rfc9679v3.txt   rfc9679.txt 
skipping to change at line 364 skipping to change at line 364
SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w
The full example of a COSE Key Thumbprint URI is shown below (with a The full example of a COSE Key Thumbprint URI is shown below (with a
line break added for readability). line break added for readability).
urn:ietf:params:oauth:ckt:sha-256: urn:ietf:params:oauth:ckt:sha-256:
SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w SWvYr63zB-WwjGSwQhv53AFSijRKQ72oj63RZp2iU-w
Note that the use of oauth in the namespace is to align with JWK
Thumbprint URIs as described in [RFC9278]; however, these URIs are
intended for use with applications and specifications not necessarily
related to OAuth.
6. Example 6. Example
This section demonstrates the COSE Key Thumbprint computation for the This section demonstrates the COSE Key Thumbprint computation for the
following example COSE Key containing an Elliptic Curve Cryptography following example COSE Key containing an Elliptic Curve Cryptography
(ECC) public key. (ECC) public key.
For better readability, the example is first presented in CBOR For better readability, the example is first presented in CBOR
diagnostic format (with the long line broken for display purposes diagnostic format (with the long line broken for display purposes
only). only).
skipping to change at line 386 skipping to change at line 391
1:2, 1:2,
/ crv set to P-256 / / crv set to P-256 /
-1:1, -1:1,
/ public key: x-coordinate / / public key: x-coordinate /
-2:h'65eda5a12577c2bae829437fe338701a10aaa375e1bb5b5de108de439c0 -2:h'65eda5a12577c2bae829437fe338701a10aaa375e1bb5b5de108de439c0
8551d', 8551d',
/ public key: y-coordinate / / public key: y-coordinate /
-3:h'1e52ed75701163f7f9e40ddf9f341b3dc9ba860af7e0ca7ca7e9eecd008 -3:h'1e52ed75701163f7f9e40ddf9f341b3dc9ba860af7e0ca7ca7e9eecd008
4d19c', 4d19c',
/ kid is bstr, not used in COSE Key Thumbprint / / kid is bstr, not used in COSE Key Thumbprint /
2:h'1decade2facade3' 2:h'496bd8afadf307e5b08c64b0421bf9dc01528a344a43bda88fadd1669da2
53ec'
} }
The example above corresponds to the following CBOR encoding (with The example above corresponds to the following CBOR encoding (with
link breaks added for display purposes only): link breaks added for display purposes only):
A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D A50102200121582065EDA5A12577C2BAE829437FE338701A10AAA375E1BB5B5DE108D
E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9 E439C08551D2258201E52ED75701163F7F9E40DDF9F341B3DC9BA860AF7E0CA7CA7E9
EECD0084D19C0258246D65726961646F632E6272616E64796275636B406275636B6C6 EECD0084D19C0258246D65726961646F632E6272616E64796275636B406275636B6C6
16E642E6578616D706C65 16E642E6578616D706C65
skipping to change at line 430 skipping to change at line 436
CA7CA7E9EECD0084D19C CA7CA7E9EECD0084D19C
Using SHA-256, the resulting thumbprint is: Using SHA-256, the resulting thumbprint is:
496bd8afadf307e5b08c64b0421bf9dc01528a344a43bda88fadd1669da253ec 496bd8afadf307e5b08c64b0421bf9dc01528a344a43bda88fadd1669da253ec
7. Security Considerations 7. Security Considerations
A COSE Key Thumbprint will only uniquely identify a particular key if A COSE Key Thumbprint will only uniquely identify a particular key if
a single unambiguous COSE Key representation for that key is defined a single unambiguous COSE Key representation for that key is defined
and used when computing the COSE Key Thumbprint.
A COSE Key Thumbprint will only uniquely identify a particular key if
a single unambiguous COSE Key representation for that key is defined
and used when computing the COSE Key Thumbprint. Key identifiers are and used when computing the COSE Key Thumbprint. Key identifiers are
not included in the thumbprint calculation (similarly to other not included in the thumbprint calculation (similarly to other
optional parameters in the COSE_Key structure). If the inclusion of optional parameters in the COSE_Key structure). If the inclusion of
specific optional parameters in the thumbprint calculation is specific optional parameters in the thumbprint calculation is
important for a particular application, this specification would not important for a particular application, this specification would not
be suitable. be suitable.
While thumbprint values are useful for identifying legitimate keys, While thumbprint values are useful for identifying legitimate keys,
comparing thumbprint values is not a reliable means of excluding the comparing thumbprint values is not a reliable means of excluding the
use of particular keys (or transformations thereof). The reason is use of particular keys (or transformations thereof). The reason is
skipping to change at line 585 skipping to change at line 587
Additionally, we would like to thank Carsten Bormann, Ilari Additionally, we would like to thank Carsten Bormann, Ilari
Liusvaara, Laurence Lundblade, Daisuke Ajitomi, Michael Richardson, Liusvaara, Laurence Lundblade, Daisuke Ajitomi, Michael Richardson,
Michael B. Jones, Mallory Knodel, Joel Jaeggli, Derrell Piper, Patrik Michael B. Jones, Mallory Knodel, Joel Jaeggli, Derrell Piper, Patrik
Fältström, Warren Kumari, Deb Cooley, and Brendan Moran for their Fältström, Warren Kumari, Deb Cooley, and Brendan Moran for their
feedback. feedback.
Authors' Addresses Authors' Addresses
Kohei Isobe Kohei Isobe
SECOM CO., LTD. SECOM CO., LTD.
Japan
Email: isobekohei@gmail.com Email: isobekohei@gmail.com
Hannes Tschofenig Hannes Tschofenig
University of Applied Sciences Bonn-Rhein-Sieg University of Applied Sciences Bonn-Rhein-Sieg
Germany Germany
Email: hannes.tschofenig@gmx.net Email: hannes.tschofenig@gmx.net
Orie Steele Orie Steele
Transmute Transmute
United States of America United States of America
 End of changes. 4 change blocks. 
5 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.48.