|
10 | 10 | ], |
11 | 11 | "variant": [ |
12 | 12 | { |
13 | | - "pattern": "RSA-PKCS1-1.5-{digestAlgorithm}-{keyLength}", |
| 13 | + "pattern": "RSA-PKCS1-1.5[-{digestAlgorithm}][-{keyLength}]", |
14 | 14 | "primitive": "signature" |
15 | 15 | } |
16 | 16 | ] |
|
23 | 23 | ], |
24 | 24 | "variant": [ |
25 | 25 | { |
26 | | - "pattern": "RSA-PSS-{digestAlgorithm}-{saltLength}-{keyLength}", |
| 26 | + "pattern": "RSA-PSS[-{digestAlgorithm}][-{saltLength}][-{keyLength}]", |
27 | 27 | "primitive": "signature" |
28 | 28 | } |
29 | 29 | ] |
|
35 | 35 | ], |
36 | 36 | "variant": [ |
37 | 37 | { |
38 | | - "pattern": "RSA-PKCS1-1.5-{keyLength}", |
| 38 | + "pattern": "RSA-PKCS1-1.5[-{keyLength}]", |
39 | 39 | "primitive": "pke" |
40 | 40 | } |
41 | 41 | ] |
|
47 | 47 | ], |
48 | 48 | "variant": [ |
49 | 49 | { |
50 | | - "pattern": "RSA-OAEP-{hashAlgorithm}-{maskGenAlgorithm}-{keyLength}", |
| 50 | + "pattern": "RSA-OAEP[-{hashAlgorithm}][-{maskGenAlgorithm}][-{keyLength}]", |
51 | 51 | "primitive": "pke" |
52 | 52 | } |
53 | 53 | ] |
|
59 | 59 | ], |
60 | 60 | "variant": [ |
61 | 61 | { |
62 | | - "pattern": "Ed{25519|448}{|ph|ctx}", |
| 62 | + "pattern": "Ed(25519|448)[-(ph|ctx)]", |
63 | 63 | "primitive": "signature" |
64 | 64 | } |
65 | 65 | ] |
|
72 | 72 | ], |
73 | 73 | "variant": [ |
74 | 74 | { |
75 | | - "pattern": "ECDSA-{curve}-{hash}", |
| 75 | + "pattern": "ECDSA[-{ellipticCurve}][-{hash}]", |
76 | 76 | "primitive": "signature" |
77 | 77 | } |
78 | 78 | ] |
|
84 | 84 | ], |
85 | 85 | "variant": [ |
86 | 86 | { |
87 | | - "pattern": "DSA-{length}-{hash}", |
| 87 | + "pattern": "DSA[-{length}][-{hash}]", |
88 | 88 | "primitive": "signature" |
89 | 89 | } |
90 | 90 | ] |
|
98 | 98 | ], |
99 | 99 | "variant": [ |
100 | 100 | { |
101 | | - "pattern": "ECDH{E}-{curve}", |
| 101 | + "pattern": "ECDH[E][-{ellipticCurve}]", |
102 | 102 | "primitive": "key-agree" |
103 | 103 | } |
104 | 104 | ] |
|
111 | 111 | ], |
112 | 112 | "variant": [ |
113 | 113 | { |
114 | | - "pattern": "FFDH{E}-{named_group}", |
| 114 | + "pattern": "FFDH(E)[-{namedGroup}]", |
115 | 115 | "primitive": "key-agree" |
116 | 116 | } |
117 | 117 | ] |
|
135 | 135 | ], |
136 | 136 | "variant": [ |
137 | 137 | { |
138 | | - "pattern": "SHA-{224|256|384|512|512/224|512/256}", |
| 138 | + "pattern": "SHA-(224|256|384|512|512/224|512/256)", |
139 | 139 | "primitive": "hash" |
140 | 140 | } |
141 | 141 | ] |
|
194 | 194 | ], |
195 | 195 | "variant": [ |
196 | 196 | { |
197 | | - "pattern": "AES-{128|192|256}-(ECB|CBC|CFB(1|8|64|128)|OFB|CTR|XTS|CTS)-(padding)-(ivlen)", |
| 197 | + "pattern": "AES[-(128|192|256)][-(ECB|CBC|CFB(1|8|64|128)|OFB|CTR|XTS|CTS)][-{padding}][-{ivlen}]", |
198 | 198 | "primitive": "block-cipher" |
199 | 199 | }, |
200 | 200 | { |
201 | 201 | "standard": [ |
202 | 202 | {"name": "SP800-38D", "url": "https://doi.org/10.6028/NIST.SP.800-38D"}, |
203 | 203 | {"name": "RFC 3610", "url": "https://doi.org/10.17487/RFC5116"} |
204 | 204 | ], |
205 | | - "pattern": "AES-{128|192|256}-(GCM|CCM)-(taglen)-(ivlen)", |
| 205 | + "pattern": "AES[-(128|192|256)][-(GCM|CCM)][-{tagLength}][-{ivLength}]", |
206 | 206 | "primitive": "ae" |
207 | 207 | }, |
208 | 208 | { |
209 | 209 | "standard": [ |
210 | 210 | {"name": "RFC5649", "url": "https://doi.org/10.17487/RFC5649"} |
211 | 211 | ], |
212 | | - "pattern": "AES-{128|192|256}-Wrap-(PAD|KWP|PKCS7)", |
| 212 | + "pattern": "AES[-(128|192|256)]-Wrap[-(PAD|KWP|PKCS7)]", |
213 | 213 | "primitive": "key-wrap" |
214 | 214 | }, |
215 | 215 | { |
216 | | - "pattern": "AES-{128|192|256}-(GMAC|CMAC)", |
| 216 | + "pattern": "AES[-(128|192|256)][-(GMAC|CMAC)]", |
217 | 217 | "primitive": "mac" |
218 | 218 | }, |
219 | 219 | { |
220 | | - "pattern": "AES-{128|192|256}-(XCBC_MAC(_96))", |
| 220 | + "pattern": "AES[-(128|192|256)][-(XCBC_MAC[_96])]", |
221 | 221 | "primitive": "mac" |
222 | 222 | } |
223 | 223 | ] |
|
229 | 229 | ], |
230 | 230 | "variant": [ |
231 | 231 | { |
232 | | - "pattern": "HKDF-{hash}", |
| 232 | + "pattern": "HKDF[-{hashFunction}]", |
233 | 233 | "primitive": "kdf" |
234 | 234 | } |
235 | 235 | ] |
|
242 | 242 | ], |
243 | 243 | "variant": [ |
244 | 244 | { |
245 | | - "pattern": "HMAC-{hash}-{length}", |
| 245 | + "pattern": "HMAC[-{hashFunction}][-{tagLength}]", |
246 | 246 | "primitive": "mac" |
247 | 247 | } |
248 | 248 | ] |
|
254 | 254 | ], |
255 | 255 | "variant": [ |
256 | 256 | { |
257 | | - "pattern": "CMAC-{cipher_algorithm}-{length}", |
| 257 | + "pattern": "CMAC[-{cipherAlgorithm}][-{length}]", |
258 | 258 | "primitive": "mac" |
259 | 259 | } |
260 | 260 | ] |
|
266 | 266 | ], |
267 | 267 | "variant": [ |
268 | 268 | { |
269 | | - "pattern": "KMAC-(128|256)", |
| 269 | + "pattern": "KMAC[-(128|256)]", |
270 | 270 | "primitive": "mac" |
271 | 271 | } |
272 | 272 | ] |
|
278 | 278 | ], |
279 | 279 | "variant": [ |
280 | 280 | { |
281 | | - "pattern": "ChaCha20-{AES|other}", |
| 281 | + "pattern": "ChaCha20[-(AES|{otherBlockCipher})]", |
282 | 282 | "primitive": "stream-cipher" |
283 | 283 | } |
284 | 284 | ] |
|
354 | 354 | ], |
355 | 355 | "variant": [ |
356 | 356 | { |
357 | | - "pattern": "RC4-{length}", |
| 357 | + "pattern": "RC4[-{keyLength}]", |
358 | 358 | "primitive": "stream-cipher" |
359 | 359 | } |
360 | 360 | ] |
|
367 | 367 | ], |
368 | 368 | "variant": [ |
369 | 369 | { |
370 | | - "pattern": "3DES-{length}-{mode}", |
| 370 | + "pattern": "3DES[-{keyLength}][-{mode}]", |
371 | 371 | "primitive": "block-cipher" |
372 | 372 | } |
373 | 373 | ] |
|
380 | 380 | ], |
381 | 381 | "variant": [ |
382 | 382 | { |
383 | | - "pattern": "DES-{length}-{mode}", |
| 383 | + "pattern": "DES[-{keyLength}][-{mode}]", |
384 | 384 | "primitive": "block-cipher" |
385 | 385 | } |
386 | 386 | ] |
|
392 | 392 | ], |
393 | 393 | "variant": [ |
394 | 394 | { |
395 | | - "pattern": "IDEA-{mode}", |
| 395 | + "pattern": "IDEA[-{mode}]", |
396 | 396 | "primitive": "block-cipher" |
397 | 397 | } |
398 | 398 | ] |
|
404 | 404 | ], |
405 | 405 | "variant": [ |
406 | 406 | { |
407 | | - "pattern": "RC2-{length}-{mode}", |
| 407 | + "pattern": "RC2[-{keyLength}][-{mode}]", |
408 | 408 | "primitive": "block-cipher" |
409 | 409 | } |
410 | 410 | ] |
|
428 | 428 | ], |
429 | 429 | "variant": [ |
430 | 430 | { |
431 | | - "pattern": "HashML-DSA-(44|65|87)-(hash)", |
| 431 | + "pattern": "HashML-DSA-(44|65|87)[-{hashFunction}]", |
432 | 432 | "primitive": "signature" |
433 | 433 | } |
434 | 434 | ] |
|
440 | 440 | ], |
441 | 441 | "variant": [ |
442 | 442 | { |
443 | | - "pattern": "HashSLH-DSA-(SHA2|SHAKE)-(128s|128f|192s|192f|256s|256f)-", |
| 443 | + "pattern": "HashSLH-DSA-(SHA2|SHAKE)-(128s|128f|192s|192f|256s|256f)", |
444 | 444 | "primitive": "signature" |
445 | 445 | } |
446 | 446 | ] |
|
453 | 453 | ], |
454 | 454 | "variant": [ |
455 | 455 | { |
456 | | - "pattern": "XMSS-(SHA2|SHAKE)_(h)_(nbits)", |
| 456 | + "pattern": "XMSS-(SHA2|SHAKE)[_{h}][_{nbits}]", |
457 | 457 | "primitive": "signature" |
458 | 458 | }, |
459 | 459 | { |
460 | | - "pattern": "XMSSMT-(SHA2|SHAKE)_(h)/(d)_(nbits)", |
| 460 | + "pattern": "XMSSMT-(SHA2|SHAKE)[_{h}/{d}][_{nbits}]", |
461 | 461 | "primitive": "signature" |
462 | 462 | }, |
463 | 463 | { |
464 | | - "pattern": "WOTSP-(SHA2|SHAKE)_(nbits)", |
| 464 | + "pattern": "WOTSP-(SHA2|SHAKE)[_{nbits}]", |
465 | 465 | "primitive": "signature" |
466 | 466 | } |
467 | 467 | ] |
|
474 | 474 | ], |
475 | 475 | "variant": [ |
476 | 476 | { |
477 | | - "pattern": "LMS_(hashfun)_M(bytespernode)_H(treeheight)", |
| 477 | + "pattern": "LMS[_{hashFunction}][_M{bytesPerNode}][_H{treeHeight}]", |
478 | 478 | "primitive": "signature" |
479 | 479 | }, |
480 | 480 | { |
481 | | - "pattern": "LMOTS_(hashfun)_N(bytespernode)_H(treeheight)", |
| 481 | + "pattern": "LMOTS[_{hashfun}][_N{bytespernode}][_H{treeheight}]", |
482 | 482 | "primitive": "signature" |
483 | 483 | } |
484 | 484 | ] |
|
544 | 544 | "standard": [ |
545 | 545 | {"name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357"} |
546 | 546 | ], |
547 | | - "pattern": "GOST38147-(mode)-(padding)", |
| 547 | + "pattern": "GOST38147[-{mode}][-{padding}]", |
548 | 548 | "primitive": "block-cipher" |
549 | 549 | }, |
550 | 550 | { |
|
564 | 564 | ], |
565 | 565 | "variant": [ |
566 | 566 | { |
567 | | - "pattern": "SEED-128-(mode)-(padding)", |
| 567 | + "pattern": "SEED-128[-{mode}][-{padding}]", |
568 | 568 | "primitive": "block-cipher" |
569 | 569 | }, |
570 | 570 | { |
571 | | - "pattern": "SEED-128-(mode)-(padding)-HMAC-(hash)-length", |
| 571 | + "pattern": "SEED-128[-{mode}][-{padding}]-HMAC[-{hashFunction}][-{tagLength}]", |
572 | 572 | "primitive": "ae" |
573 | 573 | }, |
574 | 574 | { |
|
584 | 584 | ], |
585 | 585 | "variant": [ |
586 | 586 | { |
587 | | - "pattern": "ARIA-(128|192|256)-(mode)-(padding)", |
| 587 | + "pattern": "ARIA-(128|192|256)[-{mode}][-{padding}]", |
588 | 588 | "primitive": "block-cipher" |
589 | 589 | }, |
590 | 590 | { |
591 | | - "pattern": "ARIA-(128|192|256)-(authmode)-(padding)", |
| 591 | + "pattern": "ARIA-(128|192|256)[-{authmode}][-{padding}]", |
592 | 592 | "primitive": "ae" |
593 | 593 | } |
594 | 594 | ] |
|
600 | 600 | ], |
601 | 601 | "variant": [ |
602 | 602 | { |
603 | | - "pattern": "CAMELLIA-(128|192|256)-(mode)-(padding)", |
| 603 | + "pattern": "CAMELLIA-(128|192|256)[-{mode}][-{padding}]", |
604 | 604 | "primitive": "block-cipher" |
605 | 605 | }, |
606 | 606 | { |
607 | | - "pattern": "CAMELLIA-(128|192|256)-(authmode)-(padding)", |
| 607 | + "pattern": "CAMELLIA-(128|192|256)[-{authmode}][-{padding}]", |
608 | 608 | "primitive": "ae" |
609 | 609 | } |
610 | 610 | ] |
|
616 | 616 | ], |
617 | 617 | "variant": [ |
618 | 618 | { |
619 | | - "pattern": "Twofish-(128|192|256)-(mode)-(padding)", |
| 619 | + "pattern": "Twofish-(128|192|256)[-{mode}][-{padding}]", |
620 | 620 | "primitive": "block-cipher" |
621 | 621 | } |
622 | 622 | ] |
|
628 | 628 | ], |
629 | 629 | "variant": [ |
630 | 630 | { |
631 | | - "pattern": "Blowfish-(keylength)-(mode)-(padding)", |
| 631 | + "pattern": "Blowfish[-{keyLength}][-{mode}][-{padding}]", |
632 | 632 | "primitive": "block-cipher" |
633 | 633 | } |
634 | 634 | ] |
|
640 | 640 | ], |
641 | 641 | "variant": [ |
642 | 642 | { |
643 | | - "pattern": "SP800_108_(CounterKDF|FeedbackKDF|DoublePipelineKDF)-(prf-function)-(dkmlength)", |
| 643 | + "pattern": "SP800_108_(CounterKDF|FeedbackKDF|DoublePipelineKDF)[-{prfFunction}][-{dkmLength}]", |
644 | 644 | "primitive": "key-derive" |
645 | 645 | } |
646 | 646 | ] |
|
670 | 670 | "primitive": "mac" |
671 | 671 | }, |
672 | 672 | { |
673 | | - "pattern": "(hash)-PBE-(block_cipher)", |
| 673 | + "pattern": "{hashFunction}-PBE-{blockCipher}", |
674 | 674 | "primitive": "block-cipher" |
675 | 675 | }, |
676 | 676 | { |
|
702 | 702 | ], |
703 | 703 | "variant": [ |
704 | 704 | { |
705 | | - "pattern": "X3DH-(hash)", |
| 705 | + "pattern": "X3DH[-{hashFunction}]", |
706 | 706 | "primitive": "key-agree" |
707 | 707 | } |
708 | 708 | ] |
| 709 | + }, |
| 710 | + { |
| 711 | + "family": "BLS", |
| 712 | + "standard": [ |
| 713 | + {"name": "Short Signatures from the Weil Pairing", "url": "https://dx.doi.org/10.1007/3-540-45682-1_30"} |
| 714 | + ], |
| 715 | + "variant": [ |
| 716 | + { |
| 717 | + "pattern": "BLS(13-381|13-377|BN254)", |
| 718 | + "primitive": "signature" |
| 719 | + }, |
| 720 | + { |
| 721 | + "pattern": "BLS[-{ellipticCurve}]", |
| 722 | + "primitive": "signature" |
| 723 | + } |
| 724 | + ] |
709 | 725 | } |
710 | 726 | ] |
711 | 727 | } |
0 commit comments