Connected: An Internet Encyclopedia
4.6.4.2.1 Symmetric Key Management

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 4. Processing of Messages
Up: 4.6 Summary of Encapsulated Header Fields
Up: 4.6.4 Per-Recipient Encapsulated Header Fields
Up: 4.6.4.2 Key-Info Field
Prev: 4.6.4.2 Key-Info Field
Next: 4.6.4.2.2 Asymmetric Key Management

4.6.4.2.1 Symmetric Key Management

4.6.4.2.1 Symmetric Key Management

When symmetric key management is employed for a given recipient, the "Key-Info:" encapsulated header field transfers four items, separated by commas: an IK Use Indicator, a MIC Algorithm Indicator, a DEK and a MIC. The IK Use Indicator identifies the algorithm and mode in which the identified IK was used for DEK and MIC encryption for a particular recipient. The MIC Algorithm Indicator identifies the MIC computation algorithm used for a particular recipient. The DEK and MIC are symmetrically encrypted under the IK identified by a preceding "Recipient-ID-Symmetric:" field and/or prior "Originator- ID-Symmetric:" field.

Appropriate symmetric encryption algorithms, modes and identifiers, MIC computation algorithms and identifiers, and encrypted DEK and MIC formats are defined in RFC 1423.


Next: 4.6.4.2.2 Asymmetric Key Management

Connected: An Internet Encyclopedia
4.6.4.2.1 Symmetric Key Management