From e04eb3c273868e6dc539679717be92bea1897158 Mon Sep 17 00:00:00 2001 From: toscalix Date: Tue, 5 Aug 2025 10:12:30 +0200 Subject: [PATCH 1/3] Crypto Algorithms List Properties Description Description of the properties of the merged list draft. --- ...-algorithms-list-properties-description.md | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 crypto-algorithms-list-properties-description.md diff --git a/crypto-algorithms-list-properties-description.md b/crypto-algorithms-list-properties-description.md new file mode 100644 index 0000000..55c54d3 --- /dev/null +++ b/crypto-algorithms-list-properties-description.md @@ -0,0 +1,33 @@ +# SPDX Cryptographic Algorithms List properties description + +## Id + +* Description: univocal identifier for every cryptographic algorithm. This list provides an identifier per algorithm. +* Values: alphanumeric, where the usage of lower or upper case characters depend on each algorithm + +## Name + +* Description: widely accepted name provided by the author of the algorithm or a standardization body +* Values: string + +## commonkeySize + +* Description: the detected key size +* Values: bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND + +## specifiedkeySize + +* Description: the default key size or range determined by the authors of the algorithm, standardization or compliance bodies/agencies +* Values: any of these options are valid + * bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND + * bbbb TO cccc, where bbbb and cccc are integers, provided in bits, to express a range + +## cryptoClass + +* Description: cryptographic algorithms are categorized in classes. The classes are defined by the number of cryptographic keys that are used in conjunction with the algorithm. + * Cryptographic hash functions do not require keys for their basic operation. + * Symmetric-key algorithms transform data in a way that is fundamentally difficult to undo without knowledge of a secret key. The key is “symmetric” because the same key is used for a cryptographic operation and its inverse + * Asymmetric-key algorithms, commonly known as public-key algorithms, use two related keys (i.e., a key pair) to perform their functions: a public key and a private key. The public key may be known by anyone; the private key should be under the sole control of the entity that “owns” the key pair. Even though the public and private keys of a key pair are related, knowledge of the public key cannot be used to determine the private key. +* Values: "Cryptographic-Hash-Function" , "Symetric-Key-Algorithm" or "Asymmetric-Key-Algorithm" + +Note: the subclasses has been added to the cryptoClass property, separated by a "/" character from the class. This specific way to structure the subclasses is WIP. From 710ddbe9c962606626c8a57c2c5ed6cd37acfb48 Mon Sep 17 00:00:00 2001 From: toscalix Date: Thu, 7 Aug 2025 10:57:44 +0200 Subject: [PATCH 2/3] Update crypto-algorithms-list-properties-description.md Co-authored-by: Alexios Zavras (zvr) --- crypto-algorithms-list-properties-description.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto-algorithms-list-properties-description.md b/crypto-algorithms-list-properties-description.md index 55c54d3..b6e7ac1 100644 --- a/crypto-algorithms-list-properties-description.md +++ b/crypto-algorithms-list-properties-description.md @@ -2,7 +2,7 @@ ## Id -* Description: univocal identifier for every cryptographic algorithm. This list provides an identifier per algorithm. +* Description: unique identifier for every cryptographic algorithm. This list provides an identifier per algorithm. * Values: alphanumeric, where the usage of lower or upper case characters depend on each algorithm ## Name From 3d67d8062806facb5827e914351b773061b61e64 Mon Sep 17 00:00:00 2001 From: toscalix Date: Wed, 13 Aug 2025 15:28:28 +0200 Subject: [PATCH 3/3] Update crypto-algorithms-list-properties-description.md Addressed comments 1, 3 and 4 from @zvr --- crypto-algorithms-list-properties-description.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/crypto-algorithms-list-properties-description.md b/crypto-algorithms-list-properties-description.md index b6e7ac1..9e05e74 100644 --- a/crypto-algorithms-list-properties-description.md +++ b/crypto-algorithms-list-properties-description.md @@ -3,7 +3,7 @@ ## Id * Description: unique identifier for every cryptographic algorithm. This list provides an identifier per algorithm. -* Values: alphanumeric, where the usage of lower or upper case characters depend on each algorithm +* Values: string, where the usage of lower or upper case characters depend on each algorithm ## Name @@ -13,14 +13,14 @@ ## commonkeySize * Description: the detected key size -* Values: bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND +* Values: , where is an integer, provided in bits. More than one value is possible, separated by the operator AND ## specifiedkeySize * Description: the default key size or range determined by the authors of the algorithm, standardization or compliance bodies/agencies -* Values: any of these options are valid - * bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND - * bbbb TO cccc, where bbbb and cccc are integers, provided in bits, to express a range +* Values: one of these options, or a combination of them, are valid + * , where is provided in bits. More than one value is possible, separated by the operator AND + * TO , where are provided in bits, to express a range ## cryptoClass