatureValue, + unsignedAttrs [1] IMPLICIT UnsignedAttributes OPTIONAL } + + SignerIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier } + + SignedAttributes ::= SET SIZE (1..MAX) OF Attribute + + UnsignedAttributes ::= SET SIZE (1..MAX) OF Attribute + + Attribute ::= SEQUENCE { + attrType OBJECT IDENTIFIER, + attrValues SET OF AttributeValue } + + AttributeValue ::= ANY + + SignatureValue ::= OCTET STRING + + EnvelopedData ::= SEQUENCE { + version CMSVersion, + originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, + recipientInfos RecipientInfos, + encryptedContentInfo EncryptedContentInfo, + unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL } + + + + +Housley Standards Track [Page 45] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + OriginatorInfo ::= SEQUENCE { + certs [0] IMPLICIT CertificateSet OPTIONAL, + crls [1] IMPLICIT RevocationInfoChoices OPTIONAL } + + RecipientInfos ::= SET SIZE (1..MAX) OF RecipientInfo + + EncryptedContentInfo ::= SEQUENCE { + contentType ContentType, + contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier, + encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL } + + EncryptedContent ::= OCTET STRING + + UnprotectedAttributes ::= SET SIZE (1..MAX) OF Attribute + + RecipientInfo ::= CHOICE { + ktri KeyTransRecipientInfo, + kari [1] KeyAgreeRecipientInfo, + kekri [2] KEKRecipientInfo, + pwri [3] PasswordRecipientInfo, + ori [4] OtherRecipientInfo } + + EncryptedKey ::= OCTET STRING + + KeyTransRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 0 or 2 + rid RecipientIdentifier, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + RecipientIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier } + + KeyAgreeRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 3 + originator [0] EXPLICIT OriginatorIdentifierOrKey, + ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + recipientEncryptedKeys RecipientEncryptedKeys } + + OriginatorIdentifierOrKey ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + subjectKeyIdentifier [0] SubjectKeyIdentifier, + originatorKey [1] OriginatorPublicKey } + + + + + + +Housley Standards Track [Page 46] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + OriginatorPublicKey ::= SEQUENCE { + algorithm AlgorithmIdentifier, + publicKey BIT STRING } + + RecipientEncryptedKeys ::= SEQUENCE OF RecipientEncryptedKey + + RecipientEncryptedKey ::= SEQUENCE { + rid KeyAgreeRecipientIdentifier, + encryptedKey EncryptedKey } + + KeyAgreeRecipientIdentifier ::= CHOICE { + issuerAndSerialNumber IssuerAndSerialNumber, + rKeyId [0] IMPLICIT RecipientKeyIdentifier } + + RecipientKeyIdentifier ::= SEQUENCE { + subjectKeyIdentifier SubjectKeyIdentifier, + date GeneralizedTime OPTIONAL, + other OtherKeyAttribute OPTIONAL } + + SubjectKeyIdentifier ::= OCTET STRING + + KEKRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 4 + kekid KEKIdentifier, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + KEKIdentifier ::= SEQUENCE { + keyIdentifier OCTET STRING, + date GeneralizedTime OPTIONAL, + other OtherKeyAttribute OPTIONAL } + + PasswordRecipientInfo ::= SEQUENCE { + version CMSVersion, -- always set to 0 + keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier + OPTIONAL, + keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, + encryptedKey EncryptedKey } + + OtherRecipientInfo ::= SEQUENCE { + oriType OBJECT IDENTIFIER, + oriValue ANY DEFINED BY oriType } + + DigestedData ::= SEQUENCE { + version CMSVersion, + digestAlgorithm DigestAlgorithmIdentifier, + encapContentInfo EncapsulatedContentInfo, + digest Digest } + + + +Housley Standards Track [Page 47] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + Digest ::= OCTET STRING + + EncryptedData ::= SEQUENCE { + version CMSVersion, + encryptedContentInfo EncryptedContentInfo, + unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL } + + AuthenticatedData ::= SEQUENCE { + version CMSVersion, + originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, + recipientInfos RecipientInfos, + macAlgorithm MessageAuthenticationCodeAlgorithm, + digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL, + encapContentInfo EncapsulatedContentInfo, + authAttrs [2] IMPLICIT AuthAttributes OPTIONAL, + mac MessageAuthenticationCode, + unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL } + + AuthAttributes ::= SET SIZE (1..MAX) OF Attribute + + UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute + + MessageAuthenticationCode ::= OCTET STRING + + DigestAlgorithmIdentifier ::= AlgorithmIdentifier + + SignatureAlgorithmIdentifier ::= AlgorithmIdentifier + + KeyEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier + + ContentEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier + + MessageAuthenticationCodeAlgorithm ::= AlgorithmIdentifier + + KeyDerivationAlgorithmIdentifier ::= AlgorithmIdentifier + + RevocationInfoChoices ::= SET OF RevocationInfoChoice + + RevocationInfoChoice ::= CHOICE { + crl CertificateList, + other [1] IMPLICIT OtherRevocationInfoFormat } + + OtherRevocationInfoFormat ::= SEQUENCE { + otherRevInfoFormat OBJECT IDENTIFIER, + otherRevInfo ANY DEFINED BY otherRevInfoFormat } + + + + + + +Housley Standards Track [Page 48] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + CertificateChoices ::= CHOICE { + certificate Certificate, + extendedCertificate [0] IMPLICIT ExtendedCertificate, -- Obsolete + v1AttrCert [1] IMPLICIT AttributeCertificateV1, -- Obsolete + v2AttrCert [2] IMPLICIT AttributeCertificateV2, + other [3] IMPLICIT OtherCertificateFormat } + + AttributeCertificateV2 ::= AttributeCertificate + + OtherCertificateFormat ::= SEQUENCE { + otherCertFormat OBJECT IDENTIFIER, + otherCert ANY DEFINED BY otherCertFormat } + + CertificateSet ::= SET OF CertificateChoices + + IssuerAndSerialNumber ::= SEQUENCE { + issuer Name, + serialNumber CertificateSerialNumber } + + CMSVersion ::= INTEGER { v0(0), v1(1), v2(2), v3(3), v4(4), v5(5) } + + UserKeyingMaterial ::= OCTET STRING + + OtherKeyAttribute ::= SEQUENCE { + keyAttrId OBJECT IDENTIFIER, + keyAttr ANY DEFINED BY keyAttrId OPTIONAL } + + -- Content Type Object Identifiers + + id-ct-contentInfo OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) ct(1) 6 } + + id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 1 } + + id-signedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 2 } + + id-envelopedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 3 } + + id-digestedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 5 } + + id-encryptedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs7(7) 6 } + + + + + +Housley Standards Track [Page 49] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + id-ct-authData OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 2 } + + -- The CMS Attributes + + MessageDigest ::= OCTET STRING + + SigningTime ::= Time + + Time ::= CHOICE { + utcTime UTCTime, + generalTime GeneralizedTime } + + Countersignature ::= SignerInfo + + -- Attribute Object Identifiers + + id-contentType OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 3 } + + id-messageDigest OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 4 } + + id-signingTime OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 5 } + + id-countersignature OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) 6 } + + -- Obsolete Extended Certificate syntax from PKCS #6 + + ExtendedCertificateOrCertificate ::= CHOICE { + certificate Certificate, + extendedCertificate [0] IMPLICIT ExtendedCertificate } + + ExtendedCertificate ::= SEQUENCE { + extendedCertificateInfo ExtendedCertificateInfo, + signatureAlgorithm SignatureAlgorithmIdentifier, + signature Signature } + + ExtendedCertificateInfo ::= SEQUENCE { + version CMSVersion, + certificate Certificate, + attributes UnauthAttributes } + + Signature ::= BIT STRING + + END -- of CryptographicMessageSyntax2004 + + + +Housley Standards Track [Page 50] + +RFC 5652 Cryptographic Message Syntax September 2009 + + +12.2. Version 1 Attribute Certificate ASN.1 Module + + AttributeCertificateVersion1 + { iso(1) member-body(2) us(840) rsadsi(113549) + pkcs(1) pkcs-9(9) smime(16) modules(0) v1AttrCert(15) } + + DEFINITIONS EXPLICIT TAGS ::= + BEGIN + + -- EXPORTS All + + IMPORTS + + -- Imports from RFC 5280 [PROFILE], Appendix A.1 + AlgorithmIdentifier, Attribute, CertificateSerialNumber, + Extensions, UniqueIdentifier + FROM PKIX1Explicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + mod(0) pkix1-explicit(18) } + + -- Imports from RFC 5280 [PROFILE], Appendix A.2 + GeneralNames + FROM PKIX1Implicit88 + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + mod(0) pkix1-implicit(19) } + + -- Imports from RFC 3281 [ACPROFILE], Appendix B + AttCertValidityPeriod, IssuerSerial + FROM PKIXAttributeCertificate + { iso(1) identified-organization(3) dod(6) + internet(1) security(5) mechanisms(5) pkix(7) + mod(0) attribute-cert(12) } ; + + -- Definition extracted from X.509-1997 [X.509-97], but + -- different type names are used to avoid collisions. + + AttributeCertificateV1 ::= SEQUENCE { + acInfo AttributeCertificateInfoV1, + signatureAlgorithm AlgorithmIdentifier, + signature BIT STRING } + + + + + + + + + +Housley Standards Track [Page 51] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + AttributeCertificateInfoV1 ::= SEQUENCE { + version AttCertVersionV1 DEFAULT v1, + subject CHOICE { + baseCertificateID [0] IssuerSerial, + -- associated with a Public Key Certificate + subjectName [1] GeneralNames }, + -- associated with a name + issuer GeneralNames, + signature AlgorithmIdentifier, + serialNumber CertificateSerialNumber, + attCertValidityPeriod AttCertValidityPeriod, + attributes SEQUENCE OF Attribute, + issuerUniqueID UniqueIdentifier OPTIONAL, + extensions Extensions OPTIONAL } + + AttCertVersionV1 ::= INTEGER { v1(0) } + + END -- of AttributeCertificateVersion1 + +13. References + +13.1. Normative References + + [ACPROFILE] Farrell, S. and R. Housley, "An Internet Attribute + Certificate Profile for Authorization", RFC 3281, April + 2002. + + [PROFILE] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., + Housley, R., and W. Polk, "Internet X.509 Public Key + Infrastructure Certificate and Certificate Revocation + List (CRL) Profile", RFC 5280, May 2008. + + [STDWORDS] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [X.208-88] CCITT. Recommendation X.208: Specification of Abstract + Syntax Notation One (ASN.1), 1988. + + [X.209-88] CCITT. Recommendation X.209: Specification of Basic + Encoding Rules for Abstract Syntax Notation One + (ASN.1), 1988. + + [X.501-88] CCITT. Recommendation X.501: The Directory - Models, + 1988. + + [X.509-88] CCITT. Recommendation X.509: The Directory - + Authentication Framework, 1988. + + + + +Housley Standards Track [Page 52] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + [X.509-97] ITU-T. Recommendation X.509: The Directory - + Authentication Framework, 1997. + + [X.509-00] ITU-T. Recommendation X.509: The Directory - + Authentication Framework, 2000. + +13.2. Informative References + + [CMS1] Housley, R., "Cryptographic Message Syntax", RFC 2630, + June 1999. + + [CMS2] Housley, R., "Cryptographic Message Syntax (CMS)", RFC + 3369, August 2002. + + [CMS3] Housley, R., "Cryptographic Message Syntax (CMS)", RFC + 3852, July 2004. + + [CMSALG] Housley, R., "Cryptographic Message Syntax (CMS) + Algorithms", RFC 3370, August 2002. + + [CMSMSIG] Housley, R., "Cryptographic Message Syntax (CMS) + Multiple Signer Clarification", RFC 4853, April 2007. + + [DH-X9.42] Rescorla, E., "Diffie-Hellman Key Agreement Method", + RFC 2631, June 1999. + + [ESS] Hoffman, P., Ed., "Enhanced Security Services for + S/MIME", RFC 2634, June 1999. + + [MSAC] Microsoft Development Network (MSDN) Library, + "Authenticode", April 2004 Release. + + [MSG2] Dusse, S., Hoffman, P., Ramsdell, B., Lundblade, L., + and L. Repka, "S/MIME Version 2 Message Specification", + RFC 2311, March 1998. + + [MSG3] Ramsdell, B., Ed., "S/MIME Version 3 Message + Specification", RFC 2633, June 1999. + + [MSG3.1] Ramsdell, B., Ed., "Secure/Multipurpose Internet Mail + Extensions (S/MIME) Version 3.1 Message Specification", + RFC 3851, July 2004. + + [NEWPKCS#1] Kaliski, B. and J. Staddon, "PKCS #1: RSA Cryptography + Specifications Version 2.0", RFC 2437, October 1998. + + + + + + +Housley Standards Track [Page 53] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + [OCSP] Myers, M., Ankney, R., Malpani, A., Galperin, S., and + C. Adams, "X.509 Internet Public Key Infrastructure + Online Certificate Status Protocol - OCSP", RFC 2560, + June 1999. + + [PKCS#1] Kaliski, B., "PKCS #1: RSA Encryption Version 1.5", RFC + 2313, March 1998. + + [PKCS#6] RSA Laboratories. PKCS #6: Extended-Certificate Syntax + Standard, Version 1.5. November 1993. + + [PKCS#7] Kaliski, B., "PKCS #7: Cryptographic Message Syntax + Version 1.5", RFC 2315, March 1998. + + [PKCS#9] RSA Laboratories. PKCS #9: Selected Attribute Types, + Version 1.1. November 1993. + + [PWRI] Gutmann, P., "Password-based Encryption for CMS", RFC + 3211, December 2001. + + [RANDOM] Eastlake, D., 3rd, Schiller, J., and S. Crocker, + "Randomness Requirements for Security", BCP 106, RFC + 4086, June 2005. + +14. Security Considerations + + The Cryptographic Message Syntax provides a method for digitally + signing data, digesting data, encrypting data, and authenticating + data. + + Implementations must protect the signer's private key. Compromise of + the signer's private key permits masquerade. + + Implementations must protect the key management private key, the + key-encryption key, and the content-encryption key. Compromise of + the key management private key or the key-encryption key may result + in the disclosure of all contents protected with that key. + Similarly, compromise of the content-encryption key may result in + disclosure of the associated encrypted content. + + Implementations must protect the key management private key and the + message-authentication key. Compromise of the key management private + key permits masquerade of authenticated data. Similarly, compromise + of the message-authentication key may result in undetectable + modification of the authenticated content. + + + + + + +Housley Standards Track [Page 54] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The key management technique employed to distribute message- + authentication keys must itself provide data origin authentication; + otherwise, the contents are delivered with integrity from an unknown + source. Neither RSA [PKCS#1] [NEWPKCS#1] nor Ephemeral-Static + Diffie-Hellman [DH-X9.42] provide the necessary data origin + authentication. Static-Static Diffie-Hellman [DH-X9.42] does provide + the necessary data origin authentication when both the originator and + recipient public keys are bound to appropriate identities in X.509 + certificates. + + When more than two parties share the same message-authentication key, + data origin authentication is not provided. Any party that knows the + message-authentication key can compute a valid MAC; therefore, the + contents could originate from any one of the parties. + + Implementations must randomly generate content-encryption keys, + message-authentication keys, initialization vectors (IVs), and + padding. Also, the generation of public/private key pairs relies on + random numbers. The use of inadequate pseudo-random number + generators (PRNGs) to generate cryptographic keys can result in + little or no security. An attacker may find it much easier to + reproduce the PRNG environment that produced the keys, searching the + resulting small set of possibilities, rather than brute force + searching the whole key space. The generation of quality random + numbers is difficult. RFC 4086 [RANDOM] offers important guidance in + this area. + + When using key-agreement algorithms or previously distributed + symmetric key-encryption keys, a key-encryption key is used to + encrypt the content-encryption key. If the key-encryption and + content-encryption algorithms are different, the effective security + is determined by the weaker of the two algorithms. If, for example, + content is encrypted with Triple-DES using a 168-bit Triple-DES + content-encryption key, and the content-encryption key is wrapped + with RC2 using a 40-bit RC2 key-encryption key, then at most 40 bits + of protection is provided. A trivial search to determine the value + of the 40-bit RC2 key can recover the Triple-DES key, and then the + Triple-DES key can be used to decrypt the content. Therefore, + implementers must ensure that key-encryption algorithms are as strong + or stronger than content-encryption algorithms. + + Implementers should be aware that cryptographic algorithms become + weaker with time. As new cryptoanalysis techniques are developed and + computing performance improves, the work factor to break a particular + cryptographic algorithm will be reduced. Therefore, cryptographic + algorithm implementations should be modular, allowing new algorithms + to be readily inserted. That is, implementers should be prepared for + the set of algorithms that must be supported to change over time. + + + +Housley Standards Track [Page 55] + +RFC 5652 Cryptographic Message Syntax September 2009 + + + The countersignature unsigned attribute includes a digital signature + that is computed on the content signature value; thus, the + countersigning process need not know the original signed content. + This structure permits implementation efficiency advantages; however, + this structure may also permit the countersigning of an inappropriate + signature value. Therefore, implementations that perform + countersignatures should either verify the original signature value + prior to countersigning it (this verification requires processing of + the original content), or implementations should perform + countersigning in a context that ensures that only appropriate + signature values are countersigned. + +15. Acknowledgments + + This document is the result of contributions from many professionals. + I appreciate the hard work of all members of the IETF S/MIME Working + Group. I extend a special thanks to Rich Ankney, Simon Blake-Wilson, + Tim Dean, Steve Dusse, Carl Ellison, Peter Gutmann, Bob Jueneman, + Stephen Henson, Paul Hoffman, Scott Hollenbeck, Don Johnson, Burt + Kaliski, John Linn, John Pawling, Blake Ramsdell, Francois Rousseau, + Jim Schaad, Dave Solo, Paul Timmel, and Sean Turner for their efforts + and support. + + I thank Tim Polk for his encouragement in advancing this + specification along the standards maturity ladder. In addition, I + thank Jan Vilhuber for the careful reading that resulted in RFC + Errata 1744. + +Author's Address + + Russell Housley + Vigil Security, LLC + 918 Spring Knoll Drive + Herndon, VA 20170 + USA + EMail: housley@vigilsec.com + + + + + + + + + + + + + + + +Housley Standards Track [Page 56] + |