Skip to content

Commit

Permalink
Script updating gh-pages from 5cfc619. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Apr 8, 2024
1 parent 1e0766b commit 639f4c0
Show file tree
Hide file tree
Showing 3 changed files with 45 additions and 39 deletions.
50 changes: 27 additions & 23 deletions draft-bradleylundberg-cfrg-arkg.html
Original file line number Diff line number Diff line change
Expand Up @@ -1036,11 +1036,11 @@
<thead><tr>
<td class="left">Internet-Draft</td>
<td class="center">ARKG</td>
<td class="right">March 2024</td>
<td class="right">April 2024</td>
</tr></thead>
<tfoot><tr>
<td class="left">Lundberg &amp; Bradley</td>
<td class="center">Expires 19 September 2024</td>
<td class="center">Expires 10 October 2024</td>
<td class="right">[Page]</td>
</tr></tfoot>
</table>
Expand All @@ -1053,12 +1053,12 @@
<dd class="internet-draft">draft-bradleylundberg-cfrg-arkg-latest</dd>
<dt class="label-published">Published:</dt>
<dd class="published">
<time datetime="2024-03-18" class="published">18 March 2024</time>
<time datetime="2024-04-08" class="published">8 April 2024</time>
</dd>
<dt class="label-intended-status">Intended Status:</dt>
<dd class="intended-status">Informational</dd>
<dt class="label-expires">Expires:</dt>
<dd class="expires"><time datetime="2024-09-19">19 September 2024</time></dd>
<dd class="expires"><time datetime="2024-10-10">10 October 2024</time></dd>
<dt class="label-authors">Authors:</dt>
<dd class="authors">
<div class="author">
Expand Down Expand Up @@ -1117,7 +1117,7 @@ <h2 id="name-status-of-this-memo">
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."<a href="#section-boilerplate.1-3" class="pilcrow"></a></p>
<p id="section-boilerplate.1-4">
This Internet-Draft will expire on 19 September 2024.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
This Internet-Draft will expire on 10 October 2024.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
</section>
</div>
<div id="copyright">
Expand Down Expand Up @@ -1709,11 +1709,11 @@ <h3 id="name-using-elliptic-curve-arithm">
<ul class="normal">
<li class="normal" id="section-3.1-3.1">
<p id="section-3.1-3.1.1">Elliptic curve points are encoded to and from octet strings
using the procedures defined in sections 2.3.3 and 2.3.4 of <span><a href="#SEC1" class="internal xref">SEC 1</a> [<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.1-3.1.1" class="pilcrow"></a></p>
using the procedures defined in sections 2.3.3 and 2.3.4 of <span>[<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.1-3.1.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-3.1-3.2">
<p id="section-3.1-3.2.1">Elliptic curve scalar values are encoded to and from octet strings
using the procedures defined in sections 2.3.7 and 2.3.8 of <span><a href="#SEC1" class="internal xref">SEC 1</a> [<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.1-3.2.1" class="pilcrow"></a></p>
using the procedures defined in sections 2.3.7 and 2.3.8 of <span>[<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.1-3.2.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-3.1-3.3">
<p id="section-3.1-3.3.1"><code>N</code> is the order of <code>crv</code>.<a href="#section-3.1-3.3.1" class="pilcrow"></a></p>
Expand Down Expand Up @@ -1768,15 +1768,15 @@ <h3 id="name-using-ecdh-as-the-kem">
<ul class="normal">
<li class="normal" id="section-3.2-3.1">
<p id="section-3.2-3.1.1">Elliptic curve points are encoded to and from octet strings
using the procedures defined in sections 2.3.3 and 2.3.4 of <span><a href="#SEC1" class="internal xref">SEC 1</a> [<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.1.1" class="pilcrow"></a></p>
using the procedures defined in sections 2.3.3 and 2.3.4 of <span>[<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.1.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-3.2-3.2">
<p id="section-3.2-3.2.1">Elliptic curve coordinate field elements are encoded to and from octet strings
using the procedures defined in sections 2.3.5 and 2.3.6 of <span><a href="#SEC1" class="internal xref">SEC 1</a> [<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.2.1" class="pilcrow"></a></p>
using the procedures defined in sections 2.3.5 and 2.3.6 of <span>[<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.2.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-3.2-3.3">
<p id="section-3.2-3.3.1">Elliptic curve scalar values are encoded to and from octet strings
using the procedures defined in sections 2.3.7 and 2.3.8 of <span><a href="#SEC1" class="internal xref">SEC 1</a> [<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.3.1" class="pilcrow"></a></p>
using the procedures defined in sections 2.3.7 and 2.3.8 of <span>[<a href="#SEC1" class="cite xref">SEC1</a>]</span>.<a href="#section-3.2-3.3.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-3.2-3.4">
<p id="section-3.2-3.4.1"><code>ECDH(pk, sk)</code> represents the compact output of ECDH <span>[<a href="#RFC6090" class="cite xref">RFC6090</a>]</span>
Expand Down Expand Up @@ -1899,15 +1899,15 @@ <h3 id="name-arkg-p256-ecdh-p256-hmac-sh">
<p id="section-4.1-2.1.1"><code>BL</code>: Elliptic curve arithmetic as described in <a href="#blinding-ec" class="auto internal xref">Section 3.1</a> with the parameter:<a href="#section-4.1-2.1.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.1-2.1.2.1">
<p id="section-4.1-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp256r1</code> [SEC2].<a href="#section-4.1-2.1.2.1.1" class="pilcrow"></a></p>
<p id="section-4.1-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp256r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.1-2.1.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
<li class="normal" id="section-4.1-2.2">
<p id="section-4.1-2.2.1"><code>KEM</code>: ECDH as described in <a href="#kem-ecdh" class="auto internal xref">Section 3.2</a> with the parameter:<a href="#section-4.1-2.2.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.1-2.2.2.1">
<p id="section-4.1-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp256r1</code> [SEC2].<a href="#section-4.1-2.2.2.1.1" class="pilcrow"></a></p>
<p id="section-4.1-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp256r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.1-2.2.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
Expand Down Expand Up @@ -1947,15 +1947,15 @@ <h3 id="name-arkg-p384-ecdh-p384-hmac-sh">
<p id="section-4.2-2.1.1"><code>BL</code>: Elliptic curve arithmetic as described in <a href="#blinding-ec" class="auto internal xref">Section 3.1</a> with the parameter:<a href="#section-4.2-2.1.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.2-2.1.2.1">
<p id="section-4.2-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp384r1</code> [SEC2].<a href="#section-4.2-2.1.2.1.1" class="pilcrow"></a></p>
<p id="section-4.2-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp384r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.2-2.1.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
<li class="normal" id="section-4.2-2.2">
<p id="section-4.2-2.2.1"><code>KEM</code>: ECDH as described in <a href="#kem-ecdh" class="auto internal xref">Section 3.2</a> with the parameter:<a href="#section-4.2-2.2.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.2-2.2.2.1">
<p id="section-4.2-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp384r1</code> [SEC2].<a href="#section-4.2-2.2.2.1.1" class="pilcrow"></a></p>
<p id="section-4.2-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp384r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.2-2.2.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
Expand Down Expand Up @@ -1995,15 +1995,15 @@ <h3 id="name-arkg-p521-ecdh-p521-hmac-sh">
<p id="section-4.3-2.1.1"><code>BL</code>: Elliptic curve arithmetic as described in <a href="#blinding-ec" class="auto internal xref">Section 3.1</a> with the parameter:<a href="#section-4.3-2.1.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.3-2.1.2.1">
<p id="section-4.3-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp521r1</code> [SEC2].<a href="#section-4.3-2.1.2.1.1" class="pilcrow"></a></p>
<p id="section-4.3-2.1.2.1.1"><code>crv</code>: The NIST curve <code>secp521r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.3-2.1.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
<li class="normal" id="section-4.3-2.2">
<p id="section-4.3-2.2.1"><code>KEM</code>: ECDH as described in <a href="#kem-ecdh" class="auto internal xref">Section 3.2</a> with the parameter:<a href="#section-4.3-2.2.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.3-2.2.2.1">
<p id="section-4.3-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp521r1</code> [SEC2].<a href="#section-4.3-2.2.2.1.1" class="pilcrow"></a></p>
<p id="section-4.3-2.2.2.1.1"><code>crv</code>: The NIST curve <code>secp521r1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.3-2.2.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
Expand Down Expand Up @@ -2043,15 +2043,15 @@ <h3 id="name-arkg-p256k-ecdh-p256k-hmac-">
<p id="section-4.4-2.1.1"><code>BL</code>: Elliptic curve arithmetic as described in <a href="#blinding-ec" class="auto internal xref">Section 3.1</a> with the parameter:<a href="#section-4.4-2.1.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.4-2.1.2.1">
<p id="section-4.4-2.1.2.1.1"><code>crv</code>: The SECG curve <code>secp256k1</code> [SEC2].<a href="#section-4.4-2.1.2.1.1" class="pilcrow"></a></p>
<p id="section-4.4-2.1.2.1.1"><code>crv</code>: The SECG curve <code>secp256k1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.4-2.1.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
<li class="normal" id="section-4.4-2.2">
<p id="section-4.4-2.2.1"><code>KEM</code>: ECDH as described in <a href="#kem-ecdh" class="auto internal xref">Section 3.2</a> with the parameter:<a href="#section-4.4-2.2.1" class="pilcrow"></a></p>
<ul class="normal">
<li class="normal" id="section-4.4-2.2.2.1">
<p id="section-4.4-2.2.2.1.1"><code>crv</code>: The SECG curve <code>secp256k1</code> [SEC2].<a href="#section-4.4-2.2.2.1.1" class="pilcrow"></a></p>
<p id="section-4.4-2.2.2.1.1"><code>crv</code>: The SECG curve <code>secp256k1</code> <span>[<a href="#SEC2" class="cite xref">SEC2</a>]</span>.<a href="#section-4.4-2.2.2.1.1" class="pilcrow"></a></p>
</li>
</ul>
</li>
Expand Down Expand Up @@ -2285,10 +2285,6 @@ <h3 id="name-normative-references">
<a href="#section-11.1" class="section-number selfRef">11.1. </a><a href="#name-normative-references" class="section-name selfRef">Normative References</a>
</h3>
<dl class="references">
<dt id="BIP32">[BIP32]</dt>
<dd>
<span class="refAuthor">Wuille, P.</span>, <span class="refTitle">"BIP 32 Hierarchical Deterministic Wallets"</span>, <time datetime="2012" class="refDate">2012</time>, <span>&lt;<a href="https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki">https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki</a>&gt;</span>. </dd>
<dd class="break"></dd>
<dt id="RFC2104">[RFC2104]</dt>
<dd>
<span class="refAuthor">Krawczyk, H.</span>, <span class="refAuthor">Bellare, M.</span>, and <span class="refAuthor">R. Canetti</span>, <span class="refTitle">"HMAC: Keyed-Hashing for Message Authentication"</span>, <span class="seriesInfo">RFC 2104</span>, <span class="seriesInfo">DOI 10.17487/RFC2104</span>, <time datetime="1997-02" class="refDate">February 1997</time>, <span>&lt;<a href="https://www.rfc-editor.org/rfc/rfc2104">https://www.rfc-editor.org/rfc/rfc2104</a>&gt;</span>. </dd>
Expand All @@ -2314,8 +2310,12 @@ <h3 id="name-normative-references">
<span class="refAuthor">Leiba, B.</span>, <span class="refTitle">"Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words"</span>, <span class="seriesInfo">BCP 14</span>, <span class="seriesInfo">RFC 8174</span>, <span class="seriesInfo">DOI 10.17487/RFC8174</span>, <time datetime="2017-05" class="refDate">May 2017</time>, <span>&lt;<a href="https://www.rfc-editor.org/rfc/rfc8174">https://www.rfc-editor.org/rfc/rfc8174</a>&gt;</span>. </dd>
<dd class="break"></dd>
<dt id="SEC1">[SEC1]</dt>
<dd>
<span class="refAuthor">Certicom Research</span>, <span class="refTitle">"SEC 1: Elliptic Curve Cryptography"</span>, <time datetime="2009" class="refDate">2009</time>, <span>&lt;<a href="http://www.secg.org/sec1-v2.pdf">http://www.secg.org/sec1-v2.pdf</a>&gt;</span>. </dd>
<dd class="break"></dd>
<dt id="SEC2">[SEC2]</dt>
<dd>
<span class="refAuthor">Certicom Research</span>, <span class="refTitle">"SEC 1 Elliptic Curve Cryptography"</span>, <time datetime="2020" class="refDate">2020</time>, <span>&lt;<a href="http://www.secg.org/sec1-v2.pdf">http://www.secg.org/sec1-v2.pdf</a>&gt;</span>. </dd>
<span class="refAuthor">Certicom Research</span>, <span class="refTitle">"SEC 2: Recommended Elliptic Curve Domain Parameters"</span>, <time datetime="2010" class="refDate">2010</time>, <span>&lt;<a href="http://www.secg.org/sec2-v2.pdf">http://www.secg.org/sec2-v2.pdf</a>&gt;</span>. </dd>
<dd class="break"></dd>
</dl>
</section>
Expand All @@ -2326,6 +2326,10 @@ <h3 id="name-informative-references">
<a href="#section-11.2" class="section-number selfRef">11.2. </a><a href="#name-informative-references" class="section-name selfRef">Informative References</a>
</h3>
<dl class="references">
<dt id="BIP32">[BIP32]</dt>
<dd>
<span class="refAuthor">Wuille, P.</span>, <span class="refTitle">"BIP 32 Hierarchical Deterministic Wallets"</span>, <time datetime="2012" class="refDate">2012</time>, <span>&lt;<a href="https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki">https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki</a>&gt;</span>. </dd>
<dd class="break"></dd>
<dt id="Clermont">[Clermont]</dt>
<dd>
<span class="refAuthor">Clermont, S. A.</span> and <span class="refAuthor">Technische Universität Darmstadt</span>, <span class="refTitle">"Post Quantum Asynchronous Remote Key Generation. Master's thesis"</span>, <time datetime="2022" class="refDate">2022</time>, <span>&lt;<a href="https://www.cryptoplexity.informatik.tu-darmstadt.de/media/crypt/teaching_1/theses_1/Sebastian_Clermont_Thesis.pdf">https://www.cryptoplexity.informatik.tu-darmstadt.de/media/crypt/teaching_1/theses_1/Sebastian_Clermont_Thesis.pdf</a>&gt;</span>. </dd>
Expand Down
32 changes: 17 additions & 15 deletions draft-bradleylundberg-cfrg-arkg.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
Crypto Forum E. Lundberg, Ed.
Internet-Draft J. Bradley
Intended status: Informational Yubico
Expires: 19 September 2024 18 March 2024
Expires: 10 October 2024 8 April 2024


The Asynchronous Remote Key Generation (ARKG) algorithm
Expand Down Expand Up @@ -54,7 +54,7 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

This Internet-Draft will expire on 19 September 2024.
This Internet-Draft will expire on 10 October 2024.

Copyright Notice

Expand Down Expand Up @@ -538,11 +538,10 @@ Table of Contents
instantiated as follows:

* Elliptic curve points are encoded to and from octet strings using
the procedures defined in sections 2.3.3 and 2.3.4 of SEC 1
[SEC1].
the procedures defined in sections 2.3.3 and 2.3.4 of [SEC1].

* Elliptic curve scalar values are encoded to and from octet strings
using the procedures defined in sections 2.3.7 and 2.3.8 of SEC 1
using the procedures defined in sections 2.3.7 and 2.3.8 of
[SEC1].

* N is the order of crv.
Expand Down Expand Up @@ -588,15 +587,14 @@ Table of Contents
of ARKG may be instantiated as follows:

* Elliptic curve points are encoded to and from octet strings using
the procedures defined in sections 2.3.3 and 2.3.4 of SEC 1
[SEC1].
the procedures defined in sections 2.3.3 and 2.3.4 of [SEC1].

* Elliptic curve coordinate field elements are encoded to and from
octet strings using the procedures defined in sections 2.3.5 and
2.3.6 of SEC 1 [SEC1].
2.3.6 of [SEC1].

* Elliptic curve scalar values are encoded to and from octet strings
using the procedures defined in sections 2.3.7 and 2.3.8 of SEC 1
using the procedures defined in sections 2.3.7 and 2.3.8 of
[SEC1].

* ECDH(pk, sk) represents the compact output of ECDH [RFC6090] using
Expand Down Expand Up @@ -927,10 +925,6 @@ Table of Contents

11.1. Normative References

[BIP32] Wuille, P., "BIP 32 Hierarchical Deterministic Wallets",
2012, <https://github.com/bitcoin/bips/blob/master/bip-
0032.mediawiki>.

[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
Hashing for Message Authentication", RFC 2104,
DOI 10.17487/RFC2104, February 1997,
Expand Down Expand Up @@ -959,11 +953,19 @@ Table of Contents
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

[SEC1] Certicom Research, "SEC 1 Elliptic Curve Cryptography",
2020, <http://www.secg.org/sec1-v2.pdf>.
[SEC1] Certicom Research, "SEC 1: Elliptic Curve Cryptography",
2009, <http://www.secg.org/sec1-v2.pdf>.

[SEC2] Certicom Research, "SEC 2: Recommended Elliptic Curve
Domain Parameters", 2010,
<http://www.secg.org/sec2-v2.pdf>.

11.2. Informative References

[BIP32] Wuille, P., "BIP 32 Hierarchical Deterministic Wallets",
2012, <https://github.com/bitcoin/bips/blob/master/bip-
0032.mediawiki>.

[Clermont] Clermont, S. A. and Technische Universität Darmstadt,
"Post Quantum Asynchronous Remote Key Generation. Master's
thesis", 2022, <https://www.cryptoplexity.informatik.tu-
Expand Down
2 changes: 1 addition & 1 deletion index.html
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ <h2>Preview for branch <a href="idbot-setup">idbot-setup</a></h2>
<tr>
<td><a href="idbot-setup/draft-bradleylundberg-cfrg-arkg.html" class="html draft-bradleylundberg-cfrg-arkg" title="The Asynchronous Remote Key Generation (ARKG) algorithm (HTML)">ARKG</a></td>
<td><a href="idbot-setup/draft-bradleylundberg-cfrg-arkg.txt" class="txt draft-bradleylundberg-cfrg-arkg" title="The Asynchronous Remote Key Generation (ARKG) algorithm (Text)">plain text</a></td>
<td>same as main</td>
<td><a href="https://author-tools.ietf.org/api/iddiff?url_1=https://Yubico.github.io/arkg-rfc/draft-bradleylundberg-cfrg-arkg.txt&amp;url_2=https://Yubico.github.io/arkg-rfc/idbot-setup/draft-bradleylundberg-cfrg-arkg.txt" class="diff draft-bradleylundberg-cfrg-arkg">diff with main</a></td>
</tr>
</table>
<h2>Preview for branch <a href="misc">misc</a></h2>
Expand Down

0 comments on commit 639f4c0

Please sign in to comment.