One document matched: draft-ietf-httpauth-mutual-algo-02.ps


%!PS-Adobe-3.0
%%Title: Mutual Authentication Protocol for HTTP: KAM3-based Cryptographic Algorithms
%%Creator: html2ps version 1.0 beta5
%%CreationDate: Thu Feb 19 01:11:54 2015
%%DocumentNeededResources: font Times-Roman Times-Bold Courier Helvetica
%%DocumentData: Clean7Bit
%%Orientation: Portrait
%%BoundingBox: 0 0 596 842
%%Pages: 12
%%EndComments
%%BeginProlog
/d {bind def} bind def
/D {def} d
/ie {ifelse} d
/E {exch} d
/t true D
/f false D
/FL [/Times-Roman
/Times-Italic
/Times-Bold
/Times-BoldItalic
/Courier
/Courier-Oblique
/Courier-Bold
/Courier-BoldOblique
/Helvetica
/Helvetica-Oblique
/Helvetica-Bold
/Helvetica-BoldOblique] D
/Cd {aload length 2 idiv dup dict begin {D} repeat currentdict end} D
/reencodeISO {
 dup dup findfont dup length dict begin{1 index /FID ne{D}{pop pop}ie}forall
 /Encoding ISOLatin1Encoding D currentdict end definefont} D
/ISOLatin1Encoding [
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/space/exclam/quotedbl/numbersign/dollar/percent/ampersand/quoteright
/parenleft/parenright/asterisk/plus/comma/hyphen/period/slash
/zero/one/two/three/four/five/six/seven/eight/nine/colon/semicolon
/less/equal/greater/question/at/A/B/C/D/E/F/G/H/I/J/K/L/M/N
/O/P/Q/R/S/T/U/V/W/X/Y/Z/bracketleft/backslash/bracketright
/asciicircum/underscore/quoteleft/a/b/c/d/e/f/g/h/i/j/k/l/m
/n/o/p/q/r/s/t/u/v/w/x/y/z/braceleft/bar/braceright/asciitilde
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/space/exclamdown/cent/sterling/currency/yen/brokenbar
/section/dieresis/copyright/ordfeminine/guillemotleft/logicalnot
/hyphen/registered/macron/degree/plusminus/twosuperior/threesuperior
/acute/mu/paragraph/periodcentered/cedilla/onesuperior/ordmasculine
/guillemotright/onequarter/onehalf/threequarters/questiondown
/Agrave/Aacute/Acircumflex/Atilde/Adieresis/Aring/AE/Ccedilla
/Egrave/Eacute/Ecircumflex/Edieresis/Igrave/Iacute/Icircumflex
/Idieresis/Eth/Ntilde/Ograve/Oacute/Ocircumflex/Otilde/Odieresis
/multiply/Oslash/Ugrave/Uacute/Ucircumflex/Udieresis/Yacute
/Thorn/germandbls/agrave/aacute/acircumflex/atilde/adieresis
/aring/ae/ccedilla/egrave/eacute/ecircumflex/edieresis/igrave
/iacute/icircumflex/idieresis/eth/ntilde/ograve/oacute/ocircumflex
/otilde/odieresis/divide/oslash/ugrave/uacute/ucircumflex/udieresis
/yacute/thorn/ydieresis
] D
[128/backslash 129/parenleft 130/parenright 141/circumflex 142/tilde
143/perthousand 144/dagger 145/daggerdbl 146/Ydieresis 147/scaron 148/Scaron
149/oe 150/OE 151/guilsinglleft 152/guilsinglright 153/quotesinglbase
154/quotedblbase 155/quotedblleft 156/quotedblright 157/endash 158/emdash
159/trademark]
aload length 2 idiv 1 1 3 -1 roll{pop ISOLatin1Encoding 3 1 roll put}for
/colorimage where{pop}{
 /colorimage {
  pop pop /Pr E D {/Cv Pr D /Gr Cv length 3 idiv string D 0 1 Gr length 1 sub
   {Gr E dup /i E 3 mul D Cv i get 0.299 mul Cv i 1 add get 0.587 mul add
    Cv i 2 add get 0.114 mul add cvi put}for Gr} image} D
}ie
/pdfmark where{pop}{userdict /pdfmark /cleartomark load put}ie

/MySymbol 10 dict dup begin
 /FontType 3 D /FontMatrix [.001 0 0 .001 0 0 ] D /FontBBox [25 -10 600 600] D
 /Encoding 256 array D 0 1 255{Encoding exch /.notdef put}for
 Encoding (e) 0 get /euro put
 /Metrics 2 dict D Metrics begin
  /.notdef 0 D
  /euro 651 D
 end
 /BBox 2 dict D BBox begin
  /.notdef [0 0 0 0] D
  /euro [25 -10 600 600] D
 end
 /CharacterDefs 2 dict D CharacterDefs begin
  /.notdef {} D
  /euro{newpath 114 600 moveto 631 600 lineto 464 200 lineto 573 200 lineto
   573 0 lineto -94 0 lineto 31 300 lineto -10 300 lineto closepath clip
   50 setlinewidth newpath 656 300 moveto 381 300 275 0 360 arc stroke
   -19 350 moveto 600 0 rlineto -19 250 moveto 600 0 rlineto stroke}d
 end
 /BuildChar{0 begin
  /char E D /fontdict E D /charname fontdict /Encoding get char get D
  fontdict begin
   Metrics charname get 0 BBox charname get aload pop setcachedevice
   CharacterDefs charname get exec
  end
 end}D
 /BuildChar load 0 3 dict put /UniqueID 1 D
end
definefont pop
/Nf {dup 0 ge{FL E get}{-1 eq{/Symbol}{/MySymbol}ie}ie findfont
 E scalefont setfont} D
/IP {currentfile picstr readhexstring pop} D
/WF t D
/F 1 D
/N {showpage} d
/RL {rlineto} d
/S {show} d
/L {lineto} d
/M {moveto} d
/A {awidthshow} d
/RM {rmoveto} d
%%EndProlog
%%BeginSetup
%%PaperSize: A4
WF{FL{reencodeISO D}forall}{4 1 FL length 1 sub{FL E get reencodeISO D}for}ie
/Symbol dup dup findfont dup length dict begin
 {1 index /FID ne{D}{pop pop}ie}forall /Encoding [Encoding aload pop]
 dup 128 /therefore put D currentdict end definefont D
[/Creator (html2ps version 1.0 beta5) /Author () /Keywords (HTTP, authentication) /Subject () /Title (Mutual Authentication Protocol for HTTP: KAM3-based Cryptographic Algorithms) /DOCINFO pdfmark
[/PageMode /UseOutlines /DOCVIEW pdfmark
[/Count 1 /Dest /60 /Title (Mutual Authentication Protocol for HTTP: KAM3-based Cryptographic Algorithms draft-ietf-httpauth-mutual-algo-02) /OUT pdfmark
[/Count 23 /Dest /61 /Title () /OUT pdfmark
[/Dest /61 /Title (Abstract) /OUT pdfmark
[/Dest /62 /Title (Status of this Memo) /OUT pdfmark
[/Dest /63 /Title (Copyright Notice) /OUT pdfmark
[/Dest /64 /Title (Table of Contents) /OUT pdfmark
[/Count -1 /Dest /65 /Title (1. Introduction) /OUT pdfmark
[/Dest /66 /Title (1.1. Terminology) /OUT pdfmark
[/Dest /67 /Title (2. Cryptographic Overview \(Non-normative\)) /OUT pdfmark
[/Count -3 /Dest /68 /Title (3. Authentication Algorithms) /OUT pdfmark
[/Dest /69 /Title (3.1. Support Functions and Notations) /OUT pdfmark
[/Dest /70 /Title (3.2. Functions for Discrete-Logarithm Settings) /OUT pdfmark
[/Dest /71 /Title (3.3. Functions for Elliptic-Curve Settings) /OUT pdfmark
[/Dest /72 /Title (4. IANA Considerations) /OUT pdfmark
[/Count -2 /Dest /73 /Title (5. Security Considerations) /OUT pdfmark
[/Dest /74 /Title (5.1. General Implementation Considerations) /OUT pdfmark
[/Dest /75 /Title (5.2. Cryptographic Assumptions and Considerations) /OUT pdfmark
[/Dest /76 /Title (6. Notice on intellectual properties) /OUT pdfmark
[/Count -2 /Dest /77 /Title (7. References) /OUT pdfmark
[/Dest /78 /Title (7.1. Normative References) /OUT pdfmark
[/Dest /79 /Title (7.2. Informative References) /OUT pdfmark
[/Dest /80 /Title (Appendix A. \(Informative\) Group Parameters for Discrete-Logarithm Based Algorithms) /OUT pdfmark
[/Dest /81 /Title (Appendix B. \(Informative\) Derived Numerical Values) /OUT pdfmark
[/Dest /82 /Title (Appendix C. \(Informative\) Draft Change Log) /OUT pdfmark
[/Dest /83 /Title (C.1. Changes in HTTPAUTH-WG revision 02) /OUT pdfmark
[/Dest /84 /Title (C.2. Changes in HTTPAUTH-WG revision 01) /OUT pdfmark
[/Dest /85 /Title (C.3. Changes in HTTPAUTH-WG revision 00) /OUT pdfmark
[/Dest /86 /Title (C.4. Changes in HTTPAUTH revision 02) /OUT pdfmark
[/Dest /87 /Title (C.5. Changes in HTTPAUTH revision 01) /OUT pdfmark
[/Dest /88 /Title (C.6. Changes in revision 02) /OUT pdfmark
[/Dest /89 /Title (C.7. Changes in revision 01) /OUT pdfmark
[/Dest /90 /Title (C.8. Changes in revision 00) /OUT pdfmark
[/Dest /91 /Title (Authors' Addresses) /OUT pdfmark
%%EndSetup
%%Page: 1 1
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 842 null] /Dest /0 /DEST pdfmark
0 -0 M
save
2.5 -13.5 M
%%IncludeResource: font Times-Roman
11 0 Nf
(HTTPAUTH Working ) S
(Group) S
186.2 -13.5 M
(Y. ) S
(Oiwa) S
2.5 -32.2 M
(Internet-Draft) S
186.2 -32.2 M
(H. ) S
(Watanabe) S
2.5 -51 M
(Intended status: ) S
(Experimental) S
186.2 -51 M
(H. ) S
(Takagi) S
2.5 -69.8 M
(Expires: August 23, ) S
(2015) S
186.2 -69.8 M
(RISEC, ) S
(AIST) S
2.5 -88.5 M
(\240) S
186.2 -88.5 M
(K. ) S
(Maeda) S
2.5 -107.2 M
(\240) S
186.2 -107.2 M
(T. ) S
(Hayashi) S
2.5 -126 M
(\240) S
186.2 -126 M
(Lepidum) S
2.5 -144.8 M
(\240) S
186.2 -144.8 M
(Y. ) S
(Ioku) S
2.5 -163.5 M
(\240) S
186.2 -163.5 M
(Individual) S
2.5 -182.2 M
(\240) S
186.2 -182.2 M
(February 19, ) S
(2015) S
0 -187.5 M
restore
227 -202.7 M
[/View [/XYZ -4 842 null] /Dest /60 /DEST pdfmark
51.3 -221.7 M
%%IncludeResource: font Times-Bold
19 2 Nf
(Mutual Authentication Protocol for HTTP:) S
61.8 -244.5 M
(KAM3-based Cryptographic ) S
(Algorithms) S
86.7 -267.3 M
(draft-ietf-httpauth-mutual-algo-02) S
0 -297.3 M
15 2 Nf
(Abstract) S
[/View [/XYZ -4 477.7 null] /Dest /61 /DEST pdfmark
0 -321.5 M
11 0 Nf
2.66496396 0 32 0 0 (This document specifies some cryptographic algorithms which will be used for the Mutual user) A
0 -334.7 M
(authentication method for the Hyper-text Transport Protocol ) S
(\(HTTP\).) S
0 -364.7 M
15 2 Nf
(Status) S
[/View [/XYZ -4 410.3 null] /Dest /62 /DEST pdfmark
( of this ) S
(Memo) S
0 -388.9 M
11 0 Nf
(This Internet-Draft is submitted in full conformance with the provisions of BCP\24078 and ) S
(BCP\24079.) S
0 -413.1 M
0.34375 0 32 0 0 (Internet-Drafts are working documents of the Internet Engineering Task Force \(IETF\). Note that other) A
0 -426.3 M
0.389423072 0 32 0 0 (groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is) A
0 -439.5 M
(at ) S
(http://datatracker.ietf.org/drafts/current/.) S
0 -463.7 M
0.275781244 0 32 0 0 (Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced,) A
0 -476.9 M
1.51927078 0 32 0 0 (or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference) A
0 -490.1 M
(material or to cite them other than as \233work in ) S
(progress.\234) S
0 -514.3 M
(This Internet-Draft will expire on August 23, ) S
(2015.) S
0 -544.3 M
15 2 Nf
(Copyright) S
[/View [/XYZ -4 230.69989 null] /Dest /63 /DEST pdfmark
( ) S
(Notice) S
0 -568.5 M
11 0 Nf
(Copyright \(c\) 2015 IETF Trust and the persons identified as the document authors. All rights ) S
(reserved.) S
0 -592.7 M
3.1208334 0 32 0 0 (This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF) A
0 -605.9 M
1.34730113 0 32 0 0 (Documents \(http://trustee.ietf.org/license-info\) in effect on the date of publication of this document.) A
0 -619.1 M
0.819475472 0 32 0 0 (Please review these documents carefully, as they describe your rights and restrictions with respect to) A
0 -632.3 M
0.287109375 0 32 0 0 (this document. Code Components extracted from this document must include Simplified BSD License) A
0 -645.5 M
1.24951172 0 32 0 0 (text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as) A
0 -658.7 M
(described in the Simplified BSD ) S
(License.) S
0 -658.7 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 1 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 2 2
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /1 /DEST pdfmark
0 -18 M
%%IncludeResource: font Times-Bold
15 2 Nf
(Table) S
[/View [/XYZ -4 757.0 null] /Dest /64 /DEST pdfmark
( of ) S
(Contents) S
0 -42.2 M
gsave
newpath
0 -43.3 M
8.25 0 RL
stroke
grestore
%%IncludeResource: font Times-Roman
11 0 Nf
(1.) S
[/Rect [-1.0 -44.95 9.25 -32.85] /Subtype /Link /Border [0 0 0] /Dest /2 /ANN pdfmark
(\240 ) S
(Introduction) S
0 -55.4 M
(\240\240\240\240) S
gsave
newpath
11 -56.5 M
16.5 0 RL
stroke
grestore
(1.1.) S
[/Rect [10.0 -58.15 28.5 -46.0500031] /Subtype /Link /Border [0 0 0] /Dest /4 /ANN pdfmark
(\240 ) S
(Terminology) S
0 -68.6 M
gsave
newpath
0 -69.7 M
8.25 0 RL
stroke
grestore
(2.) S
[/Rect [-1.0 -71.3500061 9.25 -59.2500076] /Subtype /Link /Border [0 0 0] /Dest /6 /ANN pdfmark
(\240 Cryptographic Overview ) S
(\(Non-normative\)) S
0 -81.8 M
gsave
newpath
0 -82.9 M
8.25 0 RL
stroke
grestore
(3.) S
[/Rect [-1.0 -84.55 9.25 -72.4500046] /Subtype /Link /Border [0 0 0] /Dest /8 /ANN pdfmark
(\240 Authentication ) S
(Algorithms) S
0 -95 M
(\240\240\240\240) S
gsave
newpath
11 -96.1 M
16.5 0 RL
stroke
grestore
(3.1.) S
[/Rect [10.0 -97.75 28.5 -85.65] /Subtype /Link /Border [0 0 0] /Dest /10 /ANN pdfmark
(\240 Support Functions and ) S
(Notations) S
0 -108.2 M
(\240\240\240\240) S
gsave
newpath
11 -109.3 M
16.5 0 RL
stroke
grestore
(3.2.) S
[/Rect [10.0 -110.95 28.5 -98.85] /Subtype /Link /Border [0 0 0] /Dest /12 /ANN pdfmark
(\240 Functions for Discrete-Logarithm ) S
(Settings) S
0 -121.4 M
(\240\240\240\240) S
gsave
newpath
11 -122.5 M
16.5 0 RL
stroke
grestore
(3.3.) S
[/Rect [10.0 -124.149994 28.5 -112.049995] /Subtype /Link /Border [0 0 0] /Dest /14 /ANN pdfmark
(\240 Functions for Elliptic-Curve ) S
(Settings) S
0 -134.6 M
gsave
newpath
0 -135.7 M
8.25 0 RL
stroke
grestore
(4.) S
[/Rect [-1.0 -137.349991 9.25 -125.249992] /Subtype /Link /Border [0 0 0] /Dest /16 /ANN pdfmark
(\240 IANA ) S
(Considerations) S
0 -147.8 M
gsave
newpath
0 -148.9 M
8.25 0 RL
stroke
grestore
(5.) S
[/Rect [-1.0 -150.549988 9.25 -138.449982] /Subtype /Link /Border [0 0 0] /Dest /18 /ANN pdfmark
(\240 Security ) S
(Considerations) S
0 -161 M
(\240\240\240\240) S
gsave
newpath
11 -162.1 M
16.5 0 RL
stroke
grestore
(5.1.) S
[/Rect [10.0 -163.749985 28.5 -151.649979] /Subtype /Link /Border [0 0 0] /Dest /20 /ANN pdfmark
(\240 General Implementation ) S
(Considerations) S
0 -174.2 M
(\240\240\240\240) S
gsave
newpath
11 -175.3 M
16.5 0 RL
stroke
grestore
(5.2.) S
[/Rect [10.0 -176.949982 28.5 -164.849976] /Subtype /Link /Border [0 0 0] /Dest /22 /ANN pdfmark
(\240 Cryptographic Assumptions and ) S
(Considerations) S
0 -187.4 M
gsave
newpath
0 -188.5 M
8.25 0 RL
stroke
grestore
(6.) S
[/Rect [-1.0 -190.149979 9.25 -178.049973] /Subtype /Link /Border [0 0 0] /Dest /24 /ANN pdfmark
(\240 Notice on intellectual ) S
(properties) S
0 -200.6 M
gsave
newpath
0 -201.7 M
8.25 0 RL
stroke
grestore
(7.) S
[/Rect [-1.0 -203.349976 9.25 -191.249969] /Subtype /Link /Border [0 0 0] /Dest /28 /ANN pdfmark
(\240 ) S
(References) S
0 -213.8 M
(\240\240\240\240) S
gsave
newpath
11 -214.9 M
16.5 0 RL
stroke
grestore
(7.1.) S
[/Rect [10.0 -216.549973 28.5 -204.449966] /Subtype /Link /Border [0 0 0] /Dest /28 /ANN pdfmark
(\240 Normative ) S
(References) S
0 -227 M
(\240\240\240\240) S
gsave
newpath
11 -228.1 M
16.5 0 RL
stroke
grestore
(7.2.) S
[/Rect [10.0 -229.749969 28.5 -217.649963] /Subtype /Link /Border [0 0 0] /Dest /34 /ANN pdfmark
(\240 Informative ) S
(References) S
0 -240.2 M
gsave
newpath
0 -241.3 M
56.8203125 0 RL
stroke
grestore
(Appendix\240A.) S
[/Rect [-1.0 -242.949966 57.8203125 -230.84996] /Subtype /Link /Border [0 0 0] /Dest /37 /ANN pdfmark
(\240 \(Informative\) Group Parameters for Discrete-Logarithm Based ) S
(Algorithms) S
0 -253.4 M
gsave
newpath
0 -254.5 M
56.2148438 0 RL
stroke
grestore
(Appendix\240B.) S
[/Rect [-1.0 -256.149963 57.2148438 -244.049957] /Subtype /Link /Border [0 0 0] /Dest /39 /ANN pdfmark
(\240 \(Informative\) Derived Numerical ) S
(Values) S
0 -266.6 M
gsave
newpath
0 -267.7 M
56.2148438 0 RL
stroke
grestore
(Appendix\240C.) S
[/Rect [-1.0 -269.349976 57.2148438 -257.249969] /Subtype /Link /Border [0 0 0] /Dest /41 /ANN pdfmark
(\240 \(Informative\) Draft Change ) S
(Log) S
0 -279.8 M
(\240\240\240\240) S
gsave
newpath
11 -280.9 M
18.3359375 0 RL
stroke
grestore
(C.1.) S
[/Rect [10.0 -282.55 30.3359375 -270.449982] /Subtype /Link /Border [0 0 0] /Dest /43 /ANN pdfmark
(\240 Changes in HTTPAUTH-WG revision ) S
(02) S
0 -293 M
(\240\240\240\240) S
gsave
newpath
11 -294.1 M
18.3359375 0 RL
stroke
grestore
(C.2.) S
[/Rect [10.0 -295.75 30.3359375 -283.65] /Subtype /Link /Border [0 0 0] /Dest /45 /ANN pdfmark
(\240 Changes in HTTPAUTH-WG revision ) S
(01) S
0 -306.2 M
(\240\240\240\240) S
gsave
newpath
11 -307.3 M
18.3359375 0 RL
stroke
grestore
(C.3.) S
[/Rect [10.0 -308.95 30.3359375 -296.85] /Subtype /Link /Border [0 0 0] /Dest /47 /ANN pdfmark
(\240 Changes in HTTPAUTH-WG revision ) S
(00) S
0 -319.4 M
(\240\240\240\240) S
gsave
newpath
11 -320.5 M
18.3359375 0 RL
stroke
grestore
(C.4.) S
[/Rect [10.0 -322.150024 30.3359375 -310.050018] /Subtype /Link /Border [0 0 0] /Dest /49 /ANN pdfmark
(\240 Changes in HTTPAUTH revision ) S
(02) S
0 -332.6 M
(\240\240\240\240) S
gsave
newpath
11 -333.7 M
18.3359375 0 RL
stroke
grestore
(C.5.) S
[/Rect [10.0 -335.350037 30.3359375 -323.250031] /Subtype /Link /Border [0 0 0] /Dest /51 /ANN pdfmark
(\240 Changes in HTTPAUTH revision ) S
(01) S
0 -345.8 M
(\240\240\240\240) S
gsave
newpath
11 -346.9 M
18.3359375 0 RL
stroke
grestore
(C.6.) S
[/Rect [10.0 -348.550049 30.3359375 -336.450043] /Subtype /Link /Border [0 0 0] /Dest /53 /ANN pdfmark
(\240 Changes in revision ) S
(02) S
0 -359 M
(\240\240\240\240) S
gsave
newpath
11 -360.1 M
18.3359375 0 RL
stroke
grestore
(C.7.) S
[/Rect [10.0 -361.750061 30.3359375 -349.650055] /Subtype /Link /Border [0 0 0] /Dest /55 /ANN pdfmark
(\240 Changes in revision ) S
(01) S
0 -372.2 M
(\240\240\240\240) S
gsave
newpath
11 -373.3 M
18.3359375 0 RL
stroke
grestore
(C.8.) S
[/Rect [10.0 -374.950073 30.3359375 -362.850067] /Subtype /Link /Border [0 0 0] /Dest /57 /ANN pdfmark
(\240 Changes in revision ) S
(00) S
0 -385.4 M
gsave
newpath
0 -386.5 M
5.5 0 RL
stroke
grestore
(\247) S
[/Rect [-1.0 -388.150085 6.5 -376.050079] /Subtype /Link /Border [0 0 0] /Dest /59 /ANN pdfmark
(\240 Authors' ) S
(Addresses) S
0 -396.4 M
[/View [/XYZ -4 360.599915 null] /Dest /2 /DEST pdfmark
0 -396.4 M
[/View [/XYZ -4 360.599915 null] /Dest /3 /DEST pdfmark
0 -415.4 M
15 2 Nf
(1.) S
[/View [/XYZ -4 359.599915 null] /Dest /65 /DEST pdfmark
( ) S
(Introduction) S
0 -439.6 M
11 0 Nf
0.15234375 0 32 0 0 (This document specifies some algorithms for ) A
gsave
newpath
201.9 -440.7 M
252.113281 0 RL
stroke
grestore
0.15234375 0 32 0 0 (Mutual authentication protocol for Hyper-Text Transport) A
[/Rect [200.886719 -442.350098 455.0 -430.250092] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
0 -452.8 M
gsave
newpath
0 -453.9 M
43.5065117 0 RL
stroke
grestore
3.4908855 0 32 0 0 (Protocol ) A
gsave
newpath
43.5 -453.9 M
34.8125 0 RL
stroke
grestore
3.4908855 0 32 0 0 (\(HTTP\)) A
[/Rect [-1.0 -455.55011 79.3164062 -443.450104] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
3.4908855 0 32 0 0 ( [I-D.ietf-httpauth-mutual]. The algorithms are based on so-called "Augmented) A
0 -466 M
1.15507817 0 32 0 0 (Password-based Authenticated Key Exchange" \(Augmented PAKE\) techniques. In particular, it uses) A
0 -479.2 M
1.26032364 0 32 0 0 (one of three key exchange algorithm defined in the ) A
gsave
newpath
238.2 -480.3 M
215.735214 0 RL
stroke
grestore
1.26032364 0 32 0 0 (ISO 11770-4: "Key management - Mechanisms) A
[/Rect [237.242188 -481.950134 454.964844 -469.850128] /Subtype /Link /Border [0 0 0] /Dest /35 /ANN pdfmark
0 -492.4 M
gsave
newpath
0 -493.5 M
67.5 0 RL
stroke
grestore
(based on weak ) S
gsave
newpath
67.5 -493.5 M
34.4023438 0 RL
stroke
grestore
(secrets") S
[/Rect [-1.0 -495.150146 102.902344 -483.05014] /Subtype /Link /Border [0 0 0] /Dest /35 /ANN pdfmark
( [ISO.11770-4.2006] as a basis. ) S
0 -516.6 M
11 0 Nf
0.210798 0 32 0 0 (In very brief summary, the Mutual authentication protocol exchanges four values, ) A
0.210798 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.210798 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.210798 0 32 0 0 (, ) A
0.210798 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.210798 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.210798 0 32 0 0 (, ) A
0.210798 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.210798 0 32 0 0 (c) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.210798 0 32 0 0 ( and ) A
0.0 -2.2 RM
0 -532 M
11 0 Nf
4.45524073 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
4.45524073 0 32 0 0 (s) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
4.45524073 0 32 0 0 (, to perform authenticated key exchanges, using the password-derived secret pi and its) A
0.0 -2.2 RM
0 -547.4 M
11 0 Nf
0.807128906 0 32 0 0 ("augmented version" J\(pi\). This document defines the set of functions ) A
0.807128906 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.807128906 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.807128906 0 32 0 0 (, ) A
0.807128906 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.807128906 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.807128906 0 32 0 0 (, and J for a specific) A
0.0 -2.2 RM
0 -562.8 M
(algorithm family. ) S
0 -587 M
1.4453125 0 32 0 0 (Please note that, from the view of cryptographic literature, the original functionality of Augmented) A
0 -600.2 M
11 0 Nf
0.963120401 0 32 0 0 (PAKE is separated into the functions ) A
0.963120401 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.963120401 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.963120401 0 32 0 0 ( and ) A
0.963120401 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.963120401 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.963120401 0 32 0 0 ( defined in this draft, and the functions ) A
0.963120401 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.963120401 0 32 0 0 (c) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.963120401 0 32 0 0 ( and ) A
0.0 -2.2 RM
0 -615.6 M
11 0 Nf
1.75435698 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.75435698 0 32 0 0 (s) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
1.75435698 0 32 0 0 ( defined in Section 11 of ) A
gsave
newpath
143.5 -616.7 M
113.898438 0 RL
stroke
grestore
1.75435698 0 32 0 0 ([I-D.ietf-httpauth-mutual]) A
[/Rect [142.533203 -618.350281 258.431641 -606.250305] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
1.75435698 0 32 0 0 ( as "default functions". For the purpose of) A
0.0 -2.2 RM
0 -631 M
(security analysis, please also refer to these functions. ) S
0 -631 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 2 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 3 3
%%PageResources: font Times-Roman Times-Bold Courier Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /4 /DEST pdfmark
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /5 /DEST pdfmark
0 -15.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(1.1.) S
[/View [/XYZ -4 757.0 null] /Dest /66 /DEST pdfmark
( ) S
(Terminology) S
0 -39.8 M
%%IncludeResource: font Times-Roman
11 0 Nf
2.37011719 0 32 0 0 (The key words "MUST", "MUST\240NOT", "REQUIRED", "SHALL", "SHALL\240NOT", "SHOULD",) A
0 -53 M
1.49739587 0 32 0 0 ("SHOULD\240NOT", "RECOMMENDED", "NOT\240RECOMMENDED", "MAY", and "OPTIONAL" in) A
0 -66.2 M
(this document are to be interpreted as described in ) S
gsave
newpath
223.9 -67.3 M
50.1054688 0 RL
stroke
grestore
([RFC2119]) S
[/Rect [222.863281 -68.9500046 274.96875 -56.8500061] /Subtype /Link /Border [0 0 0] /Dest /32 /ANN pdfmark
(.) S
0 -90.4 M
2.9309895 0 32 0 0 (The term "natural numbers" refers to the non-negative integers \(including zero\) throughout this ) A
0 -103.6 M
(document.) S
0 -127.8 M
0.861886144 0 32 0 0 (This document treats target \(codomain\) of hash functions to be octet strings. The notation INT\(H\(s\)\)) A
0 -141 M
(gives a natural-number output of hash function H applied to string ) S
(s.) S
0 -152 M
[/View [/XYZ -4 605.0 null] /Dest /6 /DEST pdfmark
0 -152 M
[/View [/XYZ -4 605.0 null] /Dest /7 /DEST pdfmark
0 -171 M
15 2 Nf
(2.) S
[/View [/XYZ -4 604.0 null] /Dest /67 /DEST pdfmark
( Cryptographic Overview ) S
(\(Non-normative\)) S
0 -195.2 M
11 0 Nf
1.23158479 0 32 0 0 (The cryptographic primitive used in this algorithm specification is based on a variant of augmented) A
0 -208.4 M
2.88216138 0 32 0 0 (PAKE proposed by T. Kwon, called APKAS-AMP, originally submitted to IEEE P1363.2. The) A
0 -221.6 M
0.141741067 0 32 0 0 (general flow of the successful exchange is shown below, for informative purposes only. The DL-based) A
0 -234.8 M
(notations are used, and all group operations \(mod q and mod r\) are omitted. ) S
0 -259 M
4.06863832 0 32 0 0 (Note that the only messages corresponding to the earlier two exchanges are defined in this) A
0 -272.2 M
8.512784 0 32 0 0 (specification. Those for latter two exchanges are defined in the main specification ) A
0 -285.4 M
gsave
newpath
0 -286.5 M
113.898438 0 RL
stroke
grestore
([I-D.ietf-httpauth-mutual]) S
[/Rect [-1.0 -288.150024 114.898438 -276.050018] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
(. ) S
0 -307.2 M
%%IncludeResource: font Courier
9.0 4 Nf
(   C: S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = random) S
0.0 -1.8 RM
0 -319.8 M
9.0 4 Nf
(   C: K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = g^\(S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)) S
0.0 -1.8 RM
0 -332.4 M
9.0 4 Nf
(                    ----- ID, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( ----->) S
0.0 -1.8 RM
0 -345 M
9.0 4 Nf
(   C: t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H1\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)                S: t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H1\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)) S
0.0 -1.8 RM
0 -357.6 M
(                                    S: fetch J = g^pi by ID) S
0 -368.4 M
9.0 4 Nf
(                                    S: S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = random) S
0.0 -1.8 RM
0 -381 M
9.0 4 Nf
(                                    S: K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = \(J * K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(^\(t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)\)^\(S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)) S
0.0 -1.8 RM
0 -393.6 M
9.0 4 Nf
(                    <----- K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( -----) S
0.0 -1.8 RM
0 -406.2 M
9.0 4 Nf
(   C: t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(2) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H2\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)          S: t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(2) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H2\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)) S
0.0 -1.8 RM
0 -418.8 M
9.0 4 Nf
(   C: z = K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(^\(\(S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( + t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(2) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\) / \(S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( * t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( + pi\)\)) S
0.0 -1.8 RM
0 -431.4 M
9.0 4 Nf
(                                    S: z' = \(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( * g^\(t) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(2) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)\)^\(S) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(\)) S
0.0 -1.8 RM
0 -444 M
(   \(assumption at this point: z = z' if authentication succeeded\)) S
0 -465.6 M
9.0 4 Nf
(   C: VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H4\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, z\)      S: VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(' = H4\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, z'\)) S
0.0 -1.8 RM
0 -478.2 M
9.0 4 Nf
(                    ----- VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( ------->) S
0.0 -1.8 RM
0 -490.8 M
9.0 4 Nf
(                                    S: assert\(VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
('\)) S
0.0 -1.8 RM
0 -514.2 M
9.0 4 Nf
(   C: VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(' = H3\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, z\)     S: VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = H3\(K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(c1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, K) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s1) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
(, z'\)) S
0.0 -1.8 RM
0 -526.8 M
9.0 4 Nf
(                    <----- VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( ------) S
0.0 -1.8 RM
0 -539.4 M
9.0 4 Nf
(   C: assert\(VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
( = VK) S
2.1 0.0 RM
0.0 -1.8 RM
6.84653 4 Nf
(s) S
0.0 1.8 RM
2.7 0.0 RM
9.0 4 Nf
('\)) S
0.0 -1.8 RM
0 -550.2 M
[/View [/XYZ -4 206.799988 null] /Dest /8 /DEST pdfmark
0 -550.2 M
[/View [/XYZ -4 206.799988 null] /Dest /9 /DEST pdfmark
0 -571.2 M
15 2 Nf
(3.) S
[/View [/XYZ -4 203.799988 null] /Dest /68 /DEST pdfmark
( Authentication ) S
(Algorithms) S
0 -595.4 M
11 0 Nf
0.81640625 0 32 0 0 (This document specifies only one family of the authentication algorithm. The family consists of four) A
0 -608.6 M
2.23366475 0 32 0 0 (authentication algorithms, which only differ in their underlying mathematical groups and security) A
0 -621.8 M
(parameters. The algorithms do not add any additional parameters. The tokens for these algorithms ) S
(are) S
0 -632.8 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 3 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 4 4
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
11 -9.6 M
gsave
0 setgray
newpath
11.0 -9.57000065 2.75 0 360 arc
closepath
fill
grestore
22 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
2.421875 0 32 0 0 (iso-kam3-dl-2048-sha256: for the 2048-bit discrete-logarithm setting with the SHA-256 hash) A
22 -26.4 M
(function. ) S
11 -37 M
gsave
0 setgray
newpath
11.0 -36.97 2.75 0 360 arc
closepath
fill
grestore
22 -40.6 M
2.421875 0 32 0 0 (iso-kam3-dl-4096-sha512: for the 4096-bit discrete-logarithm setting with the SHA-512 hash) A
22 -53.8 M
(function. ) S
11 -64.4 M
gsave
0 setgray
newpath
11.0 -64.37 2.75 0 360 arc
closepath
fill
grestore
22 -68 M
2.0859375 0 32 0 0 (iso-kam3-ec-p256-sha256: for the 256-bit prime-field elliptic-curve setting with the SHA-256) A
22 -81.2 M
(hash function. ) S
11 -91.8 M
gsave
0 setgray
newpath
11.0 -91.77 2.75 0 360 arc
closepath
fill
grestore
22 -95.4 M
2.0859375 0 32 0 0 (iso-kam3-ec-p521-sha512: for the 521-bit prime-field elliptic-curve setting with the SHA-512) A
22 -108.6 M
(hash ) S
(function.) S
0 -132.8 M
1.56119788 0 32 0 0 (For discrete-logarithm settings, the underlying groups are the 2048-bit and 4096-bit MODP groups) A
0 -146 M
1.51412261 0 32 0 0 (defined in ) A
gsave
newpath
50.1 -147.1 M
50.1054688 0 RL
stroke
grestore
1.51412261 0 32 0 0 ([RFC3526]) A
[/Rect [49.0585938 -148.749985 101.164062 -136.649979] /Subtype /Link /Border [0 0 0] /Dest /33 /ANN pdfmark
1.51412261 0 32 0 0 (, respectively. See ) A
gsave
newpath
187.5 -147.1 M
54.0703125 0 RL
stroke
grestore
1.51412261 0 32 0 0 (Appendix\240A) A
[/Rect [186.460938 -148.749985 242.53125 -136.649979] /Subtype /Link /Border [0 0 0] /Dest /37 /ANN pdfmark
1.51412261 0 32 0 0 ( for the exact specifications of the groups and) A
0 -159.2 M
0.0911458358 0 32 0 0 (associated parameters. The hash functions H are SHA-256 for the 2048-bit group and SHA-512 for the) A
0 -172.4 M
0.439778656 0 32 0 0 (4096-bit group, respectively, defined in ) A
gsave
newpath
179 -173.5 M
49.7701836 0 RL
stroke
grestore
0.439778656 0 32 0 0 (FIPS PUB ) A
gsave
newpath
228.8 -173.5 M
25.6601562 0 RL
stroke
grestore
0.439778656 0 32 0 0 (180-2) A
[/Rect [178.035156 -175.149979 255.460938 -163.049973] /Subtype /Link /Border [0 0 0] /Dest /29 /ANN pdfmark
0.439778656 0 32 0 0 ( [FIPS.180-2.2002]. The hash iteration count) A
0 -185.6 M
(nIterPi is 16384. The representation of the parameters kc1, ks1, vkc, and vks is base64-fixed-number. ) S
0 -209.8 M
0.172916666 0 32 0 0 (For the elliptic-curve settings, the underlying groups are the elliptic curves over the prime fields P-256) A
0 -223 M
3.006392 0 32 0 0 (and P-521, respectively, specified in the appendix\240D.1.2 of ) A
gsave
newpath
285.2 -224.1 M
54.9034081 0 RL
stroke
grestore
3.006392 0 32 0 0 (FIPS PUB ) A
gsave
newpath
340.1 -224.1 M
25.6601562 0 RL
stroke
grestore
3.006392 0 32 0 0 (186-4) A
[/Rect [284.179688 -225.749969 366.738281 -213.649963] /Subtype /Link /Border [0 0 0] /Dest /30 /ANN pdfmark
3.006392 0 32 0 0 ( [FIPS.186-4.2013]) A
0 -236.2 M
0.460156262 0 32 0 0 (specification. The hash functions H, which are referenced by the core document, are SHA-256 for the) A
0 -249.4 M
0.219970703 0 32 0 0 (P-256 curve and SHA-512 for the P-521 curve, respectively. Cofactors of these curves are 1. The hash) A
0 -262.6 M
2.67630219 0 32 0 0 (iteration count nIterPi is 16384. The representation of the parameters kc1, ks1, vkc, and vks is) A
0 -275.8 M
(hex-fixed-number. ) S
0 -300 M
0.763281226 0 32 0 0 ([[Editorial Note: remove before submission] We should take a care on recent hot discussion topic on) A
0 -313.2 M
(the choice of elliptic curves for cryptography.]] ) S
0 -337.4 M
0.408203125 0 32 0 0 (Note: This algorithm is based on the Key Agreement Mechanism 3 \(KAM3\) defined in Section 6.3 of ) A
0 -350.6 M
gsave
newpath
0 -351.7 M
49.4101562 0 RL
stroke
grestore
8.17578125 0 32 0 0 (ISO/IEC ) A
gsave
newpath
49.4 -351.7 M
36.6601562 0 RL
stroke
grestore
8.17578125 0 32 0 0 (11770-4) A
[/Rect [-1.0 -353.350037 87.0703125 -341.250031] /Subtype /Link /Border [0 0 0] /Dest /35 /ANN pdfmark
8.17578125 0 32 0 0 ( [ISO.11770-4.2006] with a few modifications/improvements. However,) A
0 -363.8 M
1.37469947 0 32 0 0 (implementers should use this document as the normative reference, because the algorithm has been) A
0 -377 M
(changed in several minor details as well as major improvements. ) S
0 -388 M
[/View [/XYZ -4 368.999939 null] /Dest /10 /DEST pdfmark
0 -388 M
[/View [/XYZ -4 368.999939 null] /Dest /11 /DEST pdfmark
0 -403.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(3.1.) S
[/View [/XYZ -4 368.999939 null] /Dest /69 /DEST pdfmark
( Support Functions and ) S
(Notations) S
0 -427.8 M
11 0 Nf
(The algorithm definitions use several support functions and notations defined ) S
(below:) S
0 -452 M
(The integers in the specification are in decimal, or in hexadecimal when prefixed with ) S
("0x".) S
0 -476.2 M
3.04507208 0 32 0 0 (The functions named octet\(\), OCTETS\(\), and INT\(\) are those defined in the ) A
gsave
newpath
373.1 -477.3 M
24.7208538 0 RL
stroke
grestore
3.04507208 0 32 0 0 (core ) A
gsave
newpath
397.8 -477.3 M
56.1875 0 RL
stroke
grestore
3.04507208 0 32 0 0 (specification) A
[/Rect [372.066406 -478.950104 454.972656 -466.850098] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
3.04507208 0 32 0 0 ( ) A
0 -489.4 M
([I-D.ietf-httpauth-mutual].) S
0 -513.6 M
2.67103791 0 32 0 0 (Note: The definition of OCTETS\(\) is different from the function GE2OS_x in the original ISO) A
0 -526.8 M
(specification, which takes the shortest representation without preceding zeros. ) S
0 -551 M
2.79947925 0 32 0 0 (All of the algorithms defined in this specification use the default functions defined in the core) A
0 -564.2 M
11 0 Nf
1.15966797 0 32 0 0 (specification \(defined in Section 11 of ) A
gsave
newpath
178 -565.3 M
113.898438 0 RL
stroke
grestore
1.15966797 0 32 0 0 ([I-D.ietf-httpauth-mutual]) A
[/Rect [176.96875 -566.950134 292.867188 -554.850159] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
1.15966797 0 32 0 0 (\) for computing the values pi, ) A
1.15966797 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.15966797 0 32 0 0 (c) A
0.0 2.2 RM
1.5 0.0 RM
0.0 -2.2 RM
0 -579.6 M
11 0 Nf
(and ) S
(VK) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(.) S
0.0 -2.2 RM
0 -592.8 M
[/View [/XYZ -4 164.199829 null] /Dest /12 /DEST pdfmark
0 -592.8 M
[/View [/XYZ -4 164.199829 null] /Dest /13 /DEST pdfmark
0 -608.4 M
13 2 Nf
(3.2.) S
[/View [/XYZ -4 164.199829 null] /Dest /70 /DEST pdfmark
( Functions for Discrete-Logarithm ) S
(Settings) S
0 -632.6 M
11 0 Nf
0.519886374 0 32 0 0 (In this section, an equation \(x / y mod z\) denotes a natural number w less than z that satisfies \(w * y\)) A
0 -645.8 M
(mod z = x mod z. ) S
0 -645.8 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 4 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 5 5
%%PageResources: font Times-Roman Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
0.05 0 32 0 0 (For the discrete-logarithm, we refer to some of the domain parameters by using the following symbols: ) A
11 -33.8 M
gsave
0 setgray
newpath
11.0 -33.77 2.75 0 360 arc
closepath
fill
grestore
22 -37.4 M
(q: for "the prime" defining the MODP group. ) S
11 -48 M
gsave
0 setgray
newpath
11.0 -47.97 2.75 0 360 arc
closepath
fill
grestore
22 -51.6 M
(g: for "the generator" associated with the group. ) S
11 -62.2 M
gsave
0 setgray
newpath
11.0 -62.170002 2.75 0 360 arc
closepath
fill
grestore
22 -65.8 M
(r: for the order of the subgroup generated by ) S
(g.) S
0 -90 M
(The function J is defined as ) S
0 -114.2 M
(J\(pi\) = g^\(pi\) mod q. ) S
0 -138.4 M
11 0 Nf
(The value of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( is derived as ) S
0.0 -2.2 RM
0 -164.8 M
11 0 Nf
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = ) S
(g^\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) mod q, ) S
0.0 -2.2 RM
0 -191.2 M
11 0 Nf
0.157645091 0 32 0 0 (where ) A
0.157645091 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.157645091 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.157645091 0 32 0 0 ( is a random integer within range [1, r-1] and r is the size of the subgroup generated by g. In) A
0.0 -2.2 RM
0 -206.6 M
11 0 Nf
(addition, ) S
(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( MUST be larger than log\(q\)/log\(g\) \(so that ) S
(g^\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) > q\). ) S
0.0 -2.2 RM
0 -233 M
11 0 Nf
2.4149816 0 32 0 0 (The value of ) A
2.4149816 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
2.4149816 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
2.4149816 0 32 0 0 ( SHALL satisfy 1 < ) A
2.4149816 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
2.4149816 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
2.4149816 0 32 0 0 ( < q-1. The server MUST check this condition upon) A
0.0 -2.2 RM
0 -248.4 M
(reception. ) S
0 -272.6 M
11 0 Nf
(Let an intermediate value ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( be ) S
0.0 -2.2 RM
0 -299 M
11 0 Nf
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = INT\(H\(octet\(1\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)\), ) S
0.0 -2.2 RM
0 -325.4 M
11 0 Nf
(the value of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( is derived from J\(pi\) and ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( as: ) S
0.0 -2.2 RM
0 -351.8 M
11 0 Nf
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = \(J\(pi\) * ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(^\(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)^\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) mod q ) S
0.0 -2.2 RM
0 -378.2 M
11 0 Nf
0.092726931 0 32 0 0 (where ) A
0.092726931 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.092726931 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.092726931 0 32 0 0 ( is a random number within range [1, r-1]. The value of ) A
0.092726931 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.092726931 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.092726931 0 32 0 0 ( MUST satisfy 1 < ) A
0.092726931 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.092726931 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.092726931 0 32 0 0 ( < q-1. If) A
0.0 -2.2 RM
0 -393.6 M
0.0837402344 0 32 0 0 (this condition is not held, the server MUST reject the exchange. The client MUST check this condition) A
0 -406.8 M
(upon reception. ) S
0 -431 M
11 0 Nf
(Let an intermediate value ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( be ) S
0.0 -2.2 RM
0 -457.4 M
11 0 Nf
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = INT\(H\(octet\(2\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)\), ) S
0.0 -2.2 RM
0 -483.8 M
(the value z on the client side is derived by the following equation: ) S
0 -508 M
11 0 Nf
(z = ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(^\(\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( + ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) / ) S
(\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( * ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( + pi\) mod r\) mod q. ) S
0.0 -2.2 RM
0 -534.4 M
(The value z on the server side is derived by the following equation: ) S
0 -558.6 M
11 0 Nf
(z = ) S
(\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( * ) S
(g^\(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)^\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) mod q. ) S
0.0 -2.2 RM
0 -585 M
0.317522317 0 32 0 0 (\(Note: the original ISO specification contained a message pair containing verification of value z along) A
0 -598.2 M
2.38333344 0 32 0 0 (with the "transcript" of the protocol exchange. The functionality of this kind is contained in the) A
0 -611.4 M
11 0 Nf
(functions ) S
(VK) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( and ) S
(VK) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(.\)) S
0.0 -2.2 RM
0 -624.6 M
[/View [/XYZ -4 132.399963 null] /Dest /14 /DEST pdfmark
0 -624.6 M
[/View [/XYZ -4 132.399963 null] /Dest /15 /DEST pdfmark
0 -624.6 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 5 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 6 6
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -15.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(3.3.) S
[/View [/XYZ -4 757.0 null] /Dest /71 /DEST pdfmark
( Functions for Elliptic-Curve ) S
(Settings) S
0 -39.8 M
%%IncludeResource: font Times-Roman
11 0 Nf
(For the elliptic-curve setting, we refer to some of the domain parameters by the following symbols: ) S
11 -60.4 M
gsave
0 setgray
newpath
11.0 -60.3700027 2.75 0 360 arc
closepath
fill
grestore
22 -64 M
(q: for the prime used to define the group. ) S
11 -74.6 M
gsave
0 setgray
newpath
11.0 -74.57 2.75 0 360 arc
closepath
fill
grestore
22 -78.2 M
(G: for the defined point called the generator. ) S
11 -88.8 M
gsave
0 setgray
newpath
11.0 -88.77 2.75 0 360 arc
closepath
fill
grestore
22 -92.4 M
(h: for the cofactor of the group. ) S
11 -103 M
gsave
0 setgray
newpath
11.0 -102.969994 2.75 0 360 arc
closepath
fill
grestore
22 -106.6 M
(r: for the order of the subgroup generated by ) S
(G.) S
0 -130.8 M
0.547080576 0 32 0 0 (The function P\(p\) converts a curve point p into an integer representing point p, by computing x * 2 +) A
0 -144 M
1.34505212 0 32 0 0 (\(y mod 2\), where \(x, y\) are the coordinates of point p. P'\(z\) is the inverse of function P, that is, it) A
0 -157.2 M
2.06347656 0 32 0 0 (converts an integer z to a point p that satisfies P\(p\) = z. If such p exists, it is uniquely defined.) A
0 -170.4 M
0.799218774 0 32 0 0 (Otherwise, z does not represent a valid curve point. The operator + indicates the elliptic-curve group) A
0 -183.6 M
0.0770970359 0 32 0 0 (operation, and the operation [x] * p denotes an integer-multiplication of point p: it calculates p + p + ...) A
0 -196.8 M
1.2265625 0 32 0 0 (\(x times\) ... + p. See the literatures on elliptic-curve cryptography for the exact algorithms used for) A
0 -210 M
11 0 Nf
0.959284842 0 32 0 0 (those functions \(e.g. Section 3 of ) A
gsave
newpath
153.6 -211.1 M
50.1054688 0 RL
stroke
grestore
0.959284842 0 32 0 0 ([RFC6090]) A
[/Rect [152.578125 -212.749969 204.683594 -200.649963] /Subtype /Link /Border [0 0 0] /Dest /36 /ANN pdfmark
0.959284842 0 32 0 0 (, which uses different notations, though.\) ) A
0.959284842 0 32 0 0 (0) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.959284842 0 32 0 0 (E) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.959284842 0 32 0 0 ( represents) A
0.0 -2.2 RM
0 -225.4 M
0.209635422 0 32 0 0 (the infinity point. The equation \(x / y mod z\) denotes a natural number w less than z that satisfies \(w *) A
0 -238.6 M
(y\) mod z = x mod z. ) S
0 -262.8 M
(The function J is defined as ) S
0 -287 M
(J\(pi\) = [pi] * G. ) S
0 -311.2 M
11 0 Nf
(The value of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( is derived as ) S
0.0 -2.2 RM
0 -337.6 M
11 0 Nf
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = ) S
(P\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
('\), where ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(' = ) S
([S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(] * G, ) S
0.0 -2.2 RM
0 -364 M
11 0 Nf
0.393663198 0 32 0 0 (where ) A
0.393663198 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.393663198 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.393663198 0 32 0 0 ( is a random number within range [1, r-1]. The value of ) A
0.393663198 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.393663198 0 32 0 0 (c1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.393663198 0 32 0 0 ( MUST represent a valid curve) A
0.0 -2.2 RM
0 -379.4 M
11 0 Nf
(point, and [h] * ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(' SHALL\240NOT be ) S
(0) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(E) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(. The server MUST check this condition upon reception. ) S
0.0 -2.2 RM
0 -405.8 M
11 0 Nf
(Let an intermediate integer ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( be ) S
0.0 -2.2 RM
0 -432.2 M
11 0 Nf
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = INT\(H\(octet\(1\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)\), ) S
0.0 -2.2 RM
0 -458.6 M
11 0 Nf
(the value of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( is derived from J\(pi\) and ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(' = ) S
(P'\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) as: ) S
0.0 -2.2 RM
0 -485 M
11 0 Nf
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = ) S
(P\([S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(] * \(J\(pi\) + ) S
([t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(] * ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
('\)\), ) S
0.0 -2.2 RM
0 -511.4 M
11 0 Nf
0.444878459 0 32 0 0 (where ) A
0.444878459 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.444878459 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.444878459 0 32 0 0 ( is a random number within range [1, r-1]. The value of ) A
0.444878459 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.444878459 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.444878459 0 32 0 0 ( MUST represent a valid curve) A
0.0 -2.2 RM
0 -526.8 M
11 0 Nf
1.17339408 0 32 0 0 (point and satisfy [h] * ) A
1.17339408 0 32 0 0 (P'\(K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.17339408 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
1.17339408 0 32 0 0 (\) <> ) A
1.17339408 0 32 0 0 (0) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.17339408 0 32 0 0 (E) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
1.17339408 0 32 0 0 (. If this condition is not satisfied, the server MUST reject the) A
0.0 -2.2 RM
0 -542.2 M
(exchange. The client MUST check this condition upon reception. ) S
0 -566.4 M
11 0 Nf
(Let an intermediate integer ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( be ) S
0.0 -2.2 RM
0 -592.8 M
11 0 Nf
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( = INT\(H\(octet\(2\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) | ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\)\), ) S
0.0 -2.2 RM
0 -619.2 M
(the value z on the client side is derived by the following equation: ) S
0 -630.2 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 6 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 7 7
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(z = ) S
(P\([\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( + ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) / ) S
(\(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( * ) S
(t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( + pi\) mod r] * ) S
(P'\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\)\). ) S
0.0 -2.2 RM
0 -39.6 M
(The value z on the server side is derived by the following equation: ) S
0 -63.8 M
11 0 Nf
(z = ) S
(P\([S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(] * ) S
(\(P'\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) + ) S
([t) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(2) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(] * G\)\). ) S
0.0 -2.2 RM
0 -77 M
[/View [/XYZ -4 680.0 null] /Dest /16 /DEST pdfmark
0 -77 M
[/View [/XYZ -4 680.0 null] /Dest /17 /DEST pdfmark
0 -96 M
%%IncludeResource: font Times-Bold
15 2 Nf
(4.) S
[/View [/XYZ -4 679.0 null] /Dest /72 /DEST pdfmark
( IANA ) S
(Considerations) S
0 -120.2 M
11 0 Nf
5.45859385 0 32 0 0 (Four tokens iso-kam3-dl-2048-sha256, iso-kam3-dl-4096-sha512, iso-kam3-ec-p256-sha256 and) A
0 -133.4 M
2.30436206 0 32 0 0 (iso-kam3-ec-p521-sha512 shall be allocated and registered according to the provision of the core) A
0 -146.6 M
(documentation when this document is promoted to an RFC. ) S
0 -170.8 M
(Note: More formal declarations will be added in the future drafts to meet the RFC 5226 requirements. ) S
0 -181.8 M
[/View [/XYZ -4 575.2 null] /Dest /18 /DEST pdfmark
0 -181.8 M
[/View [/XYZ -4 575.2 null] /Dest /19 /DEST pdfmark
0 -200.8 M
15 2 Nf
(5.) S
[/View [/XYZ -4 574.2 null] /Dest /73 /DEST pdfmark
( Security ) S
(Considerations) S
0 -225 M
11 0 Nf
4.87460947 0 32 0 0 (Refer the corresponding section of the core specification for algorithm-independent, generic) A
0 -238.2 M
(considerations, too. ) S
0 -249.2 M
[/View [/XYZ -4 507.800018 null] /Dest /20 /DEST pdfmark
0 -249.2 M
[/View [/XYZ -4 507.800018 null] /Dest /21 /DEST pdfmark
0 -264.8 M
13 2 Nf
(5.1.) S
[/View [/XYZ -4 507.800018 null] /Dest /74 /DEST pdfmark
( General Implementation ) S
(Considerations) S
11 -285.4 M
gsave
0 setgray
newpath
11.0 -285.37 2.75 0 360 arc
closepath
fill
grestore
22 -289 M
11 0 Nf
0.99202472 0 32 0 0 (During the exchange, the value ) A
0.99202472 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.99202472 0 32 0 0 (s) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.99202472 0 32 0 0 (, defined in ) A
gsave
newpath
244.2 -290.1 M
113.898438 0 RL
stroke
grestore
0.99202472 0 32 0 0 ([I-D.ietf-httpauth-mutual]) A
[/Rect [243.150391 -291.75 359.048828 -279.65] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
0.99202472 0 32 0 0 (, MUST only be sent) A
0.0 -2.2 RM
22 -304.4 M
11 0 Nf
1.9076823 0 32 0 0 (when the server has received a correct \(expected\) value of ) A
1.9076823 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.9076823 0 32 0 0 (c) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
1.9076823 0 32 0 0 (. This is a requirement from) A
0.0 -2.2 RM
22 -319.8 M
(underlying cryptography stated in ) S
gsave
newpath
173.5 -320.9 M
89.1953125 0 RL
stroke
grestore
([ISO.11770-4.2006]) S
[/Rect [172.5 -322.550018 263.695312 -310.45] /Subtype /Link /Border [0 0 0] /Dest /35 /ANN pdfmark
(. ) S
11 -330.4 M
gsave
0 setgray
newpath
11.0 -330.370026 2.75 0 360 arc
closepath
fill
grestore
22 -334 M
6.48011351 0 32 0 0 (All random numbers used in these algorithms MUST be at least cryptographically) A
22 -347.2 M
(computationally secure against forward and backward guessing attacks. ) S
11 -357.8 M
gsave
0 setgray
newpath
11.0 -357.77005 2.75 0 360 arc
closepath
fill
grestore
22 -361.4 M
4.10507822 0 32 0 0 (Computation times of all numerical operations on discrete-logarithm group elements and) A
22 -374.6 M
0.668269217 0 32 0 0 (elliptic-curve points MUST be normalized and made independent of the exact values, to prevent) A
22 -387.8 M
(timing-based side-channel ) S
(attacks.) S
0 -398.8 M
[/View [/XYZ -4 358.199921 null] /Dest /22 /DEST pdfmark
0 -398.8 M
[/View [/XYZ -4 358.199921 null] /Dest /23 /DEST pdfmark
0 -414.4 M
13 2 Nf
(5.2.) S
[/View [/XYZ -4 358.199921 null] /Dest /75 /DEST pdfmark
( Cryptographic Assumptions and ) S
(Considerations) S
0 -438.6 M
11 0 Nf
0.113970585 0 32 0 0 (The notices on this subsection is mostly for those who analyze the security of this algorithm, and those) A
0 -451.8 M
(who might want to make a derived work of this algorithm specification. ) S
11 -472.4 M
gsave
0 setgray
newpath
11.0 -472.370117 2.75 0 360 arc
closepath
fill
grestore
22 -476 M
11 0 Nf
1.02434897 0 32 0 0 (Handling of invalid ) A
1.02434897 0 32 0 0 (K) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
1.02434897 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
1.02434897 0 32 0 0 ( value in the exchange \(now: to reject the exchange\) has been changed) A
0.0 -2.2 RM
22 -491.4 M
11 0 Nf
0.47408855 0 32 0 0 (from original ISO specification \(original: to retry with another random ) A
0.47408855 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.47408855 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.47408855 0 32 0 0 ( value\). This is due to) A
0.0 -2.2 RM
22 -506.8 M
0.761197925 0 32 0 0 (an observation that this condition is less likely from the random error caused by unlucky choice) A
22 -520 M
11 0 Nf
2.4708426 0 32 0 0 (of ) A
2.4708426 0 32 0 0 (S) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
2.4708426 0 32 0 0 (s1) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
2.4708426 0 32 0 0 (, but more likely from the systematic failure from invalid J\(pi\) value, even implying) A
0.0 -2.2 RM
22 -535.4 M
(possible denial-of-service attacks. ) S
11 -546 M
gsave
0 setgray
newpath
11.0 -545.970154 2.75 0 360 arc
closepath
fill
grestore
22 -549.6 M
0.725260437 0 32 0 0 (The usual construction of authenticated key exchange algorithms are build from a key-exchange) A
22 -562.8 M
1.99386156 0 32 0 0 (period and a key verification period, and the latter usually involving some kind of exchange) A
22 -576 M
0.642578125 0 32 0 0 (transaction to be verified, to avoid security risks or vulnerabilities caused from mixing of values) A
22 -589.2 M
2.33569336 0 32 0 0 (from two or more key exchanges. In the design of the algorithms in this document, such a) A
22 -602.4 M
0.4765625 0 32 0 0 (functionality is defined in generalized manner in the core specification ) A
gsave
newpath
340.1 -603.5 M
113.898438 0 RL
stroke
grestore
0.4765625 0 32 0 0 ([I-D.ietf-httpauth-mutual]) A
[/Rect [339.101562 -605.150208 455.0 -593.050232] /Subtype /Link /Border [0 0 0] /Dest /31 /ANN pdfmark
22 -615.6 M
11 0 Nf
0.286865234 0 32 0 0 (\(see definitions of ) A
0.286865234 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.286865234 0 32 0 0 (c) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.286865234 0 32 0 0 ( and ) A
0.286865234 0 32 0 0 (VK) A
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
0.286865234 0 32 0 0 (s) A
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
0.286865234 0 32 0 0 (\). If any attempts to reuse the algorithm defined above with any) A
0.0 -2.2 RM
22 -631 M
(other protocols exist, care MUST be taken on that aspect. ) S
11 -641.6 M
gsave
0 setgray
newpath
11.0 -641.570251 2.75 0 360 arc
closepath
fill
grestore
22 -645.2 M
2.045573 0 32 0 0 (The domain parameters chosen and specified in this draft has a few assumptions. In the DL) A
22 -658.4 M
1.65011156 0 32 0 0 (setting, q has to be safe prime \([\(q - 1\) / 2] must also be prime\), and r should be the largest) A
22 -671.6 M
1.70136714 0 32 0 0 (possible value [\(q - 1\) / 2]. In the EC setting, r has to be prime. Defining a variation of this) A
22 -671.6 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 7 -) S
0 setgray
44 -8 M
grestore
pgsave restore N
%%Page: 8 8
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
22 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(algorithm using a different domain parameter SHOULD care about these conditions. ) S
0 -24.2 M
[/View [/XYZ -4 732.8 null] /Dest /24 /DEST pdfmark
0 -24.2 M
[/View [/XYZ -4 732.8 null] /Dest /25 /DEST pdfmark
0 -43.2 M
%%IncludeResource: font Times-Bold
15 2 Nf
(6.) S
[/View [/XYZ -4 731.8 null] /Dest /76 /DEST pdfmark
( Notice on intellectual ) S
(properties) S
0 -67.4 M
11 0 Nf
0.270432681 0 32 0 0 (The National Institute of Advanced Industrial Science and Technology \(AIST\) and Yahoo! Japan, Inc.) A
0 -80.6 M
0.311197907 0 32 0 0 (has jointly submitted a patent application on the protocol proposed in this documentation to the Patent) A
0 -93.8 M
0.16015625 0 32 0 0 (Office of Japan. The patent is intended to be open to any implementers of this protocol and its variants) A
0 -107 M
0.2734375 0 32 0 0 (under non-exclusive royalty-free manner. For the details of the patent application and its status, please) A
0 -120.2 M
(contact the author of this document. ) S
0 -144.4 M
1.08359373 0 32 0 0 (The elliptic-curve based authentication algorithms might involve several existing third-party patents.) A
0 -157.6 M
0.114889704 0 32 0 0 (The authors of the document take no position regarding the validity or scope of such patents, and other) A
0 -170.8 M
(patents as well. ) S
0 -181.8 M
[/View [/XYZ -4 575.2 null] /Dest /26 /DEST pdfmark
0 -181.8 M
[/View [/XYZ -4 575.2 null] /Dest /27 /DEST pdfmark
0 -200.8 M
15 2 Nf
(7.) S
[/View [/XYZ -4 574.2 null] /Dest /77 /DEST pdfmark
( ) S
(References) S
0 -208.3 M
[/View [/XYZ -4 548.7 null] /Dest /28 /DEST pdfmark
0 -226.8 M
13 2 Nf
(7.1.) S
[/View [/XYZ -4 545.800049 null] /Dest /78 /DEST pdfmark
( Normative ) S
(References) S
8 -254.1 M
11 0 Nf
([FIPS.180-2.2002]) S
[/View [/XYZ -4 842 null] /Dest /29 /DEST pdfmark
136.7 -254.1 M
(National Institute of Standards and Technology, ) S
(\233) S
gsave
newpath
355.7 -255.2 M
58.0234375 0 RL
stroke
grestore
(Secure Hash ) S
[/Rect [354.69455 -256.849976 414.718 -244.749985] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf)] Cd /ANN pdfmark
136.7 -267.3 M
gsave
newpath
136.7 -268.4 M
39.09375 0 RL
stroke
grestore
(Standard) S
[/Rect [135.698456 -270.05 176.792206 -257.949982] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf)] Cd /ANN pdfmark
(,\234 FIPS\240PUB 180-2, ) S
(August\2402002.) S
8 -289.1 M
([FIPS.186-4.2013]) S
[/View [/XYZ -4 842 null] /Dest /30 /DEST pdfmark
136.7 -289.1 M
(National Institute of Standards and Technology, ) S
(\233) S
gsave
newpath
355.7 -290.1 M
75.4414062 0 RL
stroke
grestore
(Digital Signature) S
[/Rect [354.69455 -291.8 432.135956 -279.699982] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf)] Cd /ANN pdfmark
136.7 -302.3 M
gsave
newpath
136.7 -303.4 M
41.84375 0 RL
stroke
grestore
(Standard ) S
gsave
newpath
178.5 -303.4 M
27.4882812 0 RL
stroke
grestore
(\(DSS\)) S
[/Rect [135.698456 -305.0 207.030487 -292.9] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf)] Cd /ANN pdfmark
(,\234 FIPS\240PUB 186-4, ) S
(July\2402013.) S
8 -313 M
0.989464402 0.989464402 scale

-0.0 -11.0 RM
([I-D.ietf-httpauth-mutual]) S
[/View [/XYZ -4 842 null] /Dest /31 /DEST pdfmark
1.01064777 1.01064777 scale

136.7 -324 M
(Oiwa, Y., Watanabe, H., Takagi, H., Maeda, K., Hayashi, T., and Y.) S
136.7 -337.2 M
(Ioku, ) S
(\233) S
gsave
newpath
167.2 -338.3 M
158.21875 0 RL
stroke
grestore
(Mutual Authentication Protocol for ) S
gsave
newpath
325.5 -338.3 M
27.4921875 0 RL
stroke
grestore
(HTTP) S
[/Rect [166.241425 -339.95 353.952362 -327.85] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-httpauth-mutual-04.txt)] Cd /ANN pdfmark
(,\234) S
136.7 -350.4 M
(draft-ietf-httpauth-mutual-04 \(work in progress\), ) S
(February\2402015.) S
8 -372.1 M
([RFC2119]) S
[/View [/XYZ -4 842 null] /Dest /32 /DEST pdfmark
136.7 -372.1 M
gsave
newpath
136.7 -373.2 M
40.921875 0 RL
stroke
grestore
(Bradner, ) S
gsave
newpath
177.6 -373.2 M
8.86328125 0 RL
stroke
grestore
(S.) S
(, ) S
(\233) S
gsave
newpath
196.9 -373.2 M
231.832031 0 RL
stroke
grestore
(Key words for use in RFCs to Indicate Requirement ) S
[/Rect [195.866425 -374.9 429.698456 -362.8] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2119)] Cd /ANN pdfmark
136.7 -385.4 M
gsave
newpath
136.7 -386.4 M
29.3164062 0 RL
stroke
grestore
(Levels) S
[/Rect [135.698456 -388.1 167.014862 -376.0] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2119)] Cd /ANN pdfmark
(,\234 BCP\24014, RFC\2402119, March\2401997 ) S
(\() S
gsave
newpath
327.3 -386.4 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [326.331268 -388.1 349.710175 -376.0] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc2119.txt)] Cd /ANN pdfmark
(, ) S
gsave
newpath
354.2 -386.4 M
31.15625 0 RL
stroke
grestore
(HTML) S
[/Rect [353.210175 -388.1 386.366425 -376.0] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/html/rfc2119.html)] Cd /ANN pdfmark
(, ) S
gsave
newpath
390.9 -386.4 M
24.4375 0 RL
stroke
grestore
(XML) S
[/Rect [389.866425 -388.1 416.303925 -376.0] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/xml/rfc2119.xml)] Cd /ANN pdfmark
(\).) S
8 -407.1 M
([RFC3526]) S
[/View [/XYZ -4 842 null] /Dest /33 /DEST pdfmark
136.7 -407.1 M
(Kivinen, T. and M. Kojo, ) S
(\233) S
gsave
newpath
256.1 -408.2 M
162.1875 0 RL
stroke
grestore
(More Modular Exponential \(MODP\)) S
[/Rect [255.139862 -409.849976 419.327362 -397.749969] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3526)] Cd /ANN pdfmark
136.7 -420.3 M
gsave
newpath
136.7 -421.4 M
222.929688 0 RL
stroke
grestore
(Diffie-Hellman groups for Internet Key Exchange ) S
gsave
newpath
359.6 -421.4 M
25.640625 0 RL
stroke
grestore
(\(IKE\)) S
[/Rect [135.698456 -423.05 386.268768 -410.949982] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3526)] Cd /ANN pdfmark
(,\234) S
136.7 -433.5 M
(RFC\2403526, May\2402003 ) S
(\() S
gsave
newpath
239.1 -434.6 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [238.053925 -436.25 261.432831 -424.15] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc3526.txt)] Cd /ANN pdfmark
(\).) S
0 -453.2 M
[/View [/XYZ -4 303.75 null] /Dest /34 /DEST pdfmark
0 -468.9 M
13 2 Nf
(7.2.) S
[/View [/XYZ -4 303.75 null] /Dest /79 /DEST pdfmark
( Informative ) S
(References) S
8 -485.1 M
0.989316106 0.989316106 scale

-0.0 -11.0 RM
11 0 Nf
([ISO.11770-4.2006]) S
[/View [/XYZ -4 842 null] /Dest /35 /DEST pdfmark
1.01079929 1.01079929 scale

112.2 -496.1 M
(International Organization for Standardization, \233Information technology \235) S
112.2 -509.4 M
(Security techniques \235 Key management \235 Part 4: Mechanisms based on) S
112.2 -522.6 M
(weak secrets,\234 ISO\240Standard 11770-4, ) S
(May\2402006.) S
8 -544.3 M
([RFC6090]) S
[/View [/XYZ -4 842 null] /Dest /36 /DEST pdfmark
112.2 -544.3 M
(McGrew, D., Igoe, K., and M. Salter, ) S
(\233) S
gsave
newpath
284.2 -545.4 M
122.179688 0 RL
stroke
grestore
(Fundamental Elliptic Curve) S
[/Rect [283.195496 -547.05 407.375183 -534.95] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc6090)] Cd /ANN pdfmark
112.2 -557.5 M
gsave
newpath
112.2 -558.6 M
63.84375 0 RL
stroke
grestore
(Cryptography ) S
gsave
newpath
176.1 -558.6 M
50.0976562 0 RL
stroke
grestore
(Algorithms) S
[/Rect [111.242355 -560.25 227.183762 -548.15] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc6090)] Cd /ANN pdfmark
(,\234 RFC\2406090, February\2402011 ) S
(\() S
gsave
newpath
358.5 -558.6 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [357.461121 -560.25 380.840027 -548.15] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc6090.txt)] Cd /ANN pdfmark
(\).) S
0 -577.2 M
[/View [/XYZ -4 179.75 null] /Dest /37 /DEST pdfmark
0 -577.2 M
[/View [/XYZ -4 179.75 null] /Dest /38 /DEST pdfmark
0 -596.2 M
15 2 Nf
(Appendix) S
[/View [/XYZ -4 178.75 null] /Dest /80 /DEST pdfmark
( A. \(Informative\) Group Parameters for Discrete-Logarithm) S
0 -614.2 M
(Based ) S
(Algorithms) S
0 -638.5 M
11 0 Nf
3.01204419 0 32 0 0 (The MODP group used for the iso-kam3-dl-2048-sha256 algorithm is defined by the following ) A
0 -651.7 M
(parameters.) S
0 -651.6 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 8 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 9 9
%%PageResources: font Times-Roman Courier Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(The prime ) S
(is:) S
0 -35 M
%%IncludeResource: font Courier
9.0 4 Nf
( q = 0xFFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1) S
0 -45.8 M
(       29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD) S
0 -56.6 M
(       EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245) S
0 -67.4 M
(       E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED) S
0 -78.2 M
(       EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D) S
0 -89 M
(       C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F) S
0 -99.8 M
(       83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D) S
0 -110.6 M
(       670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B) S
0 -121.4 M
(       E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9) S
0 -132.2 M
(       DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510) S
0 -143 M
(       15728E5A 8AACAA68 FFFFFFFF FFFFFFFF.) S
0 -167.2 M
11 0 Nf
(The generator ) S
(is:) S
0 -189 M
9.0 4 Nf
( g = 2.) S
0 -213.2 M
11 0 Nf
(The size of the subgroup generated by g ) S
(is:) S
0 -235 M
9.0 4 Nf
( r = \(q - 1\) / 2 =) S
0 -245.8 M
(     0x7FFFFFFF FFFFFFFF E487ED51 10B4611A 62633145 C06E0E68) S
0 -256.6 M
(       94812704 4533E63A 0105DF53 1D89CD91 28A5043C C71A026E) S
0 -267.4 M
(       F7CA8CD9 E69D218D 98158536 F92F8A1B A7F09AB6 B6A8E122) S
0 -278.2 M
(       F242DABB 312F3F63 7A262174 D31BF6B5 85FFAE5B 7A035BF6) S
0 -289 M
(       F71C35FD AD44CFD2 D74F9208 BE258FF3 24943328 F6722D9E) S
0 -299.8 M
(       E1003E5C 50B1DF82 CC6D241B 0E2AE9CD 348B1FD4 7E9267AF) S
0 -310.6 M
(       C1B2AE91 EE51D6CB 0E3179AB 1042A95D CF6A9483 B84B4B36) S
0 -321.4 M
(       B3861AA7 255E4C02 78BA3604 650C10BE 19482F23 171B671D) S
0 -332.2 M
(       F1CF3B96 0C074301 CD93C1D1 7603D147 DAE2AEF8 37A62964) S
0 -343 M
(       EF15E5FB 4AAC0B8C 1CCAA4BE 754AB572 8AE9130C 4C7D0288) S
0 -353.8 M
(       0AB9472D 45565534 7FFFFFFF FFFFFFFF.) S
0 -378 M
11 0 Nf
3.01204419 0 32 0 0 (The MODP group used for the iso-kam3-dl-4096-sha512 algorithm is defined by the following ) A
0 -391.2 M
(parameters.) S
0 -415.4 M
(The prime ) S
(is:) S
0 -437.2 M
9.0 4 Nf
( q = 0xFFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1) S
0 -448 M
(       29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD) S
0 -458.8 M
(       EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245) S
0 -469.6 M
(       E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED) S
0 -480.4 M
(       EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D) S
0 -491.2 M
(       C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F) S
0 -502 M
(       83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D) S
0 -512.8 M
(       670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B) S
0 -523.6 M
(       E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9) S
0 -534.4 M
(       DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510) S
0 -545.2 M
(       15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64) S
0 -556 M
(       ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7) S
0 -566.8 M
(       ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B) S
0 -577.6 M
(       F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C) S
0 -588.4 M
(       BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31) S
0 -599.2 M
(       43DB5BFC E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7) S
0 -610 M
(       88719A10 BDBA5B26 99C32718 6AF4E23C 1A946834 B6150BDA) S
0 -620.8 M
(       2583E9CA 2AD44CE8 DBBBC2DB 04DE8EF9 2E8EFC14 1FBECAA6) S
0 -631.6 M
(       287C5947 4E6BC05D 99B2964F A090C3A2 233BA186 515BE7ED) S
0 -642.4 M
(       1F612970 CEE2D7AF B81BDD76 2170481C D0069127 D5B05AA9) S
0 -653.2 M
(       93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34063199) S
0 -664 M
(       FFFFFFFF FFFFFFFF.) S
0 -673 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 9 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 10 10
%%PageResources: font Times-Roman Times-Bold Courier Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(The generator ) S
(is:) S
0 -35 M
%%IncludeResource: font Courier
9.0 4 Nf
( g = 2.) S
0 -59.2 M
11 0 Nf
(The size of the subgroup generated by g ) S
(is:) S
0 -81 M
9.0 4 Nf
( r = \(q - 1\) / 2 =) S
0 -91.8 M
(     0x7FFFFFFF FFFFFFFF E487ED51 10B4611A 62633145 C06E0E68) S
0 -102.6 M
(       94812704 4533E63A 0105DF53 1D89CD91 28A5043C C71A026E) S
0 -113.4 M
(       F7CA8CD9 E69D218D 98158536 F92F8A1B A7F09AB6 B6A8E122) S
0 -124.2 M
(       F242DABB 312F3F63 7A262174 D31BF6B5 85FFAE5B 7A035BF6) S
0 -135 M
(       F71C35FD AD44CFD2 D74F9208 BE258FF3 24943328 F6722D9E) S
0 -145.8 M
(       E1003E5C 50B1DF82 CC6D241B 0E2AE9CD 348B1FD4 7E9267AF) S
0 -156.6 M
(       C1B2AE91 EE51D6CB 0E3179AB 1042A95D CF6A9483 B84B4B36) S
0 -167.4 M
(       B3861AA7 255E4C02 78BA3604 650C10BE 19482F23 171B671D) S
0 -178.2 M
(       F1CF3B96 0C074301 CD93C1D1 7603D147 DAE2AEF8 37A62964) S
0 -189 M
(       EF15E5FB 4AAC0B8C 1CCAA4BE 754AB572 8AE9130C 4C7D0288) S
0 -199.8 M
(       0AB9472D 45556216 D6998B86 82283D19 D42A90D5 EF8E5D32) S
0 -210.6 M
(       767DC282 2C6DF785 457538AB AE83063E D9CB87C2 D370F263) S
0 -221.4 M
(       D5FAD746 6D8499EB 8F464A70 2512B0CE E771E913 0D697735) S
0 -232.2 M
(       F897FD03 6CC50432 6C3B0139 9F643532 290F958C 0BBD9006) S
0 -243 M
(       5DF08BAB BD30AEB6 3B84C460 5D6CA371 047127D0 3A72D598) S
0 -253.8 M
(       A1EDADFE 707E8847 25C16890 54908400 8D391E09 53C3F36B) S
0 -264.6 M
(       C438CD08 5EDD2D93 4CE1938C 357A711E 0D4A341A 5B0A85ED) S
0 -275.4 M
(       12C1F4E5 156A2674 6DDDE16D 826F477C 97477E0A 0FDF6553) S
0 -286.2 M
(       143E2CA3 A735E02E CCD94B27 D04861D1 119DD0C3 28ADF3F6) S
0 -297 M
(       8FB094B8 67716BD7 DC0DEEBB 10B8240E 68034893 EAD82D54) S
0 -307.8 M
(       C9DA754C 46C7EEE0 C37FDBEE 48536047 A6FA1AE4 9A0318CC) S
0 -318.6 M
(       FFFFFFFF FFFFFFFF.) S
0 -327.6 M
[/View [/XYZ -4 429.400024 null] /Dest /39 /DEST pdfmark
0 -327.6 M
[/View [/XYZ -4 429.400024 null] /Dest /40 /DEST pdfmark
0 -348.6 M
%%IncludeResource: font Times-Bold
15 2 Nf
(Appendix) S
[/View [/XYZ -4 426.400024 null] /Dest /81 /DEST pdfmark
( B. \(Informative\) Derived Numerical ) S
(Values) S
0 -372.8 M
11 0 Nf
0.24609375 0 32 0 0 (This section provides several numerical values for implementing this protocol, derived from the above) A
0 -386 M
(specifications. The values shown in this section are for informative purposes only. ) S
203.1 -414.3 M
11 2 Nf
(dl-2048) S
244.1 -414.3 M
11 2 Nf
(dl-4096) S
285 -414.3 M
11 2 Nf
(ec-p256) S
327.1 -414.3 M
11 2 Nf
(ec-p521) S
51.7 -434.1 M
11 0 Nf
(Size of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
( ) S
(etc.) S
0.0 -2.2 RM
203.1 -435.1 M
(2048) S
244.1 -435.1 M
(4096) S
285 -435.1 M
(257) S
327.1 -435.1 M
(522) S
369.3 -435.1 M
(\(bits\)) S
51.7 -456 M
(hSize, Size of ) S
(H\(...\)) S
203.1 -456 M
(256) S
244.1 -456 M
(512) S
285 -456 M
(256) S
327.1 -456 M
(512) S
369.3 -456 M
(\(bits\)) S
51.7 -475.8 M
11 0 Nf
(length of ) S
(OCTETS\(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(\) ) S
(etc.) S
0.0 -2.2 RM
203.1 -476.9 M
(256) S
244.1 -476.9 M
(512) S
285 -476.9 M
(33) S
327.1 -476.9 M
(66) S
369.3 -476.9 M
(\(octets\)) S
51.7 -497.7 M
(length of kc1, ks1 param. ) S
(values.) S
203.1 -497.7 M
(344 ) S
(*) S
244.1 -497.7 M
(684 ) S
(*) S
285 -497.7 M
(66) S
327.1 -497.7 M
(132) S
369.3 -497.7 M
(\(octets\)) S
51.7 -517.4 M
(length of vkc, vks param. ) S
(values.) S
203.1 -517.4 M
(44 ) S
(*) S
244.1 -517.4 M
(88 ) S
(*) S
285 -517.4 M
(64) S
327.1 -517.4 M
(128) S
369.3 -517.4 M
(\(octets\)) S
51.7 -537.2 M
11 0 Nf
(minimum allowed ) S
(S) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(c1) S
0.0 2.2 RM
1.5 0.0 RM
0.0 -2.2 RM
203.1 -538.3 M
11 0 Nf
(2048) S
244.1 -538.3 M
(4096) S
285 -538.3 M
(1) S
327.1 -538.3 M
(1) S
369.3 -538.3 M
(\240) S
0 -569.4 M
11 0 Nf
(\(The numbers marked with an * do not include any enclosing quotation ) S
(marks.\)) S
0 -580.4 M
[/View [/XYZ -4 176.649963 null] /Dest /41 /DEST pdfmark
0 -580.4 M
[/View [/XYZ -4 176.649963 null] /Dest /42 /DEST pdfmark
0 -599.4 M
15 2 Nf
(Appendix) S
[/View [/XYZ -4 175.649963 null] /Dest /82 /DEST pdfmark
( C. \(Informative\) Draft Change ) S
(Log) S
0 -606.9 M
[/View [/XYZ -4 150.149963 null] /Dest /43 /DEST pdfmark
0 -606.9 M
[/View [/XYZ -4 150.149963 null] /Dest /44 /DEST pdfmark
0 -611.4 M
gsave
0 setgray
217.7 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 10 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 11 11
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -18 M
%%IncludeResource: font Times-Bold
15 2 Nf
(C.1.) S
[/View [/XYZ -4 757.0 null] /Dest /83 /DEST pdfmark
( Changes in HTTPAUTH-WG revision ) S
(02) S
11 -38.6 M
gsave
0 setgray
newpath
11.0 -38.57 2.75 0 360 arc
closepath
fill
grestore
22 -42.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(No technical changes: references ) S
(updated.) S
0 -53.2 M
[/View [/XYZ -4 703.8 null] /Dest /45 /DEST pdfmark
0 -53.2 M
[/View [/XYZ -4 703.8 null] /Dest /46 /DEST pdfmark
0 -72.2 M
15 2 Nf
(C.2.) S
[/View [/XYZ -4 702.8 null] /Dest /84 /DEST pdfmark
( Changes in HTTPAUTH-WG revision ) S
(01) S
11 -92.8 M
gsave
0 setgray
newpath
11.0 -92.77 2.75 0 360 arc
closepath
fill
grestore
22 -96.4 M
11 0 Nf
(Changed behavior on failed generation of ) S
(K) S
1.2 0.0 RM
0.0 -2.2 RM
8.36798 0 Nf
(s1) S
0.0 2.2 RM
1.5 0.0 RM
11 0 Nf
(. ) S
0.0 -2.2 RM
11 -109.2 M
gsave
0 setgray
newpath
11.0 -109.169991 2.75 0 360 arc
closepath
fill
grestore
22 -112.8 M
(Security considerations ) S
(updated.) S
0 -123.8 M
[/View [/XYZ -4 633.2 null] /Dest /47 /DEST pdfmark
0 -123.8 M
[/View [/XYZ -4 633.2 null] /Dest /48 /DEST pdfmark
0 -142.8 M
15 2 Nf
(C.3.) S
[/View [/XYZ -4 632.2 null] /Dest /85 /DEST pdfmark
( Changes in HTTPAUTH-WG revision ) S
(00) S
11 -163.4 M
gsave
0 setgray
newpath
11.0 -163.37 2.75 0 360 arc
closepath
fill
grestore
22 -167 M
11 0 Nf
(Added a note on the choice of elliptic ) S
(curves.) S
0 -178 M
[/View [/XYZ -4 579.0 null] /Dest /49 /DEST pdfmark
0 -178 M
[/View [/XYZ -4 579.0 null] /Dest /50 /DEST pdfmark
0 -197 M
15 2 Nf
(C.4.) S
[/View [/XYZ -4 578.0 null] /Dest /86 /DEST pdfmark
( Changes in HTTPAUTH revision ) S
(02) S
11 -217.6 M
gsave
0 setgray
newpath
11.0 -217.569992 2.75 0 360 arc
closepath
fill
grestore
22 -221.2 M
11 0 Nf
(Added nIterPi parameter to adjust to the changes to the core draft. ) S
11 -231.8 M
gsave
0 setgray
newpath
11.0 -231.769989 2.75 0 360 arc
closepath
fill
grestore
22 -235.4 M
(Added a note on the verification of exchange ) S
(transaction.) S
0 -246.4 M
[/View [/XYZ -4 510.600037 null] /Dest /51 /DEST pdfmark
0 -246.4 M
[/View [/XYZ -4 510.600037 null] /Dest /52 /DEST pdfmark
0 -265.4 M
15 2 Nf
(C.5.) S
[/View [/XYZ -4 509.600037 null] /Dest /87 /DEST pdfmark
( Changes in HTTPAUTH revision ) S
(01) S
11 -286 M
gsave
0 setgray
newpath
11.0 -285.969971 2.75 0 360 arc
closepath
fill
grestore
22 -289.6 M
11 0 Nf
1.74939907 0 32 0 0 (Notation change: integer output of hash function will be notated as INT\(H\(*\)\), changed from ) A
22 -302.8 M
(H\(*\).) S
0 -313.8 M
[/View [/XYZ -4 443.2 null] /Dest /53 /DEST pdfmark
0 -313.8 M
[/View [/XYZ -4 443.2 null] /Dest /54 /DEST pdfmark
0 -332.8 M
15 2 Nf
(C.6.) S
[/View [/XYZ -4 442.2 null] /Dest /88 /DEST pdfmark
( Changes in revision ) S
(02) S
11 -353.4 M
gsave
0 setgray
newpath
11.0 -353.37 2.75 0 360 arc
closepath
fill
grestore
22 -357 M
11 0 Nf
0.992968738 0 32 0 0 (Implementation hints in appendix changed \(number of characters for base64-fixed-number does) A
22 -370.2 M
(not contain ) S
(double-quotes\).) S
0 -381.2 M
[/View [/XYZ -4 375.8 null] /Dest /55 /DEST pdfmark
0 -381.2 M
[/View [/XYZ -4 375.8 null] /Dest /56 /DEST pdfmark
0 -400.2 M
15 2 Nf
(C.7.) S
[/View [/XYZ -4 374.8 null] /Dest /89 /DEST pdfmark
( Changes in revision ) S
(01) S
11 -420.8 M
gsave
0 setgray
newpath
11.0 -420.77002 2.75 0 360 arc
closepath
fill
grestore
22 -424.4 M
11 0 Nf
(Parameter names renamed. ) S
11 -435 M
gsave
0 setgray
newpath
11.0 -434.970032 2.75 0 360 arc
closepath
fill
grestore
22 -438.6 M
(Some expressions clarified without changing the ) S
(value.) S
0 -449.6 M
[/View [/XYZ -4 307.399963 null] /Dest /57 /DEST pdfmark
0 -449.6 M
[/View [/XYZ -4 307.399963 null] /Dest /58 /DEST pdfmark
0 -468.6 M
15 2 Nf
(C.8.) S
[/View [/XYZ -4 306.399963 null] /Dest /90 /DEST pdfmark
( Changes in revision ) S
(00) S
0 -492.8 M
11 0 Nf
(The document is separated from the revision 08 of the core documentation. ) S
0 -503.8 M
[/View [/XYZ -4 253.199951 null] /Dest /59 /DEST pdfmark
0 -522.8 M
15 2 Nf
(Authors') S
[/View [/XYZ -4 252.199951 null] /Dest /91 /DEST pdfmark
( ) S
(Addresses) S
0 -548.1 M
11 0 Nf
(\240) S
44.6 -548.1 M
(Yutaka ) S
(Oiwa) S
0 -561.9 M
(\240) S
44.6 -561.9 M
(National Institute of Advanced Industrial Science and ) S
(Technology) S
0 -575.6 M
(\240) S
44.6 -575.6 M
(Research Institute for Secure ) S
(Systems) S
0 -589.4 M
(\240) S
44.6 -589.4 M
(3-11-46 ) S
(Nakouji) S
0 -603.1 M
(\240) S
44.6 -603.1 M
(Amagasaki, ) S
(Hyogo) S
0 -616.9 M
(\240) S
44.6 -616.9 M
(JP) S
12.6 -630.6 M
(Email:\240) S
44.6 -630.6 M
gsave
newpath
44.6 -631.7 M
154.285156 0 RL
stroke
grestore
(mutual-auth-contact-ml@aist.go.jp) S
0 -644.4 M
(\240) S
44.6 -644.4 M
(\240) S
0 -658.1 M
(\240) S
44.6 -658.1 M
(Hajime ) S
(Watanabe) S
44.6 -658.1 M
gsave
0 setgray
217.7 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 11 -) S
0 setgray
89.3 -8 M
grestore
pgsave restore N
%%Page: 12 12
%%PageResources: font Times-Roman Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -11 M
%%IncludeResource: font Times-Roman
11 0 Nf
(\240) S
44.6 -11 M
(National Institute of Advanced Industrial Science and ) S
(Technology) S
0 -24.8 M
(\240) S
44.6 -24.8 M
(Research Institute for Secure ) S
(Systems) S
0 -38.5 M
(\240) S
44.6 -38.5 M
(Tsukuba Central ) S
(2) S
0 -52.2 M
(\240) S
44.6 -52.2 M
(1-1-1 ) S
(Umezono) S
0 -66 M
(\240) S
44.6 -66 M
(Tsukuba-shi, ) S
(Ibaraki) S
0 -79.8 M
(\240) S
44.6 -79.8 M
(JP) S
0 -93.5 M
(\240) S
44.6 -93.5 M
(\240) S
0 -107.2 M
(\240) S
44.6 -107.2 M
(Hiromitsu ) S
(Takagi) S
0 -121 M
(\240) S
44.6 -121 M
(National Institute of Advanced Industrial Science and ) S
(Technology) S
0 -134.8 M
(\240) S
44.6 -134.8 M
(Research Institute for Secure ) S
(Systems) S
0 -148.5 M
(\240) S
44.6 -148.5 M
(Tsukuba Central ) S
(2) S
0 -162.2 M
(\240) S
44.6 -162.2 M
(1-1-1 ) S
(Umezono) S
0 -176 M
(\240) S
44.6 -176 M
(Tsukuba-shi, ) S
(Ibaraki) S
0 -189.8 M
(\240) S
44.6 -189.8 M
(JP) S
0 -203.5 M
(\240) S
44.6 -203.5 M
(\240) S
0 -217.2 M
(\240) S
44.6 -217.2 M
(Kaoru ) S
(Maeda) S
0 -231 M
(\240) S
44.6 -231 M
(Lepidum Co. ) S
(Ltd.) S
0 -244.8 M
(\240) S
44.6 -244.8 M
(#602, Village Sasazuka ) S
(3) S
0 -258.5 M
(\240) S
44.6 -258.5 M
(1-30-3 ) S
(Sasazuka) S
0 -272.2 M
(\240) S
44.6 -272.2 M
(Shibuya-ku, ) S
(Tokyo) S
0 -286 M
(\240) S
44.6 -286 M
(JP) S
0 -299.8 M
(\240) S
44.6 -299.8 M
(\240) S
0 -313.5 M
(\240) S
44.6 -313.5 M
(Tatsuya ) S
(Hayashi) S
0 -327.2 M
(\240) S
44.6 -327.2 M
(Lepidum Co. ) S
(Ltd.) S
0 -341 M
(\240) S
44.6 -341 M
(#602, Village Sasazuka ) S
(3) S
0 -354.8 M
(\240) S
44.6 -354.8 M
(1-30-3 ) S
(Sasazuka) S
0 -368.5 M
(\240) S
44.6 -368.5 M
(Shibuya-ku, ) S
(Tokyo) S
0 -382.2 M
(\240) S
44.6 -382.2 M
(JP) S
0 -396 M
(\240) S
44.6 -396 M
(\240) S
0 -409.8 M
(\240) S
44.6 -409.8 M
(Yuichi ) S
(Ioku) S
0 -423.5 M
(\240) S
44.6 -423.5 M
(Individual) S
0 -437.2 M
gsave
0 setgray
217.7 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 12 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%EOF

PAFTECH AB 2003-20262026-04-24 11:19:31