<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-cms-sha3-hash-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Using SHA3 with the CMS">Use of the SHA3 One-way Hash Functions in the Cryptographic Message Syntax (CMS)</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-cms-sha3-hash-01"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="02"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 74?>

<t>This document describes the conventions for using the four one-way hash
functions in the SHA3 family with the Cryptographic Message Syntax (CMS).</t>
    </abstract>
  </front>
  <middle>
    <?line 79?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> is used to digitally sign,
digest, authenticate, or encrypt arbitrary message contents.  This
specification describes the use of the four one-way hash functions in the
SHA3 family (SHA3-224, SHA3-256, SHA3-384, and SHA3-512) <xref target="SHA3"/> with the
CMS.  In addition, this specification describes the use of these four
one-way hash functions with the RSASSA PKCS#1 version 1.5 signature
algorithm <xref target="RFC8017"/> and the Elliptic Curve Digital Signature Algorithm
(ECDSA) <xref target="DSS"/> with the CMS signed-data content type.</t>
      <section anchor="asn1">
        <name>ASN.1</name>
        <t>CMS values are generated using ASN.1 <xref target="X.680"/>, using the Basic
Encoding Rules (BER) and the Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="message-digest-algorithms">
      <name>Message Digest Algorithms</name>
      <t>One-way hash functions are also referred to as message digest algorithms.<br/>
This section specifies the conventions employed by CMS implementations
that support SHA3-224, SHA3-256, SHA3-384, and SHA3-512 <xref target="SHA3"/>.</t>
      <t>Digest algorithm identifiers are located in the SignedData digestAlgorithms
field, the SignerInfo digestAlgorithm field, the DigestedData digestAlgorithm
field, and the AuthenticatedData digestAlgorithm field.</t>
      <t>Digest values are located in the DigestedData digest field and the Message
Digest authenticated attribute.  In addition, digest values are input to
signature algorithms.</t>
      <t>SHA3-224, SHA3-256, SHA3-384, and SHA3-512 produce output values with
224, 256, 384, and 512 bits, respectively.  The object identifiers for
these four one-way hash functions are as follows:</t>
      <sourcecode type="asn1"><![CDATA[
   hashAlgs OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
       us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 2 }

   id-sha3-224 OBJECT IDENTIFIER ::= { hashAlgs 7 }

   id-sha3-256 OBJECT IDENTIFIER ::= { hashAlgs 8 }

   id-sha3-384 OBJECT IDENTIFIER ::= { hashAlgs 9 }

   id-sha3-512 OBJECT IDENTIFIER ::= { hashAlgs 10 }
]]></sourcecode>
      <t>When using the id-sha3-224, id-sha3-s256, id-sha3-384, or id-sha3-512
algorithm identifiers, the parameters field MUST be absent; not NULL
but absent.</t>
    </section>
    <section anchor="signature-algorithms">
      <name>Signature Algorithms</name>
      <t>This section specifies the conventions employed by CMS implementations
that support the four SHA3 one-way hash functions with the RSASSA PKCS#1
version 1.5 signature algorithm <xref target="RFC8017"/> and the Elliptic Curve Digital
Signature Algorithm (ECDSA) <xref target="DSS"/> with the CMS signed-data content type.</t>
      <t>Signature algorithm identifiers are located in the SignerInfo
signatureAlgorithm field of SignedData.  Also, signature algorithm
identifiers are located in the SignerInfo signatureAlgorithm field
of countersignature attributes.</t>
      <t>Signature values are located in the SignerInfo signature field of
SignedData.  Also, signature values are located in the SignerInfo
signature field of countersignature attributes.</t>
      <section anchor="rsassa-pkcs1-v15-with-sha3">
        <name>RSASSA PKCS#1 v1.5 with SHA3</name>
        <t>The RSASSA PKCS#1 v1.5 is defined in <xref target="RFC8017"/>}}.  When RSASSA PKCS#1 v1.5 is
used in conjunction with one of the SHA3 one-way hash functions, the
object identifiers are:</t>
        <sourcecode type="asn1"><![CDATA[
   sigAlgs OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
       us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 3 }

   id-rsassa-pkcs1-v1_5-with-sha3-224 ::= { sigAlgs 13 }

   id-rsassa-pkcs1-v1_5-with-sha3-256 ::= { sigAlgs 14 }

   id-rsassa-pkcs1-v1_5-with-sha3-384 ::= { sigAlgs 15 }

   id-rsassa-pkcs1-v1_5-with-sha3-512 ::= { sigAlgs 16 }
]]></sourcecode>
        <t>The algorithm identifier for RSASSA PKCS#1 v1.5 subject public keys
in certificates is specified in <xref target="RFC3279"/>, and it is repeated here for
convenience:</t>
        <sourcecode type="asn1"><![CDATA[
   rsaEncryption OBJECT IDENTIFIER ::= { iso(1) member-body(2)
       us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 1 }
]]></sourcecode>
        <t>When the rsaEncryption, id-rsassa-pkcs1-v1_5-with-sha3-224,
id-rsassa-pkcs1-v1_5-with-sha3-256,
id-rsassa-pkcs1-v1_5-with-sha3-384, and
id-rsassa-pkcs1-v1_5-with-sha3-512 algorithm identifier is used,
AlgorithmIdentifier parameters field MUST contain NULL.</t>
        <t>When the rsaEncryption algorithm identifier is used, the RSA public key,
which is composed of a modulus and a public exponent, MUST be encoded
using the RSAPublicKey type as specified in <xref target="RFC3279"/>.  The output of
this encoding is carried in the certificate subject public key.  The
definition of RSAPublicKey is repeated here for convenience:</t>
        <sourcecode type="asn1"><![CDATA[
   RSAPublicKey ::= SEQUENCE {
      modulus INTEGER, -- n
      publicExponent INTEGER } -- e
]]></sourcecode>
        <t>When signing, the RSASSA PKCS#1 v1.5 signature algorithm generates a
single value, and that value is used directly as the signature value.</t>
      </section>
      <section anchor="ecdsa-with-sha3">
        <name>ECDSA with SHA3</name>
        <t>The Elliptic Curve Digital Signature Algorithm (ECDSA) is defined in
<xref target="DSS"/>.  When ECDSA is used in conjunction with one of the SHA3
one-way hash functions, the object identifiers are:</t>
        <sourcecode type="asn1"><![CDATA[
   sigAlgs OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
       us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 3 }

   id-ecdsa-with-sha3-224 ::= { sigAlgs 9 }

   id-ecdsa-with-sha3-256 ::= { sigAlgs 10 }

   id-ecdsa-with-sha3-384 ::= { sigAlgs 11 }

   id-ecdsa-with-sha3-512 ::= { sigAlgs 12 }
]]></sourcecode>
        <t>When using the id-ecdsa-with-sha3-224, id-ecdsa-with-sha3-256,
id-ecdsa-with-sha3-384, and id-ecdsa-with-sha3-512 algorithm identifiers,
the parameters field MUST be absent; not NULL but absent.</t>
        <t>The conventions for ECDSA public keys is as specified in <xref target="RFC5480"/>.  The
ECParameters associated with the ECDSA public key in the signers
certificate SHALL apply to the verification of the signature.</t>
        <t>When signing, the ECDSA algorithm generates two values.  These values
are commonly referred to as r and s.  To easily transfer these two
values as one signature, they MUST be ASN.1 encoded using the
ECDSA-Sig-Value defined in <xref target="RFC3279"/> and repeated here for
convenience:</t>
        <sourcecode type="asn1"><![CDATA[
   ECDSA-Sig-Value ::= SEQUENCE {
       r  INTEGER,
       s  INTEGER }
]]></sourcecode>
      </section>
    </section>
    <section anchor="message-authentication-codes">
      <name>Message Authentication Codes</name>
      <t>This section specifies the conventions employed by CMS implementations
that support the HMAC <xref target="RFC2104"/> with SHA3 message authentication code (MAC).</t>
      <t>MAC algorithm identifiers are located in the AuthenticatedData
macAlgorithm field.</t>
      <t>MAC values are located in the AuthenticatedData mac field.</t>
      <t>When HMAC is used in conjunction with one of the SHA3
one-way hash functions, the object identifiers are:</t>
      <sourcecode type="asn1"><![CDATA[
   hashAlgs OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16)
       us(840) organization(1) gov(101) csor(3) nistAlgorithm(4) 2 }
 
   id-hmacWithSHA3-224 OBJECT IDENTIFIER ::= { hashAlgs 13 }

   id-hmacWithSHA3-256 OBJECT IDENTIFIER ::= { hashAlgs 14 }

   id-hmacWithSHA3-384 OBJECT IDENTIFIER ::= { hashAlgs 15 }

   id-hmacWithSHA3-512 OBJECT IDENTIFIER ::= { hashAlgs 16 }
]]></sourcecode>
      <t>When the id-hmacWithSHA3-224, id-hmacWithSHA3-256,
id-hmacWithSHA3-384, and id-hmacWithSHA3-512 algorithm
identifier is used, the parameters field MUST be absent;
not NULL but absent.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Implementations must protect the signer's private key.  Compromise of the
signer's private key permits masquerade.</t>
      <t>When more than two parties share the same message-authentication key,
data origin authentication is not provided.  Any party that knows the
message-authentication key can compute a valid MAC, therefore the content
could originate from any one of the parties.</t>
      <t>Implementations must randomly generate message-authentication keys and
one-time values, such as the k value when generating a ECDSA signature.
In addition, the generation of public/private key pairs relies on a
random numbers.  The use of inadequate pseudo-random number generators
(PRNGs) to generate cryptographic such values can result in little or no
security.  An attacker may find it much easier to reproduce the PRNG
environment that produced the keys, searching the resulting small set of
possibilities, rather than brute force searching the whole key space.
The generation of quality random numbers is difficult.  RFC 4086 <xref target="RFC4086"/>
offers important guidance in this area, and Appendix 3 of FIPS Pub 186-4
<xref target="DSS"/> provides some PRNG techniques.</t>
      <t>Implementers should be aware that cryptographic algorithms become weaker
with time.  As new cryptanalysis techniques are developed and computing
performance improves, the work factor to break a particular cryptographic
algorithm will reduce.  Therefore, cryptographic algorithm
implementations should be modular allowing new algorithms to be readily
inserted.  That is, implementers should be prepared to regularly update
the set of algorithms in their implementations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="RFC3279">
          <front>
            <title>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="L. Bassham" initials="L." surname="Bassham"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key Infrastructure (PKI). Digital signatures are used to sign certificates and certificate revocation list (CRLs). Certificates include the public key of the named subject. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3279"/>
          <seriesInfo name="DOI" value="10.17487/RFC3279"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="K. Yiu" initials="K." surname="Yiu"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography. This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="SHA3" target="http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">
          <front>
            <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="FIPS PUB" value="202"/>
        </reference>
        <reference anchor="DSS" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf">
          <front>
            <title>Digital Signature Standard (DSS) version 4</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2013" month="July"/>
          </front>
          <seriesInfo name="FIPS PUB" value="186-4"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.690"/>
          <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <?line 308?>

<section numbered="false" anchor="appendix-asn1-module">
      <name>Appendix.  ASN.1 Module</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIALodG2UAA9Va23LjuBF9x1cgnoeRq0RZ8m1sJbuJR9bsODu+xNLsJk9b
EAlbWPO2BGiN4vJ+S74lX5bTAElREjXWbNVskidRJNDoy+nTDZCe5zFtRBz8
JMIkln1uslwylWb2Spv9bve0u8+CxI9FhMdBJu6MN01yHcq5F4oo1Z4faU9P
xYE3FXrqdXvMF6bPtQlYqvqMc5P4ff56LvVr/NFJZjJ5p2t35lH9hlEmxEKv
P2rJkztuppKP3p8d8OtYejMx5++xCH+Xx75RSay5iu2QQTZPTXKfiXSqfH4p
tRb3mDiPjfjEW4PL0e5rJiaTTD5a0Sq+d1JnykydgMvRa6bzSaS0huDxPIUS
F8PxOyYyKfp8ZyT9PFNmvsMeZngSG5nF0njn5BAWCIPh+939A6/X9eAwJnIz
TbI+87hz3G2uNX/v/Aajk+y+z39Q9yrkpeA2//BhgEelmstP8cDHT5+/x7pB
Erf5D2d0L8ljk+H2xxH+yUiosM+L8PzlkSRo6Xf8JGJMxXdJFgmjHiVF5fbd
4LB7ckyXLF55sN/rHhaXB/tvTovLo+Oj/fLy8KRbXJ50e2/oktxJv4i3yO4l
EDA1Ju3v7cWPYZpPdCdW2nTuk8c9uqA7e+8ubkZ7VxejcYeuOnBfJw3unIwC
BZDqHfARIVRkQZ/fyCzKjaDYe2+FloHDAx7z4ScjMWoSSu86xwJmgZLXVmYZ
Err2XASurCQRIp4aS+bGYq5cTlu5Y+lP4yRM7ud2Zhnq3pHXPbF3tMyU1ORe
J5vzHbKH33x8uwPgwKwdjgfno9G6f/SXOKh3cuwdrrnoHFE2MGGk7mNh8kxW
+vMW1tzljzIjSPPDr+KGA6/7Zhs3WOWtI/7eOXboWXfFbDbrYP2Ois1eJv29
sXc7HHh2Qt3mb4sFLkpIwzpT6cfBae752USbTPimJIKrxEGHyIS3zkZXnd5u
qewolb66U74bAPMnQoNK4mLKJtddjD964yWP7PeIAJo9YkfzW4mEjAisJLnP
F/ZhxOh672I46POTk/1Dr9cnec5np7+Tz8grXMZ+EhBLZnkowc1r3nlrvTMs
h93SMN56O7zdbReCBiJOYswI10YNMMpi6hxAx/1c6SkyeXXYOYZ9ZbefNrn9
qHS753lgYwchxsZTpTkKYQ4RhgdS+5maQE+qHn4SP+KurUhwL89thaEnd0me
8aSoXVQg2d1q7bKF6E5EKpzX6tGLBa3DmdUwUkEQSsZeUVHKkiC30vnTK0V/
n0nxbcTxp6eC45+fOSzNiVxNwgNHL9BNg2DaDP+lNm0bFDIZkJBtBIUgQ4tw
kU0UXJbNeVQsA++Amo3ucE5OZHoJTMuezBdlf811fNV1rO66Fv3x9vcP29xd
HR0XVwcnuEd4s/+OevtkLF3D0tLhDD7oUHZwEQSKFmnjNvywnbLaqcs2qFuF
9XZ0Nhqd8ZvvB6NXvYqZe50j611L30yE9wlK/jRyIaECC0VJf5IwDEOVwu18
kGePkq+z/1k5nbWGg/PRGRmLOlCzlZodu54MPCSDKAPEDbqeDpD0yrEAI6fw
RxHmsBdtEL+XscwQ76AAuOOKpydLNs/P7RruLT+wJn6oLHk5+53oU4h2Wo1R
/VVRhCysHyRSJqEStXP5cTTeabtffnVtr2+Hf/t4cTs8p2vE+8OH6oIVI0bv
rz9+OF9cLWYOri8vh1fnbjLu8qVbbOfy7B87DlU71zfji+ursw87DpZ1miCv
IYkmEo/QMaaZJO8JzUogBTTn7eDm3//qHcLcP9juq3eKaLk/J703hxQ65Jpb
LYmJJuxfOHHORJpKkZEUJCn3RUpw0BgL6E6TWcynMkNQ//TnUKHoecd//pYR
V5QUcG7TeQEazdh1M4bJFEhOOLp1mWWOHbBKmeWOGHiFXkp3R5poQW3yFKnU
wJkySsNkDpGTuQWnwn9JDrRZp5mZCsN1nqbYPfDt87xKc8DnfEU9rgJaHepk
zrYw8S20S1a2+XFO6eEsq7kIk8KgvRiWUVFdHcZro9zizeJKaWVanNWItXGC
E7wwqZagKzY0LOsmV4sVMKi8U1+bC2MAUXSDq8QYrC2sYmq4TcIqGqsDgbEv
iFlqaxiI1TXxxSLEXcwKsHOraTQD9QaAzyThi3Yx4dxWGoiY/Iw7S5FGdWYL
vt5UXizWaXAYJjPdZ+zXX3/FjZhaMTsWwdD8+u1fh4MxvzgfXo0v3l0Mb3m/
/w1/4j8nSHZP6cRDX+aZFupNsU9r9Y53i44DXNk6OezuUj8jYvVPi/RWb5dj
B9DqdXHhY6/cOtjltB2ogt863OX7HFUdElTg9t1wy0ZdKmXfrE46On550snK
JLj95UmnK5MoRC9O6nUxC15m7EcgsFZIaka2qz/agqCmle1Aaguyxjx3yZiK
DFtyY9Fgk8GWDFA0ej0M/SP1/PzqI4oEsF/cpPrTVGM1+yoUV7U/tsH5oqaC
NTYV/Lc0FazBYP5bm4pRgyrbULDl1gWtrLCg3adWTI20P0OFajfZzbZejG9a
jGExm8jk4WqBkiT1kpGbSblpocoY9lljthHK1oW+oDQaq5W2lKBj40rwc51W
wwjqc+QdugqrRQ1WqLec2zRunMXs1gJTgJCfCzS75QD0pTO/ZuDbLGYN3A6/
rFA1LP6vMvXBggozLVBqvfTB1z3vsffTkUcmLwjcKVQq3Nt2Jlh8ZebhdjOJ
yldmHm03k/h8ZeZxSd4Elab8trviBjTo3IUxzSch6Af9vGaEDJkZt+kC3Beb
sBrS6FySdhzEYMrQmEyiEaaUoIbX1nlHvwob01VcwLyh267a06AN6AAuKMyR
jCYy8yZJMAdAVkEBUYFWrV7v4OjwdJeTx2gS/Xo9uuotFTbC9tLq7S3A0WYv
w+DFMWXL9NI4Cm9jCItDgTarIH6xeNhcVKkGCISMqmlnkwc+v1pZ4WoQabPZ
VPlTGuInUZoQnYA2BI/QOYa5O68U5QT5KQWPxKZd1Xl7uCUDtmgyIP/Gjv4e
G0oqWHb7tAF0ZXPp+lNwtt3yVSdmpJXIMrUg5xqaGwDvxDFLpao8XltSqAnc
fDO4l+YSkkfYBg+vBkP+VIC39NPF1Xj43fC2zT2Px8Uzp9iwcFo5hD/TGFkD
MhUTmNtuOtbY1HqU5weIECPfh0VJKzc/omj3q/OnQGVwFja8wjVUK6XQFS/b
kKzWq+2PSaqOZqmesaK/KSuZW6TUa4viteEoyPnr/614ST8AXXyuYJ1+ZvB6
jepuHt1Ql3qbRzfUov3NG4kGM9obNLZ02qBbUXGaNWnedLAv2nTwpU3HuOFw
2UGxVjEJlo18Ra/pSr5iw8HNQgfQf+IryyhVA78qt6Qv29RnmtVpzB6icZGm
yE2T2GHYdyy9IVjK104Ta7gFm+jBzJKi2XXK67L3pbexRPqRPQZbOYnKbGzs
lIRLoelU2GQi1hhVHNJCMCu7aG1TtlLRnadVcam9B6nOO411I5T2wCPeD5aq
VltgVyOsJl/SkayKbeRtWFhxdnlL8wVHO9wvDvdqR0kUlAFM+Yob1veXZwPn
A3p/XG4NbSNfnhGKZYXIt7yFabvAB83eemu4dkjGIuGvn5CRzM2bpvWTNgip
5lq8Wpt+V9b/nzhd4gXdTuGQH/GgPL7b4hynVjWWZ29z3lTfvCzN3urgqb6B
WZq93QnU8Vqj3uCBdpNhtlis6ltVijVVms4klvvdl6oFa64Wr6rPRZDrsYb0
rEhWdrGcvTzKtaGjVkOIXLD8a42b6pEo3rWmAzTYWRKp6k0XaxrIU3ozYyBW
6F9yrBpUjB8l9ApkKmJL6jDMENmgZNrbWBeGlvzgrfCD7fXtYRL8dU+vOJaf
w2fkCCj4CFsDOjGJ53aNuesmH+JkZpmNbV4B3Xps9xH02YMgulDw99nARgIV
JikULc6zwOE5napYhcj8O7gHoZ7XqaAws7PB76hJQRKhOpUV7zMOsLsZSytG
RWUZbIN4sQEquuKHomumt0KlSCpXoqiwtSq88n6zeqVX1GxX/PeWIitURvuP
kMJGmzXmtOdxTtviokCXr0LhkkD+ktPkVMs8SLyl0eVyCdqJ1s3t1Xd6l2p3
5QZ/6TW1tbGgbwpSJnUeGqLhUBmDzQOaoThhusC8DT8dbQn/AUtFYGGUZns8
EJEk6gioEaA3WOVLBnIB6cFk/KiyJLYv7Sx0ihHufJTiAJ9LkfnTsp902tA/
HdGrNy3tZhDbUa0mChoqihPMmtruA/pPMoIYAIWFl2XNpkno3K1T4SNO47XQ
wKkhJfay9+2mRd2h74IuHftBFqfPulwdpqvnZ5bc3dmhEZVqAQPvcxUI9CDV
+0r6xs3x1VmayjhQn9D9Y1H3AU8+4fbrnXJPVCYc0jiJnP/cpyTql3wZ9LSs
ntqEIfKauaSHd5cDvXhVhGE+yZxJgRgy15sC9xRbJLucuZkiFuFcQ/HFsrbA
B/JRhkkq3Qsul9TwMQM92a9erM1EaI+yqMmzJHvgd8IHJO2LWjjigc4OKIHh
U5Etq1p7rzBTCDqaT4DE5YDjivYm29hKA1VzjN2PYylBr5sIE2RozSnuDTJU
C9DSMhVrdOKW7sbkSwVTVLPHUyBdFA1yJu9pEbBOntJHM3Zb4kBbX8v1Ripb
7fcQVvu5yQTZRZWmBEqn/GTokoyQ7KlfYFMG3+zEyQ59gPL2nP0H2S0qxmkq
AAA=

-->

</rfc>
