TCG Algorithm Registry Family “2.0”
Total Page:16
File Type:pdf, Size:1020Kb
TCG Algorithm Registry Family “2.0" Level 00 Revision 01.32 June 25, 2020 Contact: [email protected] TCG PUBLISHED TCG Copyright © TCG 2020 TCG Algorithm Registry Disclaimers, Notices, and License Terms THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. This document is copyrighted by Trusted Computing Group (TCG), and no license, express or implied, is granted herein other than as follows: You may not copy or reproduce the document or distribute it to others without written permission from TCG, except that you may freely do so for the purposes of (a) examining or implementing TCG specifications or (b) developing, testing, or promoting information technology standards and best practices, so long as you distribute the document with these disclaimers, notices, and license terms. Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owners. Page ii TCG PUBLISHED Family “2.0" June 25, 2020 Copyright © TCG 2020 Level 00 Revision 01.32 TCG Algorithm Registry Change History Version Date Description 1.27 09.26.2017 Added change history. CMAC algorithm assigned as 0x003F in Table 3. Removed extra whitespace above the title of clause 6.10. Assigned bitfields in Table 25 for SHA3_256, SHA3_384 and SHA3_512. Replaced references of deprecated IETF 3447 with IETF 8017. Removed Annex A (Applicability of this Registry for Other TCG Specifications) 1.28 01.28.2020 Removed Type “H” for TPM_ALG_OAEP in Table 3 Added Types “E” and “M” and comments for TPM_ALG_SM2 in Table 3 Changed references for SM2 to GB/T 32918 Parts 1 through 5 Changed reference for SM3 to ISO/IEC 10118-3:2018 Changed reference for SM4 to GB/T 32907-2016 1.29 02.19.2020 Added algorithms CCM, GCM, KW, KWP, EAX, EdDSA in Table 3 Added Brainpool P256/384/512 R1 curves in Table 4 Added curve parameters for Brainpool P256/384/512 R1 to clause 5.2 Added curve parameters for Curve 25519 to clause 5.2 1.30 02.27.2020 Added 2nd reference to TPM_ALG_ECDH in Table 3 to include X25519 Added note to TPM_ALG_EDDSA in Table 3 1.31 03.09.2020 Updated EDDSA to EdDSA in Table 4 Fixed formatting in Table 5, NIST_P192, parameter value of gY Fixed formatting in Table 10, BN_P256, parameter value of p and n Fixed formatting in Table 18, 19, 20 1.32 03.20.2020 Added new references to bibliography Family “2.0" TCG PUBLISHED Page iii Level 00 Revision 01.32 Copyright © TCG 2020 June 25, 2020 TCG Algorithm Registry CONTENTS 1 Introduction .......................................................................................................................... 1 2 Conventions ......................................................................................................................... 2 2.1 Bit and Octet Numbering and Order ........................................................................... 2 2.2 Sized Buffer References ............................................................................................ 2 2.3 Numbers .................................................................................................................... 3 3 Notation ................................................................................................................................ 4 3.1 Named Constants ....................................................................................................... 4 3.2 Enumerations ............................................................................................................. 4 3.3 Bit Field Definitions .................................................................................................... 5 3.4 Name Prefix Convention ............................................................................................. 5 4 TPM_ALG_ID ....................................................................................................................... 6 5 ECC Values ........................................................................................................................ 11 5.1 Curve ID Values ....................................................................................................... 11 5.2 Curve Parameters .................................................................................................... 12 5.2.1 Introduction ..................................................................................................... 12 5.2.2 NIST P192 ...................................................................................................... 12 5.2.3 NIST P224 ...................................................................................................... 13 5.2.4 NIST P256 ...................................................................................................... 14 5.2.5 NIST P384 ...................................................................................................... 15 5.2.6 NIST P521 ...................................................................................................... 16 5.2.7 BN P256 ......................................................................................................... 17 5.2.8 BN P638 ......................................................................................................... 18 5.2.9 SM2_P256 ...................................................................................................... 19 5.2.10 BP_P256_R1 .................................................................................................. 20 5.2.11 BP_P384_R1 .................................................................................................. 21 5.2.12 BP_P512_R1 .................................................................................................. 22 5.2.13 CURVE_25519 ................................................................................................ 23 6 Hash Parameters ................................................................................................................ 24 6.1 Introduction .............................................................................................................. 24 6.2 SHA1 ....................................................................................................................... 24 6.3 SHA256 ................................................................................................................... 24 6.4 SHA384 ................................................................................................................... 24 6.5 SHA512 ................................................................................................................... 25 6.6 SM3_256.................................................................................................................. 25 6.7 SHA3_256 ................................................................................................................ 25 6.8 SHA3_384 ................................................................................................................ 25 6.9 SHA3_512 ................................................................................................................ 26 6.10 Hash Algorithms Bit Field ......................................................................................... 26 7 Symmetric Block Cipher Parameters ................................................................................... 27 7.1 Introduction .............................................................................................................. 27 7.2 AES ......................................................................................................................... 27 7.3 SM4 ......................................................................................................................... 27 7.4 Camellia ................................................................................................................... 27 7.5 TDES ....................................................................................................................... 28 Annex A — Bibliography ............................................................................................................ 29 Page iv TCG PUBLISHED Family “2.0" June 25, 2020 Copyright © TCG 2020 Level 00 Revision 01.32 TCG Algorithm Registry TCG Algorithm Registry 1 Introduction The Algorithm Registry lists each algorithm assigned an identifier, allowing it to be unambiguously defined and referenced by other TCG specifications. This document is a compendium of data related to the various algorithms used in specifications created by the Trusted Computing Group (TCG). The compendium of algorithm data is intended to ensure interoperability between