Document:
EnhancedProtectionKey-v1.05.html (Revision 5)

Document Number: Enhanced ProtectionKey-1.05 HTML
Draft (A preliminary unapproved sketch, outline, or version.)

Details

Submitted By Mr. Dennis Hamilton on 2012-06-12 5:17 am UTC

Publication Type

None at this time.

Group / Folder

OASIS Open Document Format for Office Applications (OpenDocument) TC / Proposals

Modified by

Mr. Dennis Hamilton
2012-10-16 2:25 pm UTC

Copy

This document is not a copy.

Technical Contact

None at this time.

Download Count

1164

Download Agreement

None at this time.

Description

HTML Format Version:

v1.05 of a proposal to add two protection-key-digest-algorithm methods, including a replaement for the pre-1.3 default case.

AUTHZ160 does not depend on a hashing algorithm to match is value in order to authenticate removal of a protection.

SHA1DK is password based but it uses salt values and iterated hashing to make it far more costly to attempt to discover the password used by repeated trials. Passwords that are used should still be considered compromisable simply because the protection key, even though 320 bits, is still available in plain sight and subject to off-line attacks.

1. Rationale
1.1 Vulnerability of Password Hash Values
1.2 SHA1DK for Password-Based Protection-Key Values
1.3 AUTHZ160 for Password-Less Protection-Key Values

2. Proposed Changes

3. Deployment Considerations
3.1 Down-Level Considerations
3.2 Immediate Usabilty of AUTHZ160 for Default Protection
Keys
3.3 Confirmation of Resilient Down-Level Treatment
3.4 Future-Proofing of Extended ODF 1.2 Consumers and
Producers

[Note: Extraneous text was deleted from this description on 2012-10-16]