You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: readme.md
+18-11Lines changed: 18 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,13 +154,13 @@ Within `providers/<provider_name>/[implementation_name/]`
154
154
- artifacts_cms_v3.zip
155
155
-`artifacts_cms_v3/` subfolder which will contain the artifacts
156
156
-`artifacts_cms_v3/expected_plaintext.txt` # The message which was encrypted and can be compared against the decrypted artifacts.
157
-
-`artifacts_cms_v3/ukm.txt` # The User Keying Material (UKM) included in some of the enveloped messages.
158
157
-`artifacts_cms_v3/ta.der` # ML-DSA-44 trust anchor used to sign the end-entity certificates.
159
158
-`artifacts_cms_v3/<friendly>-<oid>_ee.der` # The KEM certificate that the message is enveloped to.
160
-
-`artifacts_cms_v3/<friendly>-<oid>_both_priv.der` # The private KEM key to decrypt the enveloped messages.
159
+
-`artifacts_cms_v3/<friendly>-<oid>_priv.der` # The private KEM key to decrypt the enveloped messages.
161
160
-`artifacts_cms_v3/<friendly>-<oid>_kemri_ukm.der` # An Enveloped artifact using KEMRI’s UKM field and one of the MTI KDFs for the KEM algorithm.
162
161
-`artifacts_cms_v3/<friendly>-<oid>_kemri_auth.der` # An AuthEnveloped artifact using KEMRI without UKM and one of the MTI KDFs for the KEM algorithm.
163
162
-`artifacts_cms_v3/<friendly>-<oid>_kemri_<kdf>.der` # Enveloped artifacts using KEMRI without UKM, and the specified KDF. Implementations must provide artifacts for each of the MTI KDFs for the OID, and may provide artifacts for other KDFs.
163
+
-`artifacts_cms_v3/<friendly>-<oid>_kemri_auth_<kdf>.der` # An AuthEnveloped artifact using KEMRI without UKM and the specified KDF.
164
164
-`artifacts_cms_v3/<friendly>-<oid>_signed_attrs.der` # Signed artifact, with attached content and signed attributes.
165
165
166
166
#### Friendly
@@ -169,7 +169,7 @@ Per https://github.com/IETF-Hackathon/pqc-certificates/issues/96 we would like a
169
169
170
170
#### Trust Anchor
171
171
172
-
A trust anchor isn't necessary to verify the KEMRecipientInfo artifacts, but some implementations may find it useful. We're using dilithium2 at the moment since some might not have implemented ML-DSA.ipd.
172
+
A trust anchor isn't necessary to verify the KEMRecipientInfo artifacts, but some implementations may find it useful. We're using ML-DSA-44.
173
173
174
174
#### DER vs PEM
175
175
@@ -188,14 +188,21 @@ Each RFC will specify mandatory KDFs, and probably allow for others as well. You
0 commit comments