TWiki
>
P1735 Web
>
P1735PublicDocuments
>
P1735Minutes2008July30
(2008-08-27,
RuchiTyagi
)
(raw view)
E
dit
A
ttach
---++ IEEE P1735 Working Group Meeting of July 30, 2008 ---+++ Meeting Info [[P1735MeetingInfo][Conference Bridge and Webex]] ---+++ Participants * Attending * Steven Dovich, Cadence * Ruchi Tyagi, Cadence * Dave Clemans, Synopsys * Michael Smith, Synopsys * William A Hanna, Boeing * Meera Srinivasan, Synopsys * Parminder Gill, Synopsys * John Shields, Mentor * Nitin Khurana, Cadence * Dave Graubart, Synopsys * Not Attending * Nick Sgoupis, CAST * Syed Huq, Cisco * Jim Robinson, Synopsys * NSS Subramanian, Cadence * David Tran, Synopsys * Gary Delp, LSI ---+++ Agenda 1 Determine Quorum 1 [[http://standards.ieee.org/board/pat/pat-slideset.pdf][Patent slides]] 1 Approve agenda 1 Approval of Meeting minutes from 7/23/2008 1 Action Items Status 1 Liaison Reports 1 Work Plan 1 Encryption Algorithms 1 Other Business ---+++ Minutes ---++++ Attendance/Quorum We have 4/5 eligible entities, and have a working quorum. ---++++ Patent Policy The [[http://standards.ieee.org/board/pat/pat-slideset.pdf][Patent slides]] were offered for review. No new claims were disclosed at the call for essential patent claims. ---++++ Agenda Approval Motion by Michael, seconded by Ruchi, Meera abstains. Motion is approved. ---++++ Previous Minutes Bill moved and Dave C. seconded the approval of the [[P1735Minutes2008July23][July 23, 2008]] minutes. Parminder and Meera abstain. The motion was approved. ---++++ Action Item Review Steven reviewed the open action items. John has closed his action item to create a Glossary page. Everyone is encouraged to contribute definitions for review and approval. ---++++ Liaison Reports P1076 recirculation ballot is out for a 1 week review. ---++++ Work Plan Steven reported on discussions with participants on other encryption related standards, and is planning to schedule a presentation on Key Management standards activity. ---++++ Encryption Algorithms Dave G. reviewed the results of previous discussions around algorithm recommendations. 1 Complete enough to ensure inter-operability 1 Freely available with open reference implementations 1 One or more of the algorithms should be considered _strong_ 1 Should include both symmetric and assymetric algorithms 1 Should one or more algorithms for encryption, digest, and encoding recommendations ---+++++ Encryption * des-cbc, aes128-cbc, and 3des-cbc should be required symmetric algorithms * rsa, DiffieHellman, and DSA should be required assymetric algorithms * Tool Secret Key use case only requires a single supported assymetric algorithm for Digital Envelopes. * IP Author Secret Key use case will require implementation of all _required_ algorithms because the algorithm choice is in the hands of the IP author. %ACTION{ closed="2008-08-27" closer="" created="2008-07-30" creator="Main.StevenDovich" due="" notify="Main.StevenDovich" state="closed" uid="000033" who="Main.RuchiTyagi" }% Find standard reference identifiers for Diffie-Hellman and DSA algorithms ---+++++ Encoding * base64 should be required * raw has academic value but low practical value. Exclude from recommendation. * quoted-printable is only of value for mostly ASCII data. This is not the case for encrypted data. Exclude from recommendation. * uuencode is largely historical, but is less efficient than base64. Exclude from recommendation. ---+++++ Digest * md5 and sha1 from the current standards are sufficiently available, but have some open questions regarding strength. * We should also look at the stronger digest functions for open reference implementations. %ACTION{ closed="2008-08-25" closer="" created="2008-07-30" creator="Main.StevenDovich" due="" notify="Main.StevenDovich" state="closed" uid="000032" who="Main.DavidClemans" }% Add _digest_ to the [[P1735Glossary][glossary]] %ACTION{ closed="2008-08-06" closer="" created="2008-07-30" creator="Main.StevenDovich" due="" notify="" state="closed" uid="000034" who="Main.JohnShields" }% <<EOF Recommend a strong digest function with open reference implementation. It appears that SHA-256 is a good candidate. It has no known weaknesses and there are readily available open source implementations,e.g., openssl and the pkgtools/digest application maintained at www.pkgsrc.org. I would recommend we add this to MD5 and SHA-1. I note that MD5 and SHA-1 are already required algorithms in P1800 and 1076. -- Main.JohnShields - 06 Aug 2008 - 16:56 EOF ---+++++ Future Steps The above agreement should be formally approved so that draft content can be written. That action is deferred until next meeting so that everyone has a chance to consider the implications of the proposed recommendations. ---++++ Adjournment Motion by Dave G., second by Michael. Approved by acclamation at 1:24 pm CDT ---+++ Approval These minutes were approved at the [[P1735Minutes2008Aug6][August 6, 2008]] meeting. -- Main.StevenDovich - 06 Aug 2008
E
dit
|
A
ttach
|
P
rint version
|
H
istory
: r7
<
r6
<
r5
<
r4
<
r3
|
B
acklinks
|
V
iew topic
|
Ra
w
edit
|
M
ore topic actions
Topic revision: r7 - 2008-08-27 - 10:36:01 -
RuchiTyagi
P1735
Log In
or
Register
P1735 Web
Create New Topic
Index
Search
Changes
Notifications
Statistics
Preferences
Webs
Main
P1076
Ballots
LCS2016_080
P10761
P1647
P16661
P1685
P1734
P1735
P1778
P1800
P1801
Sandbox
TWiki
VIP
VerilogAMS
Copyright © 2008-2026 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki?
Send feedback